Welcome!

News Feed Item

Egged Addresses Need for Voice Network Security with Vigilance Networks

Vigilance Networks, formerly known as Vibesec, a security intelligence company, today announced that Egged, an Israel-based public transportation company, is deploying the Vigilance Security Intelligence Platform as it looks to proactively protect its Cisco-based voice over IP (VoIP) network for its corporate headquarters and remote offices. Designed to protect real-time IP communications against threats, vulnerabilities, cyber attacks and toll fraud, Vigilance Networks’ Security Intelligence Platform effectively secures the unified communications (UC) and IP Telephony networks that standard IT and data security solutions are unable to adequately protect. As a result, Egged is now able to receive real-time insight and understanding of their vulnerabilities and networks as they look to mitigate cyber threats.

Operating over 55 percent of Israel’s bus service with nearly 1 million passengers, Egged began experiencing threats to their UC network. As a multi-national company with employees working out of either the headquarters or one of the remote locations – including several regional offices, a call center and a repair depot – Egged saw the need to deploy enhanced security features before a full-blown attack crippled the network and impacted transportation services. Demanding separate, specialized security for each location, Egged looked for a solution that could secure the headquarters with an emphasis on prevention of information leaks and user identity theft, as well as prevention of toll fraud at the regional offices. Without wanting to deploy multiple security solutions, Egged demanded the ability to manage security, fraud and call policy from a single, unified pane of glass.

By deploying Vigilance Networks’ Security Intelligence Platform, Egged was able to seamlessly integrate the security functions into existing technology, including session border controllers, communications servers, voicemail servers and media gateways. Vigilance Networks’ platform delivers an unprecedented amount of actionable intelligence about the known and unknown threats to Egged’s IP network. These include real-time threat, fraud and security intelligence that can be used to combat attacks as they happen, and prevent them from happening at all. As a result, Egged is able to effectively manage and monitor security, both internally and at the perimeter.

“As we work directly with the public, it’s imperative that we’re able to connect with customers and ensure continuous service over our unified communications network,” said Chen Amram, CTO of Egged. “Since the threats we were experiencing were UC specific, we saw the need for a more advanced solution. Vigilance Networks’ Security Intelligence Platform enables us to monitor our VoIP network to ensure privacy, prevent information leaks and toll fraud, and tightly manage security policies. As a result, we’re able to ensure business continuity as we continue our daily operations of running over 3,000 buses, without worrying about cyber security.”

“The challenge network administrator’s face is that standard tools and procedures used to secure the data network aren’t designed to tackle the threats facing real-time communications running on that network. With hackers becoming more educated and using advanced tools to gain entry, often times existing network security is rendered vulnerable,” said Neil Segall, CEO of Vigilance Networks. “The Vigilance Networks Security Intelligence Platform provides customers, including Egged, the unique ability to get detailed, real-time intelligence regarding their networks, thus establishing a better foundation to ensure business growth without network intrusion or interruption of service.”

About Vigilance Networks

Vigilance Networks™ is a privately held security intelligence company specializing in real time IP networks and applications. Its innovative platform allows enterprises, service providers, and governments to secure their networks and applications, while safely enable the increasingly complex and rapidly growing number of real time IP applications and mobile end points, including wearable technologies. The core of Vigilance Networks Security Intelligence platform is its Next-Generation Analytics Engine, which delivers application, element, user, and pattern visibility and control in a virtualized, cloud-based environment. Vigilance Networks' products and services address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. For more information, visit www.VigilanceNetworks.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DXWorldEXPO LLC announced today that Ed Featherston has been named the "Tech Chair" of "FinTechEXPO - New York Blockchain Event" of CloudEXPO's 10-Year Anniversary Event which will take place on November 12-13, 2018 in New York City. CloudEXPO | DXWorldEXPO New York will present keynotes, general sessions, and more than 20 blockchain sessions by leading FinTech experts.
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
"Peak 10 is a national cloud data center solutions managed services provider, and part of that is disaster recovery. We see a growing trend in the industry where companies are coming to us looking for assistance in their DR strategy," stated Andrew Cole, Director of Solutions Engineering at Peak 10, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy.
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...