Cisco offers API to fight call fraud
- 09 May, 2012 00:31
LAS VEGAS -- Cisco this week at Interop 2012 released an API for its branch routers designed to enable third-party developers to write applications to enhance the security of phone calls over the router network.
The Cisco UC Gateway Services API is a Web-based programming interface that allows customers and developers access to call information over a Cisco ISR G2 router at the edge of a voice network, such as signaling and media. This information can be used to detect and help prevent malicious activity such as social engineering and identity theft scams, contact center account takeover fraud, unauthorized network and service use, and denial-of-service attacks.
Applications written to the API can then apply appropriate action to terminate, redirect or record the call.
Cisco, citing data from the Communications Fraud Control Association, says global telecom fraud losses are estimated to be $40 billion annually.
FIGHT THE FRAUDS: How to fight back against privacy pirates
To date, SecureLogix has written its voice policy and security applications to the Cisco UC Gateway Services API, and British carrier BT is using it and the SecureLogix applications in its BT Assure Cloud Security service. This service heretofore has been focused predominantly on data security services but now BT customers can add voice security to it and access all of the information on a single dashboard interface, Cisco says.
The SecureLogix application is hosted on Cisco's UCS Express server blade in the ISR. UCS Express is not required for the API, however; that's included in the Cisco IOS software on the router, Cisco says. Applications written to it though run on UCS Express or can be access via the cloud.
The router also includes Cisco's Unified Border Element for SIP trunks and Cisco TDM Gateways for TDM trunks, both of which provide voice connectivity to the service provider.
The API can also be use for non-security-related applications, Cisco says. Companies can use it to ensure regulatory compliance through its call recording or to collect volumes, duration and related details for business operations.
Cisco says it is using it to dynamically select and record specific calls collected by its MediaSense media data capture and storage application for quality monitoring purposes in contact centers.
The API and SecureLogix application on UCS Express are available now.
Read more about wide area network in Network World's Wide Area Network section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Cisco Subnet: An independent Cisco community
- Hot Products at Interop 2012
- Applications Research Center - Network World
- Security Research Center - Network World
- Network router cheat sheet
- Cisco unveils new generation of branch routers
- CFCA Home
- How to fight back against privacy pirates
- Server Research Center - Network World
- LAN & WAN Research Center - Network World
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Mobility Apps: What every developer should know
Learn how others have delivered industry-leading, multi-platform management and security solutions. In this whitepaper, we look how app developers can develop, deploy and manage apps that enterprises can rely on today and into the future. Click to download!
Maximising productivity without sacrificing security
Advances in mobility and client computing technology combined with the ubiquity of the Internet and social media are creating a culture and desire for constant connectivity and anywhere access to information. As these trends extend from the home into the work place, IT managers should consider seriously the opportunities for increased productivity and communication with customers and constituents, as well as understand the increased security risks posed by online, anytime access to private networks and data. Read more.
Securing the Promise of Virtualisation
For today’s enterprise, this whitepaper identifies three general areas of risk associated with risk; those that are traditionally areas of risk, the hazards that are exclusive to virtualisation and the more recent set of risks that are associated with newly formed hybrid environments. Read more to find out how to keep pace with evolving threats, quicker provisioning and dynamically mobile workloads.