SlideShare a Scribd company logo
Contact Center
Infrastructure
Sigal Russin, CISO
Senior Analyst at STKI
sigalr@stki.info
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
What are you getting:
2
1 2 3 4
5 6
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Cloud Problems
3
Source: information week
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Cloud Status
4
Source: information week
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Cloud Status
5
Source: information week
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
6
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
7
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Business Benefits
Improved
business
agility
Lower
total cost
of
ownership
Decreased
capital
expense
flexible
scaling
8
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
9
* In percent
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
10
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Cloud Contact Center Concerns
• Security – authentication, back-up, e encryption and secure
user/password processes, regulation.
• Performance- quality, availability, inconsistency, bandwidth
available and latency, Send critical signals such as SIP, XML, CTI .
• Resilience and Business Continuity- back–up or mirrored
location, recovery and resilience.
11
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Performance & Security
• Time out intervals
• Distributed denial of service
• Data theft
• Trial and error break in
• Bank cards fraud
• caller ID attack against system (CLI spoofing)
• Voice biometric attack
• Telephone Switch attack
• Phishing Attack – man in the middle
• OS compromise
Source: https://www.brighttalk.com/webcast/288/31879
12
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Session Border Controller (SBC)
13
A device or application that governs the manner in which called
sessions, are initiated, conducted and terminated in a VoIP (Voice
over Internet Protocol) network.
Location: a connection point, called a border, between a
private local area network (LAN) and the Internet.
It can exist as a single, independent hardware unit containing all of the
resources necessary for call signaling and call control.
It can include call filtering, bandwidth use management, firewalls and
anti-malware programs to minimize abuse and enhance security.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
SBC Topology
14
External Cloud
Your Business
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Security measures in SBC
15
 Safeguarding enterprise customer confidentiality and
privacy
 Improving interoperability by mitigating multi-vendor/multi-
protocol interoperability issues
 Ensuring better reliability by enforcing service quality and
enabling high levels of service availability
Many contact center managers who operate at a single site see
limited value in the migration to voice over IP (VoIP) and will
only do so when a vendor declares the existing application's end
of life.
source: Forrester Research, Inc., Is It Time To Move Your Contact Center to the Cloud? June, 2012
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
SBC-based Solutions
16
Forrester :“Risk and compliance teams need to audit and approve
the cloud contact center service provider’s security procedures and
technology to best manage the enterprise’s exposure.”
source: Forrester Research, Inc., Is It Time To Move Your Contact Center to the Cloud? June, 2012
 Acme Packet
 Audiocodes
 Cisco
 Edgewater
 Siemens Enterprise
 Sipera
 Avaya
 Others
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Vendor
selection
• Performance
• Resilience
• Capability
• Freedom
• Hosting center
Voice quality of
VoIP
• VoIP quality and
performance
• Dedicated
connections
• Prioritise your voice
over data traffic
Security
• Policies and
procedures
• Hosting
environment
• Network
design and
access
Don’t Forget!
17
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
18
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Insights from Customer Roundtable UC
19
Maintaining the current UC infrastructure is complicated because many
vendors are involved
Different organizational cultures can lead to failure or success in UC
projects
LYNC market share is very strong in Israel because most of the
organizations Microsoft based. But what about IPTEL with LYNC?
Cross organization projects that can optimize work and
change organizational culture
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Next round table…
20
Multi
Channel
Voice
verificationSpeech
recognition
Contact
Center
Apps
Customer
self service
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Thank You!
Sigalr@stki.info

More Related Content

PPTX
Delivering Predictable Financial Services Applications over the Internet with...
PDF
ThousandEyes at Zendesk
PPTX
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
PDF
Monitoring Multi-Cloud Performance
PPTX
NetScout nGeniusONE overview
PDF
Israel IT trends and positioning in networking and security
PDF
Positioning+trends sigal summit 2014
PDF
SplunkLive! Zurich 2018: The Evolution of Splunk at Helvetia Insurance
Delivering Predictable Financial Services Applications over the Internet with...
ThousandEyes at Zendesk
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Monitoring Multi-Cloud Performance
NetScout nGeniusONE overview
Israel IT trends and positioning in networking and security
Positioning+trends sigal summit 2014
SplunkLive! Zurich 2018: The Evolution of Splunk at Helvetia Insurance

What's hot (20)

PPTX
Modernizing Your DNS Platform with NS1 and ThousandEyes
PPTX
SplunkLive! Utrecht 2016 - Exact
PDF
Avoid outages-from-misconfigured-devices-webinar-slides
PPTX
SplunkLive! Utrecht 2016 - NXP
PDF
SplunkLive! Zurich 2018: MARVES GmbH
PPT
More Things You Can Do with the AlgoSec Security Policy Management Suite
PPTX
Taking Splunk to the Next Level - Management Breakout Session
PDF
compliance made easy. pass your audits stress-free webinar
PPTX
Splunk for Monitoring and Diagnostics in the Industrial Environment
PPTX
APIC-EM Update: SDN Automation for the Enterprise Network
PPTX
Webinar: What's New In FlexNet Manager Suite 2018 R1
PPTX
Catch these Sessions on-demand at .conf Online
PPTX
SplunkLive! Utrecht - KPN
PPTX
20160000 Cloud Discovery Event - Cloud Access Security Brokers
PDF
SplunkLive! Frankfurt 2018 - Customer Presentation: Bosch Cyber Defense Center
PPTX
SplunkLive! Wien 2016 - Use Case TTTech Computertechnik
PDF
Cloud migrations made simpler safe secure and successful migrations
PPTX
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
PPTX
Getting started with Splunk Breakout Session
PDF
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Modernizing Your DNS Platform with NS1 and ThousandEyes
SplunkLive! Utrecht 2016 - Exact
Avoid outages-from-misconfigured-devices-webinar-slides
SplunkLive! Utrecht 2016 - NXP
SplunkLive! Zurich 2018: MARVES GmbH
More Things You Can Do with the AlgoSec Security Policy Management Suite
Taking Splunk to the Next Level - Management Breakout Session
compliance made easy. pass your audits stress-free webinar
Splunk for Monitoring and Diagnostics in the Industrial Environment
APIC-EM Update: SDN Automation for the Enterprise Network
Webinar: What's New In FlexNet Manager Suite 2018 R1
Catch these Sessions on-demand at .conf Online
SplunkLive! Utrecht - KPN
20160000 Cloud Discovery Event - Cloud Access Security Brokers
SplunkLive! Frankfurt 2018 - Customer Presentation: Bosch Cyber Defense Center
SplunkLive! Wien 2016 - Use Case TTTech Computertechnik
Cloud migrations made simpler safe secure and successful migrations
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Getting started with Splunk Breakout Session
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Ad

Viewers also liked (13)

DOCX
Derecho de autor
DOCX
Best Practices in HR Paper
PDF
Smart campus Yobitel Communications
PPTX
Presentation1
PPTX
AS Media Studies: Prelim Intro
PDF
West Coast Smiles
PDF
Yourprezi
PPTX
El poder del pan - El significado del pan en la santa cena
PDF
Tce presentation
DOCX
Partes del escritorio windows
PDF
Partes del escritorio de windows .
DOCX
Consumer Behavior Analysis
PDF
OSHA's Subpart AA
Derecho de autor
Best Practices in HR Paper
Smart campus Yobitel Communications
Presentation1
AS Media Studies: Prelim Intro
West Coast Smiles
Yourprezi
El poder del pan - El significado del pan en la santa cena
Tce presentation
Partes del escritorio windows
Partes del escritorio de windows .
Consumer Behavior Analysis
OSHA's Subpart AA
Ad

Similar to Contact Center infrastructure 2014 (20)

PPTX
contact center trends 2014
PDF
Sigal summit 2014 final
PDF
CONTACT CENTER TRENDS 2014
PDF
DLP Data leak prevention
PDF
297727851 getting-to-the-cloud-event-2015
PDF
Pini sigal Summit 2014 final
PPTX
Secure develpment 2014
PDF
Printing om 2014
PDF
Cyber security 2013
PDF
Delivery 2015 pini
PDF
Stki summit2013 infra_pini sigaltechnologies_v5 final
PDF
Best Practices for Building Scalable Visibility Architectures
PPTX
Output management 2013
PDF
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
PDF
infra 2015 delivery
PDF
2015 positioning security & networking
PPTX
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
PPTX
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
PDF
Cisco Connect Toronto 2018 DNA assurance
PDF
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
contact center trends 2014
Sigal summit 2014 final
CONTACT CENTER TRENDS 2014
DLP Data leak prevention
297727851 getting-to-the-cloud-event-2015
Pini sigal Summit 2014 final
Secure develpment 2014
Printing om 2014
Cyber security 2013
Delivery 2015 pini
Stki summit2013 infra_pini sigaltechnologies_v5 final
Best Practices for Building Scalable Visibility Architectures
Output management 2013
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
infra 2015 delivery
2015 positioning security & networking
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence

More from Ariel Evans (9)

PDF
Risk mngt gov compliance security cyber
PPTX
Secure development 2014
PDF
Stki summit2013 ratios
PDF
Cloud cc security
PDF
Stki summit2013 infra_pini sigal_mega_v10 final
PDF
Mdm byod survey results 2013
PDF
IDM & IAM 2012
PDF
Trends In Infrastructure Services
PPTX
From creeper to stuxnet
Risk mngt gov compliance security cyber
Secure development 2014
Stki summit2013 ratios
Cloud cc security
Stki summit2013 infra_pini sigal_mega_v10 final
Mdm byod survey results 2013
IDM & IAM 2012
Trends In Infrastructure Services
From creeper to stuxnet

Recently uploaded (20)

PPT
What is a Computer? Input Devices /output devices
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
project resource management chapter-09.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
Getting Started with Data Integration: FME Form 101
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Modernising the Digital Integration Hub
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hybrid model detection and classification of lung cancer
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
What is a Computer? Input Devices /output devices
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Programs and apps: productivity, graphics, security and other tools
observCloud-Native Containerability and monitoring.pptx
project resource management chapter-09.pdf
Chapter 5: Probability Theory and Statistics
Web App vs Mobile App What Should You Build First.pdf
STKI Israel Market Study 2025 version august
Getting Started with Data Integration: FME Form 101
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Modernising the Digital Integration Hub
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
WOOl fibre morphology and structure.pdf for textiles
Hybrid model detection and classification of lung cancer
OMC Textile Division Presentation 2021.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
O2C Customer Invoices to Receipt V15A.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Univ-Connecticut-ChatGPT-Presentaion.pdf

Contact Center infrastructure 2014

  • 1. Contact Center Infrastructure Sigal Russin, CISO Senior Analyst at STKI sigalr@stki.info
  • 2. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph What are you getting: 2 1 2 3 4 5 6
  • 3. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Cloud Problems 3 Source: information week
  • 4. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Cloud Status 4 Source: information week
  • 5. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Cloud Status 5 Source: information week
  • 6. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 6
  • 7. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 7
  • 8. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Business Benefits Improved business agility Lower total cost of ownership Decreased capital expense flexible scaling 8
  • 9. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 9 * In percent
  • 10. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 10
  • 11. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Cloud Contact Center Concerns • Security – authentication, back-up, e encryption and secure user/password processes, regulation. • Performance- quality, availability, inconsistency, bandwidth available and latency, Send critical signals such as SIP, XML, CTI . • Resilience and Business Continuity- back–up or mirrored location, recovery and resilience. 11
  • 12. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Performance & Security • Time out intervals • Distributed denial of service • Data theft • Trial and error break in • Bank cards fraud • caller ID attack against system (CLI spoofing) • Voice biometric attack • Telephone Switch attack • Phishing Attack – man in the middle • OS compromise Source: https://www.brighttalk.com/webcast/288/31879 12
  • 13. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Session Border Controller (SBC) 13 A device or application that governs the manner in which called sessions, are initiated, conducted and terminated in a VoIP (Voice over Internet Protocol) network. Location: a connection point, called a border, between a private local area network (LAN) and the Internet. It can exist as a single, independent hardware unit containing all of the resources necessary for call signaling and call control. It can include call filtering, bandwidth use management, firewalls and anti-malware programs to minimize abuse and enhance security.
  • 14. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph SBC Topology 14 External Cloud Your Business
  • 15. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Security measures in SBC 15  Safeguarding enterprise customer confidentiality and privacy  Improving interoperability by mitigating multi-vendor/multi- protocol interoperability issues  Ensuring better reliability by enforcing service quality and enabling high levels of service availability Many contact center managers who operate at a single site see limited value in the migration to voice over IP (VoIP) and will only do so when a vendor declares the existing application's end of life. source: Forrester Research, Inc., Is It Time To Move Your Contact Center to the Cloud? June, 2012
  • 16. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph SBC-based Solutions 16 Forrester :“Risk and compliance teams need to audit and approve the cloud contact center service provider’s security procedures and technology to best manage the enterprise’s exposure.” source: Forrester Research, Inc., Is It Time To Move Your Contact Center to the Cloud? June, 2012  Acme Packet  Audiocodes  Cisco  Edgewater  Siemens Enterprise  Sipera  Avaya  Others
  • 17. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Vendor selection • Performance • Resilience • Capability • Freedom • Hosting center Voice quality of VoIP • VoIP quality and performance • Dedicated connections • Prioritise your voice over data traffic Security • Policies and procedures • Hosting environment • Network design and access Don’t Forget! 17
  • 18. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 18
  • 19. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Insights from Customer Roundtable UC 19 Maintaining the current UC infrastructure is complicated because many vendors are involved Different organizational cultures can lead to failure or success in UC projects LYNC market share is very strong in Israel because most of the organizations Microsoft based. But what about IPTEL with LYNC? Cross organization projects that can optimize work and change organizational culture
  • 20. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Next round table… 20 Multi Channel Voice verificationSpeech recognition Contact Center Apps Customer self service
  • 21. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Thank You! Sigalr@stki.info