Sicherheit für Asterisk
Vergleichen Sie SECast mit Alternativen
»
comparison
SecAst |
Fail2Ban |
Firewall | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
SIP Connection Monitoring | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credentials valid | Breached credentials |
Diffused probes |
SIP packet structure |
User Behaviour MonitoringFraud phone number database verification |
Dialing cadence |
Simultaneous calls |
Heuristic patterns |
Network Connection MonitoringHacker database IP address verification |
SIP data transfer rate |
Clustered connection attempts |
Geographic location |
Port connection rate |
Attack ContainmentBan IP on PBX or firewall |
Override dialplan permitted patterns |
Disconnect individual calls |
Lockdown new connections |
Attack Response OrchestrationControl internal firewall |
Control external firewall |
Control external router |
Change dialplan |
Share attack data with peers |
|
Yes/Excellent |
Partial/Fair |
No/Poor |
Vergleichsdetails
Die folgenden Felder enthalten weitere Bewertungsdetails, und wenn Sie auf den Pfeil nach unten am unteren Rand jedes Feldes klicken, können Sie sehen, wie SECast im Vergleich abschneidet.