{"id":12389,"date":"2020-02-16T09:54:23","date_gmt":"2020-02-16T14:54:23","guid":{"rendered":"https:\/\/telium.io\/seguridad-para-asterisk\/comparacion\/"},"modified":"2024-04-24T12:01:25","modified_gmt":"2024-04-24T17:01:25","slug":"comparacion","status":"publish","type":"page","link":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/","title":{"rendered":"Comparaci\u00f3n"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility lazyload headerheight\" style=\"--awb-background-position:right top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/banner-flying-boxes2-1024x344.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-top:125px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element fusion-image-align-left in-legacy-container\" style=\"text-align:left;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"margin-right:25px;float:left;\"><img decoding=\"async\" width=\"259\" height=\"225\" title=\"inspecci\u00f3n3\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/inspection3.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/inspection3.png\" alt class=\"lazyload img-responsive wp-image-9207\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27259%27%20height%3D%27225%27%20viewBox%3D%270%200%20259%20225%27%3E%3Crect%20width%3D%27259%27%20height%3D%27225%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/inspection3-200x174.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/inspection3.png 259w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 259px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:50px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-no-medium-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.4;\">Seguridad para Asterisk<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-six\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h6 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.5;\">Compara SECast con otras alternativas<\/h6><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns fusion-no-medium-visibility fusion-no-large-visibility lazyload\" style=\"--awb-background-position:right top;--awb-border-color:#ff6600;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-size:cover;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/banner-flying-boxes2-1024x344.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last mobileheader\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-one mobilebreadcrumb\" style=\"--awb-text-color:#cfcfcf;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.4;\">SECAST<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #cfcfcf; font-size: 150%;\">\u00bb<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-two mobilebreadcrumb\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.5;\">COMPARACI\u00d3N<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"product-tabs\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-1 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/\"><i class=\"fa-book fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Overview<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-2 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/ventajas\/\"><i class=\"fa-life-ring fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Benefits<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-3 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/\"><i class=\"fa-check-double fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Features<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-4 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/tecnologia\/\"><i class=\"fa-microchip fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Technology<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-5 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/testimonios\/\"><i class=\"fa-bullhorn fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Testimonials<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-6 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/imagenes\/\"><i class=\"fa-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Screenshots<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-7 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/videos\/\"><i class=\"fa-video-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Videos<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-8 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/ediciones\/\"><i class=\"fa-check-circle fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Editions<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-9 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/preguntas-frecuentes\/\"><i class=\"fa-question-circle fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-large button-custom fusion-button-default button-10 fusion-button-span-no fusion-has-button-gradient cursor-default product-tab\" style=\"--button_accent_color:#fff;--button_accent_hover_color:#fff;--button_border_hover_color:#787878;--button_gradient_top_color:#ff6600;--button_gradient_bottom_color:#dd4400;--button_gradient_top_color_hover:#ff6600;--button_gradient_bottom_color_hover:#dd4400;--button_text_transform:none;\" target=\"_self\" href=\"#\"><i class=\"fa-balance-scale fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Comparison<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-11 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/descargar\/\"><i class=\"fa-download fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-12 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/precios-comprar-2\/\"><i class=\"fa-shopping-cart fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pricing \/ Buy<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-13 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/foros\/\"><i class=\"fa-comment fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Forums<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-14 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/licencia\/\"><i class=\"fa-gavel fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">License<\/span><\/a><\/div><h2 style=\"color: rgba(0,0,0,0);display: inline;font-size: 0em;\">comparison<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\">\n<div class=\"panel_row panel_row_top\" style=\"background: white;\">\n  <div>\n    <table class=\"editiontable\" style=\"table-layout: fixed;\">\n      <tr class=\"edition_color_dark_grey\"><td width=\"40%\">&nbsp;<\/td>\n        <td width=\"20%\"><div align=\"center\" class=\"editioncolheader rotatedsmall\">SecAst<\/div><\/td>\n        <td width=\"20%\"><div align=\"center\" class=\"editioncolheader rotatedsmall\">Fail2Ban<\/div><\/td>\n        <td width=\"20%\"><div align=\"center\" class=\"editioncolheader rotatedsmall\">Firewall<\/div><\/td><\/tr><tr><td colspan=\"4\"><h2 class=\"editionsection\" >SIP Connection Monitoring<\/h2><\/td><tr>\n<tr style=\"background-color: #FFF;\">\n<td class=\"description\">Credentials valid<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Breached credentials<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Diffused probes<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">SIP packet structure<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr><td colspan=\"4\"><h2 class=\"editionsection\" >User Behaviour Monitoring<\/h2><\/td><tr>\n<tr style=\"background-color: #FFF;\">\n<td class=\"description\">Fraud phone number database verification<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Dialing cadence<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Simultaneous calls<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Heuristic patterns<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr><td colspan=\"4\"><h2 class=\"editionsection\" >Network Connection Monitoring<\/h2><\/td><tr>\n<tr style=\"background-color: #FFF;\">\n<td class=\"description\">Hacker database IP address verification<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">SIP data transfer rate<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Clustered connection attempts<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Geographic location<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Port connection rate<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><tr><td colspan=\"4\"><h2 class=\"editionsection\" >Attack Containment<\/h2><\/td><tr>\n<tr style=\"background-color: #efefef;\">\n<td class=\"description\">Ban IP on PBX or firewall<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Override dialplan permitted patterns<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Disconnect individual calls<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Lockdown new connections<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr><td colspan=\"4\"><h2 class=\"editionsection\" >Attack Response Orchestration<\/h2><\/td><tr>\n<tr style=\"background-color: #efefef;\">\n<td class=\"description\">Control internal firewall<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Control external firewall<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Control external router<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Change dialplan<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Share attack data with peers<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i>    <\/table>\n  <\/div>\n<\/div>\n<!-- End of table -->\n    <table class=\"editiontable\" style=\"table-layout: fixed;\">\n      <tr class=\"edition_color_dark_grey\">\n        <td width=\"33%\"><div align=\"center\" class=\"editioncolheader\" style=\"font-size: initial;\"><i class=\"fa-circle fas editionsymbol\"><\/i> Yes\/Excellent<\/div><\/td>\n        <td width=\"33%\"><div align=\"center\" class=\"editioncolheader\" style=\"font-size: initial;\"><i class=\"fa-adjust fas editionsymbol\"><\/i> Partial\/Fair<\/div><\/td>\n        <td width=\"33%\"><div align=\"center\" class=\"editioncolheader\" style=\"font-size: initial;\"><i class=\"fa-circle far editionsymbol\"><\/i> No\/Poor<\/div><\/td>\n      <\/tr>\n    <\/table><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#efefef;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#efefef;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-5 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top:30px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.5;\">Detalles de la Comparaci\u00f3n<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p>Los siguientes cuadros proporcionan m\u00e1s detalles de la evaluaci\u00f3n y, al hacer clic en la flecha hacia abajo en la parte inferior de cada cuadro, puede ver c\u00f3mo se compara SECast.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-assistive-listening-systems fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Supervisi\u00f3n de la conexi\u00f3n SIP<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>La supervisi\u00f3n de la conexi\u00f3n SIP describe si y c\u00f3mo el sistema de seguridad monitorea el tr\u00e1fico SIP que fluye a trav\u00e9s de la PBX, y detecta las acciones o la informaci\u00f3n que pueden aumentar el riesgo de fraude o pirater\u00eda. La inspecci\u00f3n de paquetes permite que el sistema de seguridad examine los comandos que se emiten y las credenciales que se env\u00edan. Estas credenciales se pueden comparar con lo permitido por el servidor Asterisk y los comandos se pueden evaluar para determinar si son seguros y adecuados para el tipo de conexi\u00f3n. Adem\u00e1s, la velocidad a la que se emiten estos comandos puede ser indicativo de pirater\u00eda inform\u00e1tica.<\/p>\n<p>Los datos del SORBO se dividen en paquetes, y cada paquete tiene una estructura bien definida. La inspecci\u00f3n profunda del paquete permite que el sistema de seguridad determine si el paquete del SORBO est\u00e1 malformado, y si es as\u00ed, de tal manera que pueda explotar una debilidad en la pila subyacente del SORBO.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12389-1\"><div class=\"fusion-panel panel-default panel-fab21d1a70aef1b23 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_fab21d1a70aef1b23\"><a aria-expanded=\"false\" aria-controls=\"fab21d1a70aef1b23\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12389-1\" data-target=\"#fab21d1a70aef1b23\" href=\"#fab21d1a70aef1b23\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Vea c\u00f3mo se compara SECast<\/span><\/a><\/h4><\/div><div id=\"fab21d1a70aef1b23\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_fab21d1a70aef1b23\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Los firewalls regulares son ajenos al contenido del tr\u00e1fico relacionado con VoIP, y simplemente reenv\u00edan SIP\/RTP\/IAX\/etc. de Internet al servidor Asterisk Una completa falta de comprensi\u00f3n del contenido del paquete da lugar a que los firewalls tradicionales sean poco m\u00e1s que enrutadores. Fail2ban no es realmente un sistema de seguridad, m\u00e1s bien depende completamente de Asterisk para informar de un intento de inicio de sesi\u00f3n fallido (y fail2ban entonces agrega la IP de origen a una lista de prohibici\u00f3n de iptables local).<\/p>\n<p>SECast es el \u00fanico producto que crea un perfil de cada usuario o dispositivo conectado, y garantiza que los comandos SIP recibidos sean seguros y apropiados. Incluso los comandos SIP normales emitidos a frecuencias inusuales pueden ser indicativos de la pirater\u00eda. SECast es el \u00fanico producto capaz de detectar tales patrones, detectar credenciales SIP v\u00e1lidas que se utilizan indebidamente, etc.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-2 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-user-ninja fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Monitoreo del comportamiento del usuario<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>La supervisi\u00f3n del comportamiento del usuario describe c\u00f3mo el sistema de seguridad supervisa las acciones del usuario (por encima del nivel de protocolo VoIP). Los hackers buscar\u00e1n exploits PBX marcando n\u00fameros que no son ni extensiones locales ni opciones de men\u00fa v\u00e1lidas. Tambi\u00e9n pueden marcar n\u00fameros de tel\u00e9fono a una velocidad no posible por un ser humano.<\/p>\n<p>Una vez que los atacantes encuentran una debilidad en el PBX, normalmente lo explotan r\u00e1pidamente para maximizar su retorno financiero antes de que se detecte o cierre la debilidad. Un aumento repentino en el n\u00famero de llamadas de una extensi\u00f3n o a un n\u00famero determinado, puede indicar pirater\u00eda. Adem\u00e1s, la secuencia de actividades que realiza un usuario puede ser at\u00edpica para el uso normal de PBX y puede indicar pirater\u00eda.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12389-2\"><div class=\"fusion-panel panel-default panel-a85c040c21e6e37c0 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a85c040c21e6e37c0\"><a aria-expanded=\"false\" aria-controls=\"a85c040c21e6e37c0\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12389-2\" data-target=\"#a85c040c21e6e37c0\" href=\"#a85c040c21e6e37c0\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Vea c\u00f3mo se compara SecAst<\/span><\/a><\/h4><\/div><div id=\"a85c040c21e6e37c0\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a85c040c21e6e37c0\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Los firewalls tradicionales no supervisan el comportamiento en el nivel de usuario, y simplemente pasan los paquetes relacionados con VoIP de ida y vuelta. Fail2Ban tampoco tiene visibilidad del comportamiento del usuario (solo fail2Ban puede actuar con errores notificados por Asterisk<\/p>\n<p>SecAst es el \u00fanico producto que supervisa el comportamiento de cada usuario (y de hecho cada dispositivo) y crea una puntuaci\u00f3n de riesgo basada en el comportamiento del usuario combinado con otros factores. Mientras que una acci\u00f3n por s\u00ed misma puede no ser suficiente para identificar un intento de pirater\u00eda, la combinaci\u00f3n de acciones detectadas por SecAst le permiten detectar y detener la pirater\u00eda antes de que el atacante puede hacer mucho da\u00f1o (o generar cargos de fraude masivos en su cuenta de transportista).<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-3 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-network-wired fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Supervisi\u00f3n de la conexi\u00f3n de red<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>La supervisi\u00f3n de la conexi\u00f3n de red se refiere al seguimiento del tr\u00e1fico VoIP en el nivel de red. Puesto que todo el tr\u00e1fico VoIP se mueve sobre UDP\/IP, la detecci\u00f3n de paquetes inusuales relacionados con UDP\/IP puede ayudar a identificar comportamientos sospechosos. Los protocolos UDP e IP tambi\u00e9n proporcionan informaci\u00f3n considerable sobre la fuente de la conexi\u00f3n\/ataque y su naturaleza.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12389-3\"><div class=\"fusion-panel panel-default panel-409b951a0b492b643 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_409b951a0b492b643\"><a aria-expanded=\"false\" aria-controls=\"409b951a0b492b643\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12389-3\" data-target=\"#409b951a0b492b643\" href=\"#409b951a0b492b643\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Vea c\u00f3mo se compara SecAst<\/span><\/a><\/h4><\/div><div id=\"409b951a0b492b643\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_409b951a0b492b643\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Fail2Ban no tiene visibilidad en el nivel de conexi\u00f3n de red; s\u00f3lo puede responder a los mensajes de error de Asterisk. Los firewalls tradicionales, por otro lado, sobresalen en esta \u00e1rea como la supervisi\u00f3n del tr\u00e1fico de nivel UDP e IP es lo que fueron dise\u00f1ados para hacer. La \u00fanica debilidad de los cortafuegos tradicionales es que no son conscientes de los patrones y fuentes de la pirater\u00eda espec\u00edfica VoIP.<\/p>\n<p>SecAst combina tanto el alto nivel (usuario y SIP) con la informaci\u00f3n de tr\u00e1fico de bajo nivel (UDP\/IP) para proporcionar una sensibilidad sin igual a los intentos de pirater\u00eda en el nivel de red. SecAst tambi\u00e9n utiliza bases de datos de direcciones IP de hackers conocidos para bloquear los intentos de conexi\u00f3n antes de que el atacante tenga incluso la oportunidad de comunicarse con el PBX.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-4 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-box fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Contenci\u00f3n de ataque<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>La contenci\u00f3n de ataques se refiere a lo bien que el sistema de seguridad puede detener los ataques en curso, y tambi\u00e9n prevenir futuros ataques. Si un atacante ha encontrado una debilidad en el PBX, \u00bfpuede contenerse el da\u00f1o o el atacante tiene un potencial ilimitado de da\u00f1o y fraude?<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12389-4\"><div class=\"fusion-panel panel-default panel-65612652df16f484c fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_65612652df16f484c\"><a aria-expanded=\"false\" aria-controls=\"65612652df16f484c\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12389-4\" data-target=\"#65612652df16f484c\" href=\"#65612652df16f484c\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Vea c\u00f3mo se compara SecAst<\/span><\/a><\/h4><\/div><div id=\"65612652df16f484c\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_65612652df16f484c\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Los firewalls tradicionales no tienen visibilidad de las actividades del PBX; una vez que una conexi\u00f3n del atacante es permitida por el firewall, entonces el atacante puede proceder sin gravar a trav\u00e9s del firewall. Fail2Ban, por otro lado, puede prohibir la direcci\u00f3n IP de un atacante si Asterisk informa de un error de esa fuente IP, de lo contrario Fail2Ban no impide el progreso de un atacante.<\/p>\n<p>SecAst tiene la capacidad de terminar las llamadas en curso (sin bloquear un IP) si detecta la actividad sospechosa. En el caso de que un atacante haya violado el sistema de seguridad Asterisk \/ generador de configuraci\u00f3n, normalmente tiene acceso sin restricciones a n\u00fameros de peaje fraudulentos y servicios premium. Sin embargo, SecAst es el \u00fanico producto que puede bloquear estas llamadas incluso si Asterisk (o por ejemplo FreePBX) se ha visto comprometido. SecAst tambi\u00e9n puede tomar medidas crecientes para proteger el PBX a medida que avanza un ataque incluso apagando los servicios de llamada para proteger el PBX.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-5 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-hands-helping fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Orquestaci\u00f3n de respuesta al ataque<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Orquestaci\u00f3n de respuesta de ataque se refiere a c\u00f3mo el sistema de seguridad puede ajustarse din\u00e1micamente a un ataque en curso y coordinar los recursos internos y externos para mitigar o detener el ataque.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12389-5\"><div class=\"fusion-panel panel-default panel-2d4688d939c83de50 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2d4688d939c83de50\"><a aria-expanded=\"false\" aria-controls=\"2d4688d939c83de50\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12389-5\" data-target=\"#2d4688d939c83de50\" href=\"#2d4688d939c83de50\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Vea c\u00f3mo se compara SecAst<\/span><\/a><\/h4><\/div><div id=\"2d4688d939c83de50\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2d4688d939c83de50\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Fail2Ban tiene solamente una capacidad de respuesta: prohibiendo la direcci\u00f3n IP de origen en el nivel PBX. Los atacantes pueden quedar con acceso a la subred interna u otros servicios en el PBX. Fail2Ban no tiene capacidad para adaptar el comportamiento PBX, notificar a otros PBX del ataque, bloquear a los usuarios en el borde de la red, etc.<\/p>\n<p>Los firewalls tradicionales ofrecen un paso adelante de Fail2Ban, ya que bloquean intr\u00ednsecamente los ataques en el borde de la red. Sin embargo, no tienen visibilidad o control del PBX. Como tal, s\u00f3lo pueden bloquear un ataque si el ataque es detectable en el nivel de tr\u00e1fico UDP\/IP.<\/p>\n<p>SecAst combina la visibilidad PBX con el control de dispositivos externos. Al detectar un ataque, SecAst puede ajustar el plan de marcado para restringir las acciones, cambiar las rutas para limitar el acceso a ciertos dispositivos, indicar al firewall en el borde de la red que tome ciertas acciones e incluso compartir la informaci\u00f3n del atacante con otras instalaciones de SecAst .<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#efefef;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":12333,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-12389","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comparaci\u00f3n - Seguridad para Asterisk - Telium<\/title>\n<meta name=\"description\" content=\"Compare las caracter\u00edsticas, la funcionalidad y el rendimiento de las soluciones de seguridad VoIP. Eval\u00fae los atributos de las tecnolog\u00edas de seguridad Asterisk m\u00e1s comunes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comparaci\u00f3n - Seguridad para Asterisk - Telium\" \/>\n<meta property=\"og:description\" content=\"Compare las caracter\u00edsticas, la funcionalidad y el rendimiento de las soluciones de seguridad VoIP. Eval\u00fae los atributos de las tecnolog\u00edas de seguridad Asterisk m\u00e1s comunes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/\" \/>\n<meta property=\"og:site_name\" content=\"Telium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T17:01:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@telium_io\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"35 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/comparacion\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/comparacion\\\/\",\"name\":\"Comparaci\u00f3n - Seguridad para Asterisk - Telium\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#website\"},\"datePublished\":\"2020-02-16T14:54:23+00:00\",\"dateModified\":\"2024-04-24T17:01:25+00:00\",\"description\":\"Compare las caracter\u00edsticas, la funcionalidad y el rendimiento de las soluciones de seguridad VoIP. Eval\u00fae los atributos de las tecnolog\u00edas de seguridad Asterisk m\u00e1s comunes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/comparacion\\\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/comparacion\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/comparacion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/telium.io\\\/es\\\/pagina-de-inicio\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad para Asterisk\",\"item\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Comparaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/telium.io\\\/es\\\/\",\"name\":\"Telium\",\"description\":\"Telefon\u00eda y Telem\u00e1tica\",\"publisher\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/telium.io\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#organization\",\"name\":\"Telium\",\"url\":\"https:\\\/\\\/telium.io\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"contentUrl\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"width\":800,\"height\":800,\"caption\":\"Telium\"},\"image\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/category\\\/Telecommunication-Company\\\/Telium-1581395458787072\\\/\",\"https:\\\/\\\/x.com\\\/telium_io\",\"https:\\\/\\\/ca.linkedin.com\\\/company\\\/telium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comparaci\u00f3n - Seguridad para Asterisk - Telium","description":"Compare las caracter\u00edsticas, la funcionalidad y el rendimiento de las soluciones de seguridad VoIP. Eval\u00fae los atributos de las tecnolog\u00edas de seguridad Asterisk m\u00e1s comunes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/","og_locale":"es_ES","og_type":"article","og_title":"Comparaci\u00f3n - Seguridad para Asterisk - Telium","og_description":"Compare las caracter\u00edsticas, la funcionalidad y el rendimiento de las soluciones de seguridad VoIP. Eval\u00fae los atributos de las tecnolog\u00edas de seguridad Asterisk m\u00e1s comunes.","og_url":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/","og_site_name":"Telium","article_publisher":"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","article_modified_time":"2024-04-24T17:01:25+00:00","twitter_card":"summary_large_image","twitter_site":"@telium_io","twitter_misc":{"Est. reading time":"35 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/","url":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/","name":"Comparaci\u00f3n - Seguridad para Asterisk - Telium","isPartOf":{"@id":"https:\/\/telium.io\/es\/#website"},"datePublished":"2020-02-16T14:54:23+00:00","dateModified":"2024-04-24T17:01:25+00:00","description":"Compare las caracter\u00edsticas, la funcionalidad y el rendimiento de las soluciones de seguridad VoIP. Eval\u00fae los atributos de las tecnolog\u00edas de seguridad Asterisk m\u00e1s comunes.","breadcrumb":{"@id":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/telium.io\/es\/pagina-de-inicio\/"},{"@type":"ListItem","position":2,"name":"Seguridad para Asterisk","item":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/"},{"@type":"ListItem","position":3,"name":"Comparaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/telium.io\/es\/#website","url":"https:\/\/telium.io\/es\/","name":"Telium","description":"Telefon\u00eda y Telem\u00e1tica","publisher":{"@id":"https:\/\/telium.io\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telium.io\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/telium.io\/es\/#organization","name":"Telium","url":"https:\/\/telium.io\/es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/telium.io\/es\/#\/schema\/logo\/image\/","url":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","contentUrl":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","width":800,"height":800,"caption":"Telium"},"image":{"@id":"https:\/\/telium.io\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","https:\/\/x.com\/telium_io","https:\/\/ca.linkedin.com\/company\/telium"]}]}},"_links":{"self":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/12389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/comments?post=12389"}],"version-history":[{"count":12,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/12389\/revisions"}],"predecessor-version":[{"id":18340,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/12389\/revisions\/18340"}],"up":[{"embeddable":true,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/12333"}],"wp:attachment":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/media?parent=12389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}