{"id":12471,"date":"2020-02-14T21:07:13","date_gmt":"2020-02-15T02:07:13","guid":{"rendered":"https:\/\/telium.io\/seguridad-para-asterisk\/funciones\/"},"modified":"2024-04-24T11:58:26","modified_gmt":"2024-04-24T16:58:26","slug":"funciones","status":"publish","type":"page","link":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/","title":{"rendered":"Funciones"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility lazyload headerheight\" style=\"--awb-background-position:right center;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-top:125px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"299\" height=\"225\" title=\"tel\u00e9fono-dentro de la pared3\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3.png\" alt class=\"lazyload img-responsive wp-image-11068\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27299%27%20height%3D%27225%27%20viewBox%3D%270%200%20299%20225%27%3E%3Crect%20width%3D%27299%27%20height%3D%27225%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3-200x151.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3.png 299w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 299px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:50px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-no-medium-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.4;\">Seguridad para Asterisk<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-six\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h6 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.5;\"><pre>Comprehensive protection and defense against PBX hacking and fraud<\/pre><\/h6><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns fusion-no-medium-visibility fusion-no-large-visibility lazyload\" style=\"--awb-background-position:left top;--awb-border-color:#ff6600;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-size:cover;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last mobileheader\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-one mobilebreadcrumb\" style=\"--awb-text-color:#cfcfcf;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.4;\">SECAST<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #cfcfcf; font-size: 150%;\">\u00bb<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-two mobilebreadcrumb\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.5;\">FUNCIONES<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"product-tabs\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-1 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/\"><i class=\"fa-book fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Overview<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-2 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/ventajas\/\"><i class=\"fa-life-ring fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Benefits<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-large button-custom fusion-button-default button-3 fusion-button-span-no fusion-has-button-gradient cursor-default product-tab\" style=\"--button_accent_color:#fff;--button_accent_hover_color:#fff;--button_border_hover_color:#787878;--button_gradient_top_color:#ff6600;--button_gradient_bottom_color:#dd4400;--button_gradient_top_color_hover:#ff6600;--button_gradient_bottom_color_hover:#dd4400;--button_text_transform:none;\" target=\"_self\" href=\"#\"><i class=\"fa-check-double fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Features<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-4 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/tecnologia\/\"><i class=\"fa-microchip fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Technology<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-5 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/testimonios\/\"><i class=\"fa-bullhorn fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Testimonials<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-6 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/imagenes\/\"><i class=\"fa-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Screenshots<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-7 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/videos\/\"><i class=\"fa-video-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Videos<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-8 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/ediciones\/\"><i class=\"fa-check-circle fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Editions<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-9 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/preguntas-frecuentes\/\"><i class=\"fa-question-circle fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-10 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/comparacion\/\"><i class=\"fa-balance-scale fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Comparison<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-11 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/descargar\/\"><i class=\"fa-download fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-12 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/precios-comprar-2\/\"><i class=\"fa-shopping-cart fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pricing \/ Buy<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-13 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/foros\/\"><i class=\"fa-comment fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Forums<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-14 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/licencia\/\"><i class=\"fa-gavel fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">License<\/span><\/a><\/div><h2 style=\"color: rgba(0,0,0,0);display: inline;font-size: 0em;\">features<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-16 fusion-content-boxes-1 content-boxes-clean-horizontal content-left content-boxes-icon-on-side\" style=\"--awb-backgroundcolor:#efefef;--awb-hover-accent-color:#ff6600;--awb-circle-hover-accent-color:#ff6600;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-phone-numbers.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Base de Datos de N\u00fameros de Tel\u00e9fono de Fraude<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst puede comprobar cada n\u00famero de tel\u00e9fono marcado contra una base de datos de n\u00fameros de tel\u00e9fono que se sabe que est\u00e1n involucrados en actividades de fraude (y pirater\u00eda). Las llamadas sospechosas de ser fraudulentas se pueden desconectar autom\u00e1ticamente y\/o los dispositivos de origen se pueden bloquear de la conexi\u00f3n con el PBX. SecAst tambi\u00e9n puede tratar la tarifa premium y los n\u00fameros de costo compartido de manera diferente, ayudando a evitar llamadas a exploits de n\u00fameros de tel\u00e9fono de fraude de d\u00eda cero. La base de datos de fraude de Teliumse ha desarrollado a lo largo de muchos a\u00f1os y es una de las herramientas de prevenci\u00f3n de fraude m\u00e1s grandes y completas disponibles tanto para los transportistas como para los usuarios finales.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-ip-address.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Base de Datos de Direcciones IP de Hackers<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst puede comprobar la direcci\u00f3n IP de origen de cada dispositivo\/agente de usuario que se conecta a la PBX contra una base de datos de direcciones IP conocidas por ser utilizadas en actividades de pirater\u00eda (y fraude). SecAst tambi\u00e9n puede tratar direcciones cercanas (que pueden ser utilizadas por el mismo hacker) como sospechosas y evaluarlas en funci\u00f3n de sus vecinos. Los dispositivos sospechosos de estar involucrados en la pirater\u00eda pueden ser impedidos de hacer llamadas y \/ o bloqueados de conectarse a la PBX. La base de datos de direcciones IP de hackers de Teliumse ha desarrollado a lo largo de muchos a\u00f1os y es una de las herramientas de prevenci\u00f3n de intrusiones espec\u00edficas de PBX m\u00e1s grandes y completas disponibles tanto para los operadores como para los usuarios finales.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-location.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Base de datos de direcciones IP geogr\u00e1ficas<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst incorpora una base de datos de direcciones IPv4 e IPv6 de todo el mundo, incluyendo el continente \/ pa\u00eds \/ regi\u00f3n \/ ciudad de cada IP. SecAst se puede configurar para permitir o denegar el acceso a cualquier combinaci\u00f3n de estos atributos geogr\u00e1ficos (as\u00ed como un comportamiento predeterminado de &#8220;permitir \/ denegar&#8221;). Si un atacante intenta acceder al servidor Asterisk desde una ubicaci\u00f3n denegada, el usuario se desconecta inmediatamente. Esto crea una cerca geogr\u00e1fica (o geocerca) que mantiene a los buenos dentro y a los malos fuera.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-breached-credentials.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Detecci\u00f3n de ataques de credenciales violadas<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst puede detectar patrones inusuales de tr\u00e1fico y uso indicativos de credenciales que han sido violadas (filtradas o de alguna manera descubiertas por un atacante). Esto incluye monitorear el n\u00famero de llamadas en curso, la rapidez con la que se configuran las llamadas, incluso la velocidad a la cual el usuario est\u00e1 marcando los d\u00edgitos. SecAst puede responder a estas actividades sospechosas bloqueando al usuario en el nivel de red y evitando cualquier otro exploit. Estos bloques pueden durar horas, d\u00edas o indefinidamente.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-heuristic-brain.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Detecci\u00f3n de ataques heur\u00edsticos<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst puede aprender nuevos patrones de ataque y ajustar su detecci\u00f3n y defensas en consecuencia. El analizador heur\u00edstico supervisa una variedad de patrones de tr\u00e1fico de red y Asterisk para detectar actividad sospechosa, correlacionarlos con reglas que indican una actividad probable del atacante y, a continuaci\u00f3n, bloquear al atacante a nivel de red evitando cualquier otro intento. Estos bloques pueden durar horas, d\u00edas o indefinidamente.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-6 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-moving-ip.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Detecci\u00f3n de Ataques IP en Movimiento<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst puede detectar ataques de hackers que cambian constantemente y r\u00e1pidamente las direcciones IP. Los hackers profesionales ahora est\u00e1n moviendo sus direcciones IP a trav\u00e9s de grandes rangos de direcciones IP desde nubes, servicios VPN, subredes grandes, etc. para evitar la detecci\u00f3n por herramientas simplistas como fail2ban o firewalls regulares. SecAst integra una colecci\u00f3n diversa de puntos de datos para permitir la detecci\u00f3n de hackers en el instante en que se conectan a la PBX desde una nueva direcci\u00f3n IP.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-7 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-brute-force.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Detecci\u00f3n de ataques de fuerza bruta<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst puede detectar ataques de fuerza bruta (intentos de obtener acceso probando varias combinaciones de nombres de usuario \/ contrase\u00f1as, extensiones de uso com\u00fan, contrase\u00f1as de uso com\u00fan, etc.). A diferencia de otros productos, SecAst puede detectar estos ataques incluso si se propagan a lo largo de muchos d\u00edas (los atacantes ahora est\u00e1n realizando ataques &#8220;delgados&#8221; para eludir los programas de detecci\u00f3n simplista como fail2ban) y muchas direcciones IP. SecAst puede responder a estos ataques bloque\u00e1ndolos a nivel de red y evitando cualquier otro intento. Estos bloques pueden durar horas, d\u00edas o indefinidamente.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-8 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-dial-pattern.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Protecci\u00f3n contra anulaci\u00f3n de Plan de Marcado<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst monitorea todos los d\u00edgitos que se marcan y puede bloquear los intentos de llamar a n\u00fameros restringidos o marcar otros patrones. Aunque los planes de marcado tambi\u00e9n realizan esta funci\u00f3n, si un servidor de Asterisk (por ejemplo: FreePBX\u00ae GUI hackeado) entonces SecAst anular\u00e1 el plan de marcado y todav\u00eda bloquear\u00e1 o aceptar\u00e1 solamente ciertos n\u00fameros. El reconocimiento del patr\u00f3n de marcado puede hacer juego cualquier cadena de marcado y permitir o bloquear el intento de marcado basado en las reglas definidas por el administrador.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-9 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-trunk-endpoints.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Trunk y Endpoint Trust<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst se puede instruir para confiar en troncos, puntos finales (usuarios o tel\u00e9fonos) determinados, y direcciones IP de modo que est\u00e9n exentos de la detecci\u00f3n de seguridad. Esto permite a los administradores conceder acceso a usuarios o dispositivos concretos independientemente de la ubicaci\u00f3n, los vol\u00famenes de llamadas, etc. (que pueden ser necesarios para el personal de ventas itinerantes, los marcadores autom\u00e1ticos, etc.). Esto tambi\u00e9n permite a los administradores designar ciertos trunks\/rutas como confiables y otros como no confiables.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-10 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-threat-level.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Respuesta al nivel de amenaza<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst supervisa el n\u00famero y la velocidad de los ataques contra el servidor Asterisk y basado en los umbrales definidos por el administrador mantiene un nivel de amenaza general que enfrenta el PBX. Los cambios en el nivel de amenaza pueden desencadenar scripts personalizados, notificaciones y otras respuestas basadas en el sistema. El nivel de amenaza se integra directamente con el sistema de controlador de eventos como se indica a continuaci\u00f3n.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-11 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-external-firewall.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Control de cortafuegos externo<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Aunque SecAst puede bloquear hackers directamente en el PBX si es necesario, SecAst puede bloquear a los hackers en un firewall en el borde de la red. SecAst puede interactuar directamente con pr\u00e1cticamente cualquier firewall externo, orden\u00e1ndolo para agregar reglas para bloquear direcciones IP, eliminar direcciones IP bloqueadas, etc. utilizando el sistema de controlador de eventos que se describe a continuaci\u00f3n. (Para mitigar el riesgo general de pirater\u00eda, los entornos PBX comerciales siempre deben bloquear a los atacantes en el borde de la red.)<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-12 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-event-handler.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Sistema de controlador de eventos<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Una caracter\u00edstica que hace que SecAst sea flexible y eficaz es el sistema de controlador de eventos, que permite a los administradores enlazar cualquier programa\/script en eventos generados o detectados por SecAst. Por ejemplo, los eventos relacionados con un ataque permiten a los administradores automatizar los cambios en firewalls, enrutadores, puntos de conexi\u00f3n SIP, reglas de plan de marcado, extensiones accesibles, etc.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-13 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-telnet-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interfaz Telnet<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Los administradores se sienten inmediatamente c\u00f3modos con la interfaz telnet simple y potente a SecAst. Toda la seguridad PBX se puede administrar y controlar desde una interfaz telnet, ya sea desde un PC, una tableta o un tel\u00e9fono celular. La interfaz incluye ayuda en l\u00ednea y salida de terminal f\u00e1cil de usar y rica.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-14 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-web-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interfaz del Navegador<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Los administradores experimentados y los principiantes por igual se sienten c\u00f3modos con la interfaz de navegador simple y potente (web) a SecAst. La seguridad se puede supervisar desde cualquier navegador, incluyendo un PC, una tableta o un tel\u00e9fono celular. La interfaz proporciona detalles de ataques, nivel de amenaza, mapas de origen de ataques y mucho m\u00e1s.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-15 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-socket-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interfaces Socket, PHP y ReST<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Los desarrolladores apreciar\u00e1n las interfaces socket, PHP y REST (Representational State Transfer) a SecAst, ya que la potencia y el control de SecAst se pueden ampliar e integrar f\u00e1cilmente con otras herramientas de administraci\u00f3n y monitoreo del sistema. El paquete de descarga incluye c\u00f3digo de ejemplo que muestra c\u00f3mo extraer datos y controlar SecAst a trav\u00e9s de un servicio web, a trav\u00e9s de una clase PHP y a trav\u00e9s de la interfaz de socket.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-16 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-asterisk-versions.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Asterisk Compatibilidad<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst es compatible con una amplia gama de versiones y distribuciones de Asterisk SecAst funciona con las versiones 1.4 a 16 de Asterisk tanto de 32 bits como de 64 bits. SecAst es compatible con una amplia gama de distribuciones Asterisk\u00ae incluyendo Asteriskde Digium, FreePBX\u00ae, PBX In A Flash\u00ae, TrixBox\u00ae, Elastix\u00ae, Issabel\u00ae, xCALLY Motion\u00ae, Thirdlane\u00ae, Genesis ISS\u00ae y m\u00e1s.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":12333,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-12471","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Funciones - Seguridad para Asterisk - Telium<\/title>\n<meta name=\"description\" content=\"Revise una lista de las principales caracter\u00edsticas que ofrece Security for Asterisk (SECast). Desde la detecci\u00f3n de fraudes y hackeos hasta el bloqueo de atacantes en el borde de la red.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Funciones - Seguridad para Asterisk - Telium\" \/>\n<meta property=\"og:description\" content=\"Revise una lista de las principales caracter\u00edsticas que ofrece Security for Asterisk (SECast). Desde la detecci\u00f3n de fraudes y hackeos hasta el bloqueo de atacantes en el borde de la red.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/\" \/>\n<meta property=\"og:site_name\" content=\"Telium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T16:58:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@telium_io\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/funciones\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/funciones\\\/\",\"name\":\"Funciones - Seguridad para Asterisk - Telium\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#website\"},\"datePublished\":\"2020-02-15T02:07:13+00:00\",\"dateModified\":\"2024-04-24T16:58:26+00:00\",\"description\":\"Revise una lista de las principales caracter\u00edsticas que ofrece Security for Asterisk (SECast). Desde la detecci\u00f3n de fraudes y hackeos hasta el bloqueo de atacantes en el borde de la red.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/funciones\\\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/funciones\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/funciones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/telium.io\\\/es\\\/pagina-de-inicio\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad para Asterisk\",\"item\":\"https:\\\/\\\/telium.io\\\/es\\\/seguridad-para-asterisk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Funciones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/telium.io\\\/es\\\/\",\"name\":\"Telium\",\"description\":\"Telefon\u00eda y Telem\u00e1tica\",\"publisher\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/telium.io\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#organization\",\"name\":\"Telium\",\"url\":\"https:\\\/\\\/telium.io\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"contentUrl\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"width\":800,\"height\":800,\"caption\":\"Telium\"},\"image\":{\"@id\":\"https:\\\/\\\/telium.io\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/category\\\/Telecommunication-Company\\\/Telium-1581395458787072\\\/\",\"https:\\\/\\\/x.com\\\/telium_io\",\"https:\\\/\\\/ca.linkedin.com\\\/company\\\/telium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Funciones - Seguridad para Asterisk - Telium","description":"Revise una lista de las principales caracter\u00edsticas que ofrece Security for Asterisk (SECast). Desde la detecci\u00f3n de fraudes y hackeos hasta el bloqueo de atacantes en el borde de la red.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/","og_locale":"es_ES","og_type":"article","og_title":"Funciones - Seguridad para Asterisk - Telium","og_description":"Revise una lista de las principales caracter\u00edsticas que ofrece Security for Asterisk (SECast). Desde la detecci\u00f3n de fraudes y hackeos hasta el bloqueo de atacantes en el borde de la red.","og_url":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/","og_site_name":"Telium","article_publisher":"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","article_modified_time":"2024-04-24T16:58:26+00:00","twitter_card":"summary_large_image","twitter_site":"@telium_io","twitter_misc":{"Est. reading time":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/","url":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/","name":"Funciones - Seguridad para Asterisk - Telium","isPartOf":{"@id":"https:\/\/telium.io\/es\/#website"},"datePublished":"2020-02-15T02:07:13+00:00","dateModified":"2024-04-24T16:58:26+00:00","description":"Revise una lista de las principales caracter\u00edsticas que ofrece Security for Asterisk (SECast). Desde la detecci\u00f3n de fraudes y hackeos hasta el bloqueo de atacantes en el borde de la red.","breadcrumb":{"@id":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/funciones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/telium.io\/es\/pagina-de-inicio\/"},{"@type":"ListItem","position":2,"name":"Seguridad para Asterisk","item":"https:\/\/telium.io\/es\/seguridad-para-asterisk\/"},{"@type":"ListItem","position":3,"name":"Funciones"}]},{"@type":"WebSite","@id":"https:\/\/telium.io\/es\/#website","url":"https:\/\/telium.io\/es\/","name":"Telium","description":"Telefon\u00eda y Telem\u00e1tica","publisher":{"@id":"https:\/\/telium.io\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telium.io\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/telium.io\/es\/#organization","name":"Telium","url":"https:\/\/telium.io\/es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/telium.io\/es\/#\/schema\/logo\/image\/","url":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","contentUrl":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","width":800,"height":800,"caption":"Telium"},"image":{"@id":"https:\/\/telium.io\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","https:\/\/x.com\/telium_io","https:\/\/ca.linkedin.com\/company\/telium"]}]}},"_links":{"self":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/12471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/comments?post=12471"}],"version-history":[{"count":15,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/12471\/revisions"}],"predecessor-version":[{"id":18127,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/12471\/revisions\/18127"}],"up":[{"embeddable":true,"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/pages\/12333"}],"wp:attachment":[{"href":"https:\/\/telium.io\/es\/wp-json\/wp\/v2\/media?parent=12471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}