{"id":12381,"date":"2020-02-16T09:54:23","date_gmt":"2020-02-16T14:54:23","guid":{"rendered":"https:\/\/telium.io\/seguranca-para-asterisk\/comparacao\/"},"modified":"2024-04-24T12:01:26","modified_gmt":"2024-04-24T17:01:26","slug":"comparacao","status":"publish","type":"page","link":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/","title":{"rendered":"Compara\u00e7\u00e3o"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility lazyload headerheight\" style=\"--awb-background-position:right top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/banner-flying-boxes2-1024x344.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-top:125px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element fusion-image-align-left in-legacy-container\" style=\"text-align:left;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"margin-right:25px;float:left;\"><img decoding=\"async\" width=\"259\" height=\"225\" title=\"inspe\u00e7\u00e3o3\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/inspection3.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/inspection3.png\" alt class=\"lazyload img-responsive wp-image-9206\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27259%27%20height%3D%27225%27%20viewBox%3D%270%200%20259%20225%27%3E%3Crect%20width%3D%27259%27%20height%3D%27225%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/inspection3-200x174.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/inspection3.png 259w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 259px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:50px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-no-medium-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.4;\">Seguran\u00e7a para Asterisk<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-six\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h6 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.5;\">Compare o SECast com alternativas<\/h6><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns fusion-no-medium-visibility fusion-no-large-visibility lazyload\" style=\"--awb-background-position:right top;--awb-border-color:#ff6600;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-size:cover;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/banner-flying-boxes2-1024x344.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last mobileheader\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-one mobilebreadcrumb\" style=\"--awb-text-color:#cfcfcf;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.4;\">SECAST<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #cfcfcf; font-size: 150%;\">\u00bb<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-two mobilebreadcrumb\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.5;\">COMPARA\u00c7\u00c3O<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"product-tabs\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-1 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/\"><i class=\"fa-book fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Overview<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-2 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/beneficios\/\"><i class=\"fa-life-ring fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Benefits<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-3 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/\"><i class=\"fa-check-double fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Features<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-4 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/tecnologia\/\"><i class=\"fa-microchip fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Technology<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-5 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/depoimentos\/\"><i class=\"fa-bullhorn fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Testimonials<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-6 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/screenshots\/\"><i class=\"fa-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Screenshots<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-7 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/videos\/\"><i class=\"fa-video-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Videos<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-8 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/edicoes\/\"><i class=\"fa-check-circle fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Editions<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-9 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/perguntas-frequentemente-feitas\/\"><i class=\"fa-question-circle fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-large button-custom fusion-button-default button-10 fusion-button-span-no fusion-has-button-gradient cursor-default product-tab\" style=\"--button_accent_color:#fff;--button_accent_hover_color:#fff;--button_border_hover_color:#787878;--button_gradient_top_color:#ff6600;--button_gradient_bottom_color:#dd4400;--button_gradient_top_color_hover:#ff6600;--button_gradient_bottom_color_hover:#dd4400;--button_text_transform:none;\" target=\"_self\" href=\"#\"><i class=\"fa-balance-scale fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Comparison<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-11 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/download\/\"><i class=\"fa-download fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-12 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/precos-comprar-2\/\"><i class=\"fa-shopping-cart fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pricing \/ Buy<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-13 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/foruns\/\"><i class=\"fa-comment fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Forums<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-14 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/licenca\/\"><i class=\"fa-gavel fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">License<\/span><\/a><\/div><h2 style=\"color: rgba(0,0,0,0);display: inline;font-size: 0em;\">comparison<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\">\n<div class=\"panel_row panel_row_top\" style=\"background: white;\">\n  <div>\n    <table class=\"editiontable\" style=\"table-layout: fixed;\">\n      <tr class=\"edition_color_dark_grey\"><td width=\"40%\">&nbsp;<\/td>\n        <td width=\"20%\"><div align=\"center\" class=\"editioncolheader rotatedsmall\">SecAst<\/div><\/td>\n        <td width=\"20%\"><div align=\"center\" class=\"editioncolheader rotatedsmall\">Fail2Ban<\/div><\/td>\n        <td width=\"20%\"><div align=\"center\" class=\"editioncolheader rotatedsmall\">Firewall<\/div><\/td><\/tr><tr><td colspan=\"4\"><h2 class=\"editionsection\" >SIP Connection Monitoring<\/h2><\/td><tr>\n<tr style=\"background-color: #FFF;\">\n<td class=\"description\">Credentials valid<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Breached credentials<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Diffused probes<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">SIP packet structure<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr><td colspan=\"4\"><h2 class=\"editionsection\" >User Behaviour Monitoring<\/h2><\/td><tr>\n<tr style=\"background-color: #FFF;\">\n<td class=\"description\">Fraud phone number database verification<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Dialing cadence<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Simultaneous calls<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Heuristic patterns<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr><td colspan=\"4\"><h2 class=\"editionsection\" >Network Connection Monitoring<\/h2><\/td><tr>\n<tr style=\"background-color: #FFF;\">\n<td class=\"description\">Hacker database IP address verification<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">SIP data transfer rate<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Clustered connection attempts<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Geographic location<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Port connection rate<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><tr><td colspan=\"4\"><h2 class=\"editionsection\" >Attack Containment<\/h2><\/td><tr>\n<tr style=\"background-color: #efefef;\">\n<td class=\"description\">Ban IP on PBX or firewall<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Override dialplan permitted patterns<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Disconnect individual calls<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Lockdown new connections<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr><td colspan=\"4\"><h2 class=\"editionsection\" >Attack Response Orchestration<\/h2><\/td><tr>\n<tr style=\"background-color: #efefef;\">\n<td class=\"description\">Control internal firewall<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Control external firewall<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Control external router<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-adjust fas editionsymbol\"><\/i><tr style=\"background-color: #FFF;\">\n<td class=\"description\">Change dialplan<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><tr style=\"background-color: #efefef;\">\n<td class=\"description\">Share attack data with peers<\/td>\n<td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle fas editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i><td style=\"vertical-align:top\"><div align=\"center\"><i class=\"fa-circle far editionsymbol\"><\/i>    <\/table>\n  <\/div>\n<\/div>\n<!-- End of table -->\n    <table class=\"editiontable\" style=\"table-layout: fixed;\">\n      <tr class=\"edition_color_dark_grey\">\n        <td width=\"33%\"><div align=\"center\" class=\"editioncolheader\" style=\"font-size: initial;\"><i class=\"fa-circle fas editionsymbol\"><\/i> Yes\/Excellent<\/div><\/td>\n        <td width=\"33%\"><div align=\"center\" class=\"editioncolheader\" style=\"font-size: initial;\"><i class=\"fa-adjust fas editionsymbol\"><\/i> Partial\/Fair<\/div><\/td>\n        <td width=\"33%\"><div align=\"center\" class=\"editioncolheader\" style=\"font-size: initial;\"><i class=\"fa-circle far editionsymbol\"><\/i> No\/Poor<\/div><\/td>\n      <\/tr>\n    <\/table><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#efefef;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#efefef;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-5 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top:30px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.5;\">Detalhes de Compara\u00e7\u00e3o<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p>As caixas a seguir fornecem mais detalhes da avalia\u00e7\u00e3o e, clicando na seta para baixo na parte inferior de cada caixa, voc\u00ea pode ver como o SECast se compara.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-assistive-listening-systems fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Monitoramento de conex\u00e3o SIP<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>O SIP Connection Monitoring descreve se e como o sistema de seguran\u00e7a monitora o tr\u00e1fego SIP fluindo atrav\u00e9s do PBX e detecta a\u00e7\u00f5es ou informa\u00e7\u00f5es que podem aumentar o risco de fraude ou invas\u00e3o. A inspe\u00e7\u00e3o de pacotes permite que o sistema de seguran\u00e7a examine os comandos que est\u00e3o sendo emitidos e quaisquer credenciais sendo enviadas. Essas credenciais podem ser comparadas com o permitido pelo servidor Asterisk e os comandos podem ser avaliados para determinar se s\u00e3o seguros e apropriados para o tipo de conex\u00e3o. Al\u00e9m disso, a taxa em que esses comandos s\u00e3o emitidos pode ser indicativa de hacking.<\/p>\n<p>Os dados SIP s\u00e3o divididos em pacotes, e cada pacote tem uma estrutura bem definida. A inspe\u00e7\u00e3o profunda de pacotes permite que o sistema de seguran\u00e7a determine se o pacote SIP est\u00e1 mal formado e, se for o caso, de tal forma que possa explorar uma fraqueza na pilha SIP subjacente.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12381-1\"><div class=\"fusion-panel panel-default panel-ef99f4335d14c2055 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ef99f4335d14c2055\"><a aria-expanded=\"false\" aria-controls=\"ef99f4335d14c2055\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12381-1\" data-target=\"#ef99f4335d14c2055\" href=\"#ef99f4335d14c2055\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Veja como a SECast se compara<\/span><\/a><\/h4><\/div><div id=\"ef99f4335d14c2055\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ef99f4335d14c2055\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Firewalls regulares est\u00e3o alheios ao conte\u00fado do tr\u00e1fego relacionado ao VoIP e simplesmente encaminham SIP\/RTP\/IAX\/etc. da internet para o servidor Asterisk Uma completa falta de compreens\u00e3o do conte\u00fado do pacote resulta em firewalls tradicionais sendo pouco mais do que roteadores. Fail2ban n\u00e3o \u00e9 realmente um sistema de seguran\u00e7a, mas depende completamente do Asterisk para relatar uma tentativa de login falha (e fail2ban adiciona o IP de origem a uma lista de proibi\u00e7\u00e3o de iptables local).<\/p>\n<p>O SECast \u00e9 o \u00fanico produto que cria um perfil de cada usu\u00e1rio ou dispositivo conectado e garante que os comandos SIP recebidos sejam seguros e apropriados. Mesmo comandos SIP normais emitidos em frequ\u00eancias incomuns podem ser indicativos de hacking. O SECast \u00e9 o \u00fanico produto capaz de detectar tais padr\u00f5es, detectar credenciais SIP v\u00e1lidas sendo usadas indevidamente, etc.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-2 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-user-ninja fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Monitoramento do comportamento do usu\u00e1rio<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>O Monitoramento do Comportamento do Usu\u00e1rio descreve como o sistema de seguran\u00e7a monitora as a\u00e7\u00f5es do usu\u00e1rio (acima do n\u00edvel do protocolo VoIP). Os hackers procurar\u00e3o explora\u00e7\u00f5es de PBX discando n\u00fameros que n\u00e3o s\u00e3o extens\u00f5es locais nem op\u00e7\u00f5es de menu v\u00e1lidas. Eles tamb\u00e9m podem discar n\u00fameros de telefone a uma taxa n\u00e3o poss\u00edvel por um ser humano.<\/p>\n<p>Uma vez que os atacantes encontram uma fraqueza no PBX, eles normalmente o exploram rapidamente para maximizar seu retorno financeiro antes que a fraqueza seja detectada ou fechada. Um aumento repentino no n\u00famero de chamadas de uma extens\u00e3o ou para um n\u00famero espec\u00edfico, pode indicar hacking. Al\u00e9m disso, a seq\u00fc\u00eancia de atividades que um usu\u00e1rio realiza pode ser at\u00edpica para o uso normal do PBX e pode indicar hacking.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12381-2\"><div class=\"fusion-panel panel-default panel-760ed67f573034726 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_760ed67f573034726\"><a aria-expanded=\"false\" aria-controls=\"760ed67f573034726\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12381-2\" data-target=\"#760ed67f573034726\" href=\"#760ed67f573034726\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Veja como SecAst compara<\/span><\/a><\/h4><\/div><div id=\"760ed67f573034726\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_760ed67f573034726\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Firewalls tradicionais n\u00e3o monitoram o comportamento no n\u00edvel do usu\u00e1rio e simplesmente passam pacotes relacionados ao VoIP para frente e para tr\u00e1s. Fail2Ban tamb\u00e9m n\u00e3o tem visibilidade sobre o comportamento do usu\u00e1rio (apenas erros relatados pelo Asterisk podem ser acionados pelo Fail2Ban).<\/p>\n<p>SecAst \u00e9 o \u00fanico produto que monitora o comportamento de cada usu\u00e1rio (e, de fato, cada dispositivo) e cria uma pontua\u00e7\u00e3o de risco baseada no comportamento do usu\u00e1rio combinado com outros fatores. Embora uma a\u00e7\u00e3o por si s\u00f3 possa n\u00e3o ser suficiente para identificar uma tentativa de hacking, a combina\u00e7\u00e3o de a\u00e7\u00f5es detectadas pela SecAst permite que ele detecte e interrompa o hacking antes que o invasor possa causar muito dano (ou gerar acusa\u00e7\u00f5es maci\u00e7as de fraude em sua conta da operadora).<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-3 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-network-wired fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Monitoramento de conex\u00e3o de rede<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>O Monitoramento de Conex\u00e3o de Rede refere-se ao rastreamento do tr\u00e1fego VoIP no n\u00edvel da rede. Uma vez que todo o tr\u00e1fego VoIP se move sobre UDP\/IP, a detec\u00e7\u00e3o de pacotes relacionados a UDP\/IP incomuns pode ajudar a identificar comportamentos suspeitos. Os protocolos UDP e IP tamb\u00e9m fornecem informa\u00e7\u00f5es consider\u00e1veis sobre a origem da conex\u00e3o\/ataque e sua natureza.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12381-3\"><div class=\"fusion-panel panel-default panel-3cfeed78bbabb1a13 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_3cfeed78bbabb1a13\"><a aria-expanded=\"false\" aria-controls=\"3cfeed78bbabb1a13\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12381-3\" data-target=\"#3cfeed78bbabb1a13\" href=\"#3cfeed78bbabb1a13\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Veja como SecAst compara<\/span><\/a><\/h4><\/div><div id=\"3cfeed78bbabb1a13\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_3cfeed78bbabb1a13\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Fail2Ban n\u00e3o tem visibilidade no n\u00edvel de conex\u00e3o de rede; ele s\u00f3 pode responder a mensagens de erro da Asterisk. Firewalls tradicionais, por outro lado, se destacam nesta \u00e1rea, pois monitorar o tr\u00e1fego de n\u00edvel UDP e IP \u00e9 o que eles foram projetados para fazer. A \u00fanica fraqueza dos firewalls tradicionais \u00e9 que eles n\u00e3o est\u00e3o cientes de padr\u00f5es e fontes de hacking espec\u00edfico do VoIP.<\/p>\n<p>SecAst combina informa\u00e7\u00f5es de tr\u00e1fego de alto n\u00edvel (usu\u00e1rio e SIP) com informa\u00e7\u00f5es de tr\u00e1fego de baixo n\u00edvel (UDP\/IP) para fornecer sensibilidade incompar\u00e1vel \u00e0s tentativas de hackers no n\u00edvel da rede. SecAst tamb\u00e9m usa bancos de dados de endere\u00e7os IP de hackers conhecidos para bloquear tentativas de conex\u00e3o antes mesmo que o invasor tenha a chance de se comunicar com o PBX.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-4 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-box fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Conten\u00e7\u00e3o de ataque<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Conten\u00e7\u00e3o de ataques refere-se ao qu\u00e3o bem o sistema de seguran\u00e7a pode parar ataques em andamento e tamb\u00e9m prevenir ataques futuros. Se um invasor encontrou uma fraqueza no PBX, o dano pode ser contido ou o invasor tem potencial ilimitado para danos e fraudes?<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12381-4\"><div class=\"fusion-panel panel-default panel-c7c8c1fc40fdaa5d4 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_c7c8c1fc40fdaa5d4\"><a aria-expanded=\"false\" aria-controls=\"c7c8c1fc40fdaa5d4\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12381-4\" data-target=\"#c7c8c1fc40fdaa5d4\" href=\"#c7c8c1fc40fdaa5d4\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Veja como SecAst compara<\/span><\/a><\/h4><\/div><div id=\"c7c8c1fc40fdaa5d4\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_c7c8c1fc40fdaa5d4\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Firewalls tradicionais n\u00e3o t\u00eam visibilidade sobre as atividades do PBX; uma vez que uma conex\u00e3o do invasor \u00e9 permitida pelo firewall, ent\u00e3o o invasor pode continuar livre atrav\u00e9s do firewall. Fail2Ban, por outro lado, pode proibir o endere\u00e7o IP de um invasor se Asterisk relatar um erro dessa fonte IP, caso contr\u00e1rio, fail2Ban n\u00e3o impede o progresso de um invasor.<\/p>\n<p>SecAst tem a capacidade de encerrar chamadas em andamento (sem bloquear um IP) se detectar atividade suspeita. No caso em que um invasor violou o sistema de seguran\u00e7a do gerador Asterisk ele normalmente tem acesso irrestrito a n\u00fameros de ped\u00e1gio fraudulentos e servi\u00e7os premium. No entanto, SecAst \u00e9 o \u00fanico produto que pode bloquear essas chamadas mesmo que Asterisk (ou por exemplo, FreePBX) tenha sido comprometido. SecAst tamb\u00e9m pode tomar medidas crescentes para proteger o PBX \u00e0 medida que um ataque progride at\u00e9 mesmo desligando servi\u00e7os de chamada para proteger o PBX.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#000000;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-5 content-boxes-icon-on-top content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#9e9e9e;--awb-circle-hover-accent-color:#9e9e9e;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:transparent;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:rgba(255,170,6,0.1);border-width:0px;background-color:#ff6600;box-sizing:content-box;height:64px;width:64px;line-height:64px;border-radius:100%;font-size:32px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-hands-helping fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:1.5;\">Orquestra\u00e7\u00e3o de resposta de ataque<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Attack Response Orchestration refere-se a como o sistema de seguran\u00e7a pode se ajustar dinamicamente a um ataque em andamento e coordenar recursos internos e externos para mitigar ou parar o ataque.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"accordian fusion-accordian roundedbox5px\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:#4f4f4f;--awb-border-color:#000000;--awb-background-color:#4f4f4f;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-12381-5\"><div class=\"fusion-panel panel-default panel-3cf459af085f6a137 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_3cf459af085f6a137\"><a aria-expanded=\"false\" aria-controls=\"3cf459af085f6a137\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12381-5\" data-target=\"#3cf459af085f6a137\" href=\"#3cf459af085f6a137\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Veja como SecAst compara<\/span><\/a><\/h4><\/div><div id=\"3cf459af085f6a137\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_3cf459af085f6a137\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Fail2Ban tem apenas um recurso de resposta: banir o endere\u00e7o IP de origem no n\u00edvel PBX. Os atacantes podem ficar com acesso \u00e0 sub-rede interna ou outros servi\u00e7os no PBX. Fail2Ban n\u00e3o tem capacidade de adaptar o comportamento do PBX, notificar outros PBX&#8217;s do ataque, bloquear usu\u00e1rios na borda da rede, etc.<\/p>\n<p>Firewalls tradicionais oferecem um aumento do Fail2Ban, pois eles bloqueiam inerentemente ataques na borda da rede. No entanto, eles n\u00e3o t\u00eam visibilidade ou controle do PBX. Como tal, eles s\u00f3 podem bloquear um ataque se o ataque for detect\u00e1vel no n\u00edvel de tr\u00e1fego UDP\/IP.<\/p>\n<p>SecAst combina a visibilidade do PBX com o controle de dispositivos externos. Ao detectar um ataque, o SecAst pode ajustar o plano de discagem para restringir a\u00e7\u00f5es, alterar rotas para limitar o acesso a determinados dispositivos, instruir o firewall na borda da rede a tomar certas a\u00e7\u00f5es e at\u00e9 mesmo compartilhar as informa\u00e7\u00f5es do invasor com outras instala\u00e7\u00f5es SecAst<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#efefef;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":12328,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-12381","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compara\u00e7\u00e3o - Seguran\u00e7a para Asterisk - Telium<\/title>\n<meta name=\"description\" content=\"Compare os recursos, funcionalidade e desempenho das solu\u00e7\u00f5es de seguran\u00e7a VoIP. Avalie os atributos das tecnologias de seguran\u00e7a Asterisk mais comuns.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compara\u00e7\u00e3o - Seguran\u00e7a para Asterisk - Telium\" \/>\n<meta property=\"og:description\" content=\"Compare os recursos, funcionalidade e desempenho das solu\u00e7\u00f5es de seguran\u00e7a VoIP. Avalie os atributos das tecnologias de seguran\u00e7a Asterisk mais comuns.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/\" \/>\n<meta property=\"og:site_name\" content=\"Telium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T17:01:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@telium_io\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"35 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/comparacao\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/comparacao\\\/\",\"name\":\"Compara\u00e7\u00e3o - Seguran\u00e7a para Asterisk - Telium\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#website\"},\"datePublished\":\"2020-02-16T14:54:23+00:00\",\"dateModified\":\"2024-04-24T17:01:26+00:00\",\"description\":\"Compare os recursos, funcionalidade e desempenho das solu\u00e7\u00f5es de seguran\u00e7a VoIP. Avalie os atributos das tecnologias de seguran\u00e7a Asterisk mais comuns.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/comparacao\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/comparacao\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/comparacao\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/pagina-inicial\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a para Asterisk\",\"item\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Compara\u00e7\u00e3o\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/\",\"name\":\"Telium\",\"description\":\"Telefonia e Telem\u00e1tica\",\"publisher\":{\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#organization\",\"name\":\"Telium\",\"url\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"contentUrl\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"width\":800,\"height\":800,\"caption\":\"Telium\"},\"image\":{\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/category\\\/Telecommunication-Company\\\/Telium-1581395458787072\\\/\",\"https:\\\/\\\/x.com\\\/telium_io\",\"https:\\\/\\\/ca.linkedin.com\\\/company\\\/telium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compara\u00e7\u00e3o - Seguran\u00e7a para Asterisk - Telium","description":"Compare os recursos, funcionalidade e desempenho das solu\u00e7\u00f5es de seguran\u00e7a VoIP. Avalie os atributos das tecnologias de seguran\u00e7a Asterisk mais comuns.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/","og_locale":"pt_BR","og_type":"article","og_title":"Compara\u00e7\u00e3o - Seguran\u00e7a para Asterisk - Telium","og_description":"Compare os recursos, funcionalidade e desempenho das solu\u00e7\u00f5es de seguran\u00e7a VoIP. Avalie os atributos das tecnologias de seguran\u00e7a Asterisk mais comuns.","og_url":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/","og_site_name":"Telium","article_publisher":"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","article_modified_time":"2024-04-24T17:01:26+00:00","twitter_card":"summary_large_image","twitter_site":"@telium_io","twitter_misc":{"Est. reading time":"35 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/","url":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/","name":"Compara\u00e7\u00e3o - Seguran\u00e7a para Asterisk - Telium","isPartOf":{"@id":"https:\/\/telium.io\/pt-br\/#website"},"datePublished":"2020-02-16T14:54:23+00:00","dateModified":"2024-04-24T17:01:26+00:00","description":"Compare os recursos, funcionalidade e desempenho das solu\u00e7\u00f5es de seguran\u00e7a VoIP. Avalie os atributos das tecnologias de seguran\u00e7a Asterisk mais comuns.","breadcrumb":{"@id":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/telium.io\/pt-br\/pagina-inicial\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a para Asterisk","item":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/"},{"@type":"ListItem","position":3,"name":"Compara\u00e7\u00e3o"}]},{"@type":"WebSite","@id":"https:\/\/telium.io\/pt-br\/#website","url":"https:\/\/telium.io\/pt-br\/","name":"Telium","description":"Telefonia e Telem\u00e1tica","publisher":{"@id":"https:\/\/telium.io\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telium.io\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/telium.io\/pt-br\/#organization","name":"Telium","url":"https:\/\/telium.io\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/telium.io\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","contentUrl":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","width":800,"height":800,"caption":"Telium"},"image":{"@id":"https:\/\/telium.io\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","https:\/\/x.com\/telium_io","https:\/\/ca.linkedin.com\/company\/telium"]}]}},"_links":{"self":[{"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages\/12381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/comments?post=12381"}],"version-history":[{"count":8,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages\/12381\/revisions"}],"predecessor-version":[{"id":18342,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages\/12381\/revisions\/18342"}],"up":[{"embeddable":true,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages\/12328"}],"wp:attachment":[{"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/media?parent=12381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}