{"id":12463,"date":"2020-02-14T21:07:13","date_gmt":"2020-02-15T02:07:13","guid":{"rendered":"https:\/\/telium.io\/seguranca-para-asterisk\/caracteristicas\/"},"modified":"2024-04-24T11:58:27","modified_gmt":"2024-04-24T16:58:27","slug":"caracteristicas","status":"publish","type":"page","link":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/","title":{"rendered":"Caracter\u00edsticas"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility lazyload headerheight\" style=\"--awb-background-position:right center;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-top:125px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"299\" height=\"225\" title=\"telefone-dentro-wall3\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3.png\" alt class=\"lazyload img-responsive wp-image-11067\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27299%27%20height%3D%27225%27%20viewBox%3D%270%200%20299%20225%27%3E%3Crect%20width%3D%27299%27%20height%3D%27225%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3-200x151.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/phone-inside-wall3.png 299w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 299px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:50px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-no-medium-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.4;\">Seguran\u00e7a para Asterisk<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-six\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h6 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.5;\"><pre>Comprehensive protection and defense against PBX hacking and fraud<\/pre><\/h6><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns fusion-no-medium-visibility fusion-no-large-visibility lazyload\" style=\"--awb-background-position:left top;--awb-border-color:#ff6600;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-size:cover;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-checkboxes.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last mobileheader\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-one mobilebreadcrumb\" style=\"--awb-text-color:#cfcfcf;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.4;\">SECAST<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #cfcfcf; font-size: 150%;\">\u00bb<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-two mobilebreadcrumb\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.5;\">CARACTERISTICAS<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"product-tabs\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-1 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/\"><i class=\"fa-book fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Overview<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-2 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/beneficios\/\"><i class=\"fa-life-ring fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Benefits<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-large button-custom fusion-button-default button-3 fusion-button-span-no fusion-has-button-gradient cursor-default product-tab\" style=\"--button_accent_color:#fff;--button_accent_hover_color:#fff;--button_border_hover_color:#787878;--button_gradient_top_color:#ff6600;--button_gradient_bottom_color:#dd4400;--button_gradient_top_color_hover:#ff6600;--button_gradient_bottom_color_hover:#dd4400;--button_text_transform:none;\" target=\"_self\" href=\"#\"><i class=\"fa-check-double fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Features<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-4 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/tecnologia\/\"><i class=\"fa-microchip fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Technology<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-5 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/depoimentos\/\"><i class=\"fa-bullhorn fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Testimonials<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-6 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/screenshots\/\"><i class=\"fa-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Screenshots<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-7 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/videos\/\"><i class=\"fa-video-camera fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Videos<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-8 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/edicoes\/\"><i class=\"fa-check-circle fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Editions<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-9 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/perguntas-frequentemente-feitas\/\"><i class=\"fa-question-circle fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-10 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/comparacao\/\"><i class=\"fa-balance-scale fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Comparison<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-11 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/download\/\"><i class=\"fa-download fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-12 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/precos-comprar-2\/\"><i class=\"fa-shopping-cart fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pricing \/ Buy<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-13 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/foruns\/\"><i class=\"fa-comment fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Forums<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-14 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/licenca\/\"><i class=\"fa-gavel fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">License<\/span><\/a><\/div><h2 style=\"color: rgba(0,0,0,0);display: inline;font-size: 0em;\">features<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-16 fusion-content-boxes-1 content-boxes-clean-horizontal content-left content-boxes-icon-on-side\" style=\"--awb-backgroundcolor:#efefef;--awb-hover-accent-color:#ff6600;--awb-circle-hover-accent-color:#ff6600;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-phone-numbers.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Banco de Dados de N\u00famero de Telefone de Fraude<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst pode verificar todos os n\u00fameros de telefone discados em um banco de dados de n\u00fameros de telefone conhecidos por estarem envolvidos em atividades de fraude (e hacking). Chamadas suspeitas de fraude podem ser automaticamente desconectadas e\/ou dispositivos de origem podem ser bloqueados de conex\u00e3o ao PBX. SecAst tamb\u00e9m pode tratar a taxa premium e os n\u00fameros de custos compartilhados de forma diferente, ajudando a evitar chamadas para explora\u00e7\u00f5es de n\u00famero de telefone de fraude de zero-dia. O banco de dados de fraudes da Teliumfoi desenvolvido ao longo de muitos anos e \u00e9 uma das maiores e mais abrangentes ferramentas de preven\u00e7\u00e3o de fraudes dispon\u00edveis para as operadoras e usu\u00e1rios finais.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-ip-address.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Banco de Dados de Endere\u00e7os IP do Hacker<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst pode verificar o endere\u00e7o IP de origem de cada dispositivo\/agente de usu\u00e1rio conectado ao PBX em um banco de dados de endere\u00e7os IP conhecidos por serem usados em atividades de hackers (e fraudes). SecAst tamb\u00e9m pode tratar endere\u00e7os pr\u00f3ximos (que podem ser usados pelo mesmo hacker) como suspeitos e avali\u00e1-los com base em seus vizinhos. Dispositivos suspeitos de estarem envolvidos em hacking podem ser impedidos de fazer chamadas e\/ou impedidos de se conectar ao PBX. O banco de dados de endere\u00e7os IP de hackers da Teliumfoi desenvolvido ao longo de muitos anos e \u00e9 uma das maiores e mais abrangentes ferramentas espec\u00edficas de preven\u00e7\u00e3o de intrus\u00f5es PBX dispon\u00edveis para operadoras e usu\u00e1rios finais.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-db-location.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Banco de dados de endere\u00e7os IP geogr\u00e1ficos<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst incorpora um banco de dados de endere\u00e7os IPv4 e IPv6 de todo o mundo, incluindo o continente\/pa\u00eds\/regi\u00e3o\/cidade de cada IP. SecAst pode ser configurado para permitir ou negar acesso a qualquer combina\u00e7\u00e3o desses atributos geogr\u00e1ficos (bem como um comportamento padr\u00e3o de &#8220;permitir\/ negar&#8221;). Se um invasor tentar acessar o servidor Asterisk de um local negado, o usu\u00e1rio ser\u00e1 imediatamente desconectado. Isso cria uma cerca geogr\u00e1fica (ou geocerca) que mant\u00e9m os mocinhos dentro e os bandidos fora.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-breached-credentials.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Detec\u00e7\u00e3o de ataque credencial violada<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst pode detectar padr\u00f5es de tr\u00e1fego e uso incomuns indicativos de credenciais que foram violadas (vazadas ou de alguma forma descobertas por um invasor). Isso inclui monitorar o n\u00famero de chamadas em andamento, a rapidez com que as chamadas s\u00e3o configuradas, at\u00e9 mesmo a taxa em que o usu\u00e1rio est\u00e1 discando d\u00edgitos. SecAst pode responder a essas atividades suspeitas bloqueando o usu\u00e1rio no n\u00edvel da rede e impedindo quaisquer outras explora\u00e7\u00f5es. Esses blocos podem durar horas, dias ou indefinidamente.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-heuristic-brain.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Detec\u00e7\u00e3o heur\u00edstica de ataque<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst pode aprender novos padr\u00f5es de ataque e ajustar sua detec\u00e7\u00e3o e defesas de acordo. O scanner heur\u00edstico monitora uma variedade de padr\u00f5es de tr\u00e1fego Asterisk e de rede para detectar atividades suspeitas, correlacion\u00e1-los com regras que indicam atividade prov\u00e1vel do invasor e, em seguida, bloquear o invasor no n\u00edvel da rede impedindo quaisquer tentativas adicionais. Esses blocos podem durar horas, dias ou indefinidamente.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-6 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-moving-ip.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Detec\u00e7\u00e3o de Ataque IP em Movimento<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst pode detectar ataques de hackers que est\u00e3o mudando constantemente e rapidamente endere\u00e7os IP. Hackers profissionais est\u00e3o agora movendo seus endere\u00e7os IP atrav\u00e9s de grandes variedades de endere\u00e7os IP de nuvens, servi\u00e7os de VPN, grandes sub-redes, etc. para evitar a detec\u00e7\u00e3o por ferramentas simplistas como fail2ban ou firewalls regulares. SecAst integra uma cole\u00e7\u00e3o diversificada de pontos de dados para permitir a detec\u00e7\u00e3o de hackers no instante em que eles se conectam ao PBX a partir de um novo endere\u00e7o IP.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-7 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-brute-force.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Detec\u00e7\u00e3o de ataque de for\u00e7a bruta<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst pode detectar ataques de for\u00e7a bruta (tentativas de obter acesso tentando v\u00e1rias combina\u00e7\u00f5es de nomes de usu\u00e1rio \/ senhas, extens\u00f5es comumente usadas, senhas comumente usadas, etc). Ao contr\u00e1rio de outros produtos, SecAst pode detectar esses ataques mesmo que se espalhem por muitos dias (os atacantes est\u00e3o agora realizando ataques &#8220;finos&#8221; para contornar programas de detec\u00e7\u00e3o simplistas como fail2ban) e muitos endere\u00e7os IP. SecAst pode responder a esses ataques bloqueando-os no n\u00edvel da rede e impedindo novas tentativas. Esses blocos podem durar horas, dias ou indefinidamente.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-8 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-dial-pattern.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Prote\u00e7\u00e3o de substitui\u00e7\u00e3o dialplan<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst monitora todos os d\u00edgitos que est\u00e3o sendo discados e pode bloquear tentativas de chamar n\u00fameros restritos ou discar outros padr\u00f5es. Embora os planos de discagem tamb\u00e9m executem essa fun\u00e7\u00e3o, se um servidor Asterisk estiver comprometido (por exemplo: FreePBX\u00ae GUI hackeado) ent\u00e3o o SecAst substituir\u00e1 o dialplan e ainda bloquear\u00e1 ou aceitar\u00e1 apenas certos n\u00fameros. O reconhecimento do padr\u00e3o de discagem pode corresponder a qualquer seq\u00fc\u00eancia de discagem e permitir ou bloquear a tentativa de discagem com base em regras definidas pelo administrador.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-9 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-trunk-endpoints.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Trunk e Endpoint Trust<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst pode ser instru\u00eddo a confiar em troncos espec\u00edficos, pontos finais (usu\u00e1rios ou telefones) e endere\u00e7os IP para que eles estejam isentos de triagem de seguran\u00e7a. Isso permite que os administradores concedam acesso a determinados usu\u00e1rios ou dispositivos, independentemente da localiza\u00e7\u00e3o, volumes de chamadas, etc. (o que pode ser necess\u00e1rio para a equipe de vendas de viagens, autodiscadores, etc. Isso tamb\u00e9m permite que os administradores designem certos troncos\/rotas como confi\u00e1veis e outros como n\u00e3o confi\u00e1veis.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-10 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-threat-level.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Resposta ao n\u00edvel de amea\u00e7a<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst monitora o n\u00famero e a taxa de ataques contra o servidor Asterisk e, com base em limiares definidos pelo administrador, mant\u00e9m um n\u00edvel global de amea\u00e7a enfrentado pelo PBX. Altera\u00e7\u00f5es no n\u00edvel de amea\u00e7a podem ativar scripts personalizados, notifica\u00e7\u00f5es e outras respostas baseadas no sistema. O n\u00edvel de amea\u00e7a se integra diretamente ao sistema de manipulador de eventos, conforme observado abaixo.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-11 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/icon-external-firewall.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Controle externo de firewall<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Embora SecAst possa bloquear hackers diretamente no PBX, se necess\u00e1rio, o SecAst pode bloquear hackers em um firewall na borda da rede. SecAst pode interagir diretamente com praticamente qualquer firewall externo, ordenando-o a adicionar regras para bloquear endere\u00e7os IP, remover endere\u00e7os IP bloqueados, etc. usando o sistema de manipulador de eventos descrito abaixo. (Para mitigar o risco global de hackers, os ambientes PBX comerciais devem sempre bloquear os atacantes na borda da rede.)<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-12 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-event-handler.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Sistema de manipulador de eventos<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Um recurso que torna SecAst flex\u00edvel e poderoso \u00e9 o sistema de manipulador de eventos, que permite que os administradores conectem qualquer programa\/script em eventos gerados ou detectados pelo SecAst. Por exemplo, eventos relacionados a um ataque permitem que os administradores automatizem altera\u00e7\u00f5es em firewalls, roteadores, pontos finais sip, regras do dialplan, extens\u00f5es acess\u00edveis, etc.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-13 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-telnet-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interface Telnet<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Os administradores ficar\u00e3o imediatamente confort\u00e1veis com a interface de telnet simples e poderosa para SecAst. Toda a seguran\u00e7a PBX pode ser gerenciada e controlada a partir de uma interface telnet, seja a partir de um PC, um tablet ou um celular. A interface inclui ajuda on-line e sa\u00edda terminal amig\u00e1vel e amig\u00e1vel ao usu\u00e1rio.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-14 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-web-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interface do Navegador<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Administradores experientes e novatos ficar\u00e3o confort\u00e1veis com a interface simples e poderosa do navegador (web) para SecAst. A seguran\u00e7a pode ser monitorada a partir de qualquer navegador, incluindo um PC, um tablet ou um celular. A interface fornece detalhes de ataques, n\u00edvel de amea\u00e7a, mapas de origem de ataque e muito mais.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-15 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-socket-interface.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Interfaces Soquete, PHP e ReST<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Os desenvolvedores apreciar\u00e3o as interfaces socket, PHP e REST (Representational State Transfer) para SecAstpois o poder e o controle do SecAst podem ser facilmente expandidos e integrados com outras ferramentas de administra\u00e7\u00e3o e monitoramento do sistema. O pacote de download inclui c\u00f3digo de amostra demonstrando como extrair dados e controlar SecAst atrav\u00e9s de um servi\u00e7o web, atrav\u00e9s de uma classe PHP, e atrav\u00e9s da interface do soquete.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:#efefef;--awb-content-padding-left:95px;border-color:rgba(94,98,118,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-16 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-box icon-hover-animation-pulsate\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%2775%27%20height%3D%2775%27%20viewBox%3D%270%200%2075%2075%27%3E%3Crect%20width%3D%2775%27%20height%3D%2775%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2019\/12\/icon-asterisk-versions.png\" width=\"75\" height=\"75\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:24px;--fontSize:24;line-height:1.5;padding-left:95px;\">Asterisk Compatibilidade<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>SecAst \u00e9 compat\u00edvel com uma ampla gama de vers\u00f5es e distribui\u00e7\u00f5es Asterisk SecAst trabalha com as vers\u00f5es Asterisk 1.4 a 16, ambas de 32 bits e 64 bits. SecAst \u00e9 compat\u00edvel com uma ampla gama de distribui\u00e7\u00f5es Asterisk\u00ae, incluindo Asteriskda Digium, FreePBX\u00ae, PBX In A Flash\u00ae, TrixBox\u00ae, Elastix\u00ae, Issabel\u00ae, xCALLY Motion\u00ae, Thirdlane\u00ae, Genesis ISS\u00ae e muito mais.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":12328,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-12463","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Caracter\u00edsticas - Seguran\u00e7a para Asterisk - Telium<\/title>\n<meta name=\"description\" content=\"Revise uma lista dos principais recursos oferecidos pelo Security for Asterisk (SECast). Desde a detec\u00e7\u00e3o de fraudes e hackers at\u00e9 o bloqueio de atacantes na borda da rede.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Caracter\u00edsticas - Seguran\u00e7a para Asterisk - Telium\" \/>\n<meta property=\"og:description\" content=\"Revise uma lista dos principais recursos oferecidos pelo Security for Asterisk (SECast). Desde a detec\u00e7\u00e3o de fraudes e hackers at\u00e9 o bloqueio de atacantes na borda da rede.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/\" \/>\n<meta property=\"og:site_name\" content=\"Telium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T16:58:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@telium_io\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/caracteristicas\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/caracteristicas\\\/\",\"name\":\"Caracter\u00edsticas - Seguran\u00e7a para Asterisk - Telium\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#website\"},\"datePublished\":\"2020-02-15T02:07:13+00:00\",\"dateModified\":\"2024-04-24T16:58:27+00:00\",\"description\":\"Revise uma lista dos principais recursos oferecidos pelo Security for Asterisk (SECast). Desde a detec\u00e7\u00e3o de fraudes e hackers at\u00e9 o bloqueio de atacantes na borda da rede.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/caracteristicas\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/caracteristicas\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/caracteristicas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/pagina-inicial\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a para Asterisk\",\"item\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/seguranca-para-asterisk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Caracter\u00edsticas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/\",\"name\":\"Telium\",\"description\":\"Telefonia e Telem\u00e1tica\",\"publisher\":{\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#organization\",\"name\":\"Telium\",\"url\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"contentUrl\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"width\":800,\"height\":800,\"caption\":\"Telium\"},\"image\":{\"@id\":\"https:\\\/\\\/telium.io\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/category\\\/Telecommunication-Company\\\/Telium-1581395458787072\\\/\",\"https:\\\/\\\/x.com\\\/telium_io\",\"https:\\\/\\\/ca.linkedin.com\\\/company\\\/telium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Caracter\u00edsticas - Seguran\u00e7a para Asterisk - Telium","description":"Revise uma lista dos principais recursos oferecidos pelo Security for Asterisk (SECast). Desde a detec\u00e7\u00e3o de fraudes e hackers at\u00e9 o bloqueio de atacantes na borda da rede.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/","og_locale":"pt_BR","og_type":"article","og_title":"Caracter\u00edsticas - Seguran\u00e7a para Asterisk - Telium","og_description":"Revise uma lista dos principais recursos oferecidos pelo Security for Asterisk (SECast). Desde a detec\u00e7\u00e3o de fraudes e hackers at\u00e9 o bloqueio de atacantes na borda da rede.","og_url":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/","og_site_name":"Telium","article_publisher":"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","article_modified_time":"2024-04-24T16:58:27+00:00","twitter_card":"summary_large_image","twitter_site":"@telium_io","twitter_misc":{"Est. reading time":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/","url":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/","name":"Caracter\u00edsticas - Seguran\u00e7a para Asterisk - Telium","isPartOf":{"@id":"https:\/\/telium.io\/pt-br\/#website"},"datePublished":"2020-02-15T02:07:13+00:00","dateModified":"2024-04-24T16:58:27+00:00","description":"Revise uma lista dos principais recursos oferecidos pelo Security for Asterisk (SECast). Desde a detec\u00e7\u00e3o de fraudes e hackers at\u00e9 o bloqueio de atacantes na borda da rede.","breadcrumb":{"@id":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/caracteristicas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/telium.io\/pt-br\/pagina-inicial\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a para Asterisk","item":"https:\/\/telium.io\/pt-br\/seguranca-para-asterisk\/"},{"@type":"ListItem","position":3,"name":"Caracter\u00edsticas"}]},{"@type":"WebSite","@id":"https:\/\/telium.io\/pt-br\/#website","url":"https:\/\/telium.io\/pt-br\/","name":"Telium","description":"Telefonia e Telem\u00e1tica","publisher":{"@id":"https:\/\/telium.io\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telium.io\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/telium.io\/pt-br\/#organization","name":"Telium","url":"https:\/\/telium.io\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/telium.io\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","contentUrl":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","width":800,"height":800,"caption":"Telium"},"image":{"@id":"https:\/\/telium.io\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","https:\/\/x.com\/telium_io","https:\/\/ca.linkedin.com\/company\/telium"]}]}},"_links":{"self":[{"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages\/12463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/comments?post=12463"}],"version-history":[{"count":8,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages\/12463\/revisions"}],"predecessor-version":[{"id":18129,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages\/12463\/revisions\/18129"}],"up":[{"embeddable":true,"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/pages\/12328"}],"wp:attachment":[{"href":"https:\/\/telium.io\/pt-br\/wp-json\/wp\/v2\/media?parent=12463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}