Ribbon Communications NetProtect

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

High costs of IT personnel

Shortage of inhouse IT engineers


Reduce Costs

Enhance Staff Productivity

Ribbon Communications NetProtect

Redefining the Real-time Communications Security Perimeter


The Threat

Bad actors are constantly looking for ways to cause havoc either for monetary gains, to disrupt internal and external facing customer services, or just do reconnaissance into the entire corporate network. And, the rapid pace of growth for SIP-based real-time communications (RTC) has caught the attention of bad actors.


To address the numerous types of RTC threats, Ribbon Analytics NetProtect application is the answer for your communication network that cannot be secured at any individual device or application layer. NetProtect coordinates RTC protection at the IP, application, and call layers which changes how RTC security is implemented.

Ribbon Protect Platform

NetProtect leverages Ribbon’s Protect big data analytics platform to respond to real-time communications security and network quality incidents faster, more intelligently, and more efficiently. The heart of the Protect platform is its UC anomaly detection and policy mitigation capability. The anomaly detection module collects and analyzes data across the entire communications network which is then made available to Ribbon Analytics applications. With customer-defined policy management functionality, detected anomalies generate alerts (e.g. SMS, email) and can be mitigated with actions to the appropriate network elements in real-time. Features & Benefits
  • Rapidly pinpoints UC security threats and closes the security aperture in your UC network
  • Data ingested from Ribbon SBCs and PSX platforms as well as other 3rd party UC network devices
  • Disseminate security policies across network “enforcers” such as SBCs and firewalls
  • Provides a single repository for an end-to-end view of your network operations
  • Virtualized, micro-services architecture for rapid deployment
  • No separate hardware or software probes required
  • Supports applications for UC security, fraud management and network-wide intelligence

Scheme of work

 Scheme of work