Fighting the threat of SIM boxes to A2P SMS revenues
|
|
|
- Matilda Park
- 9 years ago
- Views:
Transcription
1 Fighting the threat of SIM boxes to A2P SMS revenues
2 02 INTRODUCTION Mobile operators increasingly find themselves having to compensate for declines in revenue streams that were once reliable. No greater is this challenge than with SMS, which for consumers has become entirely commoditised thanks to a combination of aggressive pricing from operators and effectively free OTT messaging platforms such as WhatsApp. Application to person (A2P) messaging is an effective means for enterprise businesses to communicate directly with their customers, forming part of an omni-channel messaging strategy. Global A2P revenues have been steadily increasing over the past four years and are forecast to continue to grow. Where there is legitimate revenue, however, fraud inevitably follows and A2P SMS is no exception. A well-established technique for extracting fraudulent revenues from mobile networks has been the exploitation of grey routes which circumvent operators own systems, subsequently leading to revenue leakage. Over time mobile operators have become more efficient at closing these grey routes, forcing fraudsters to adopt more innovative approaches. One such innovative approach is the use of SIM boxes, which allow the distribution of bulk SMS through the exploitation of consumer-only unlimited text packages. This Telecoms.com Intelligence whitepaper, written in partnership with Anam Technologies, will examine the A2P SMS industry and drill down into the nature of the SIM box fraud threat. Finally it will explore the measures operators can put in place to protect their A2P SMS revenues against SIM-box grey-routes.
3 03 A GROWING MARKET Application to person (A2P) messaging is an emerging revenue stream for operators looking to offset rapidly declining traditional person to person (P2P) SMS revenues with new business models. Industry analysts Ovum forecasts global A2P messaging traffic will total around 2 trillion events in 2015, which will rise to 2.2 trillion by 2017, representing 31% of total messaging traffic - up from only 24% in As mentioned above A2P is forecast to rise dramatically for at least the next two years, and there are sufficient reasons why that is the case. According the Direct Marketing Association, 44% of consumers would rather receive product details and marketing messages via text message; and texting as part of a multi-channel communications strategy is growing in popularity. Open and read rates of business-related text messages far outweigh those of , as text messaging offers a more personal interface with customers. A wide variety of industries are making use of A2P messaging, appreciating it as a simple, inexpensive, efficient way to communicate with a large number of people especially customers. A common use is two-factor authentication, which typically combines an online password with an SMS message to ensure that the customer needs separate devices operating over independent networks in order to gain access to secure services. This facility is especially useful for the banking and finance industries, which have also called upon A2P messaging for things like account information, payments and alerts. Other consumer facing industries such as retail, FMCG and transport use A2P for direct marketing, coupons, loyalty and CRM in general. Of course the substantial growth in A2P SMS volumes gives mobile operators an opportunity to offset the decline in P2P revenues resulting from the growth in use of competitive OTT messaging services. Ironically OTT services such as social media use A2P SMS for alerts, content delivery and two-factor authentication Source: Ovum
4 04 TRADING TEXTS In principle the commercial dynamic governing enterprise procurement of A2P services should be straightforward, in which services are paid for on a metered/tariff basis much as with consumer subscriber contracts. Inevitably, however, an ecosystem has evolved specifically to cater for A2P messaging; aggregators and VARs enter into contractual agreements with operators in order to resell wholesale SMS to enterprise customers as part of value-added packages. These middle-men serve a useful function to both operators and enterprise, considering they reduce the management overhead from a business arrangement that might otherwise be too small to justify it. It s not uncommon for there to be more than one layer of aggregator involved in the delivery of A2P SMS communications, and an inevitable consequence of any third party involvement is reduced control over the whole process. A vulnerability often exploited by fraudsters looking to appropriate SMS revenues is large or even unlimited SMS bundles. In an attempt to address the aforementioned threats to traditional SMS revenues the trend has been for operators to use generous SMS allowances to increase the appeal of tariff bundles, effectively using them as loss-leaders to attract more lucrative mobile data business. This trend has been underway in developed markets for some time, and is now rapidly increasing in emerging ones. The Asia Pacific region is by far the world s largest in terms of population and mobile subscribers, so the growth of generous SMS offers there provides especially fertile ground for anyone looking to repurpose those texts for other uses. The world s largest mobile operator China Mobile offers 10,000 intra-network SMS per month as standard via its Hong Kong subsidiary. Vodafone India the second largest Indian operator bundles far fewer texts in its standard consumer tariffs, but for around US$2 you can buy a Bonus Pack of 3,000 texts for national use, seemingly over any domestic network. In Malaysia, Maxis offers unlimited SMS with its MaxisOne postpaid tariff, but attaches a fair use condition which clearly indicates that bulk messaging and A2P are not permitted. In the Philippines, even the cheapest postpaid tariff at Smart Communications has unlimited intra-network texts, with no obvious mention of any fair use policy. Telenor Pakistan offers micro-packages of hundreds of texts, which are unlikely to be attractive to fraudsters, but for US$2 offers daily unlimited SMS packages. There is no reference to either a fair use policy or any notional ceiling to the unlimited package. Alternatively there is another bundle that offers a generous 10,000 SMS for use over the course of a month for around US$4. Both bundles can be activated merely by dialling a short code on a mobile phone. These tariffs create billing loopholes that can be used by fraudsters to fulfil enterprise SMS services at minimal overhead. Not only does this deny operators significant revenue, but it also reduces their ability to manage the quality of the service. As a result, the entire A2P industry threatens to be undermined. The paradox for operators is that by offering generous consumer SMS tariffs they re also sowing the seeds for fraudsters to exploit their A2P business. Business communications provider, cloud-based communications provider SMS aggregator hub End user Enterprise Mobile operator The A2P SMS ecosystem Source: Ovum
5 05 CLOSING LOOPHOLES A common form of fraud over mobile networks has been the use of grey routes, which utilise illegal interconnections to deliver a call or SMS, thus circumventing official delivery channels and avoiding termination fees. This is hardly a new concern for operators, who have been aware of the practise for some time. By effectively commercialising and protecting all interconnects, fraudsters exploiting grey routes have been forced to look for other technical vulnerabilities. There are many other ways in which generous consumer SMS bundles can be used to deny operators revenue from enterprise deals, not all of which are necessarily illegal. In late 2013 mobile security specialist Lookout blogged about an app called Bazuc, which offered to pay consumers for their unused SMSs. The thinking behind Bazuc was to take advantage of the fact that most people don t use even a fraction of the SMS bundle given to them by their mobile contracts. Therefore, an opportunity exists to repurpose that excess messaging capacity on to those that do need it, most notably large enterprise organisations. Of course this was a classic example of a loophole that results in significant revenue leakage, as well as helping to bypass spam and fraud detection systems by using otherwise normal accounts, so Lookout decided to investigate further. Out of the 200 messages sent by Bazuc and analysed by Lookout; 90% involved some kind of A2P and only 1.5 % were peer-to-peer. Furthermore, while all the messages were delivered to US subscribers, they originated from countries all over the world. The investigation concluded that while Bazuc itself was not violating operator terms of service, it was inviting subscribers to do so. The creator of Bazuc subsequently contacted the tech blog AllThingsD to address the claims in the Lookout report and conceded there are risks associated with the app for subscribers, but that these were clearly identified. He confirmed the business model was to target the A2P SMS market, but conceded the app has been pulled from the Google Play store for violating a clause that requires users to approve each text message sent on their behalf. SIM BOXES A SIM box (also known as a SIM farm, SIM bank or GSM gateway) is a device that can house a large number of SIM cards and be controlled via a computer. SIM boxes have been used for many years to bypass international voice tariffs. More recently, SIM boxes are used by fraudsters to originate large amounts of SMS from within a network by taking advantage of unlimited consumer SMS tariffs. This route could also be used to send spam, nuisance texts, etc. Despite how long it s been around, SIM box fraud is still considered a major threat to MNOs, costing them billions of dollars in revenue per year. The use of SIM boxes as a channel for A2P SMS traffic is relatively recent but as is the case with the voice bypass, it is proving difficult for MNO s to detect and block. The capability and capacity of SIM boxes is growing ever more sophisticated whilst price points for SMS are coming down. Availability and accessibility is also no longer a barrier. Banks of SIM Boxes housed in mobile vehicles have also been detected and which further thwart location-based detection & blocking mechanisms. Fraudsters are also able to quickly switch out SIM cards from their boxes as and when individual routes become blocked by MNOs. Another recent development which complicates traffic detection from SIM boxes is support for IMEI (or device identity) re-configuration. Combine all these with the difficulty of tracing the owners of prepaid SIMs and the high churn environment that naturally exists in the market and you have a constant game of cat-and-mouse in which the MNO is frequently one step behind. As a consequence, solutions to this problem require a significant degree of Despite how long it s been around, SIM box fraud is still considered a major threat to MNOs, costing them billions of dollars in revenue per year
6 06 A computer linked to a SIM box device, often from a mobile location, can send multiple SMSs linking to local base stations sophistication. A multi-layered approach involving successive levels of information analysis, decision making and action is considered best, often implemented in a phased manner to further complicate any counter-measures the fraudster might attempt. FIGHTING THE FRAUDSTERS Circumventing the use of SIM boxes for grey-route A2P purposes can be tackled on a number of levels. When designing and launching price plans for the consumer and enterprise segments, MNO s need to attach clear fair usage terms to the availability of SMS volume bundles & unlimited packages. Restrictions limiting the usage of bundles top2p communication and allowed volumes should be clearly stated and legally sound; if such clear T&Cs do not exist, MNO s should look to revise these especially for future price plans. MNO s can also employ monitoring techniques to ensure that the defined fair usage policies are observed. This type of retrospective monitoring can be achieved though off-line analysis of billing system data. Whilst this approach can point to potential abuse of fair usage polices, it does not facilitate a differentiation between P2P and A2P traffic. It should be also noted that a billing data analysis approach only allows SIMs to be blocked after the fact. Another monitoring approach is the use of penetration test traffic systems to trace how A2P SMS is being routed to subscribers. Intelligent analysis of such results can detect the use of SIM boxes as the entry point onto the network to cause the A2P SMS termination bypass. While detection and identification capability related to these techniques is improving all the time, results will at most be just near real-time. Given richer feature sets of increasingly cheap SIM box technology combined with rising levels of deployment and identity evasion ingenuity, the need for more sophisticated methods to safeguard against their usage for A2P SMS traffic is required. SMS firewalls have been introduced into the MNO landscape over the past few years. The more sophisticated SMS firewall systems can represent a more effective approach to SIM box detection and blocking since they process SMS traffic in realtime and thus have the capacity for immediate grey route A2P SMS traffic identification and blocking. The challenge for existing SMS firewalls is that SMS traffic emanating from SIM boxes can be easily adjusted to defy the simple volumetric and pattern checks, especially if these are implemented as static configuration. SIM boxes operators also have the ability to dynamically re-program the IMEI (almost on a per-transaction basis), which evades any one-dimensional blocking technique based on IMEI detection. Thus a multi-faceted approach is needed, where a variety of techniques are applied in combination with SMS Firewall machine learning algorithms. This multi-faceted approach has led to extremely good results with the elimination of grey-route SMS via SIM boxes. The nature of this fight against grey-route A2P SMS is that, once defended, the MNO s capability must be maintained. Continuous updating and sophistication of SMS Firewall detection techniques and filtering technology allied with latest threat intelligence and penetration testing services is the only truly effective means of blocking traffic and safeguarding A2P revenues.
7 07 CONCLUSION A2P SMS is an important source of revenue for operators feeling the squeeze from declining ARPUs and OTT competition. It will remain a useful service for enterprises for some time, so it s worth protecting. Where there s revenue there is crime and A2P SMS is no exception. Fraudsters are constantly on the lookout for new ways to create revenue leakage from mobile networks and thus profit for themselves. SIM boxes are a key tool in the fraudster arsenal as they allow both the routing of mobile calls via IP networks and the use of unlimited SMS tariffs designed solely for consumer use. If operators are to maintain A2P SMS as a viable business they need to tackle this threat robustly. Since SIM boxes also allow fraudsters to adapt rapidly when illegal use of a SIM is detected, a multi-layered approach is required. SMS firewalls can be configured not just to detect volume of traffic, but SMS signatures and IMEI information. A2P SMS is forecast to remain a significant source of operator revenue for some time, so it s worth protecting.
8 08 About Telecoms.com Intelligence Telecoms.com Intelligence, the industry analysis arm of Telecoms.com, works closely with its partners to thoroughly research and create educational services for its readership. In 2014 alone we generated more than 25,000 leads for our clients across more than 50 campaigns. A consultative and collaborative approach with our dedicated analysis team ensures the creation of truly unique content, highly regarded throughout the industry. Telecoms.com Intelligence services combine statistical analysis and broad industry knowledge to effectively deliver insight and analysis through the use of webinars, bespoke surveys, white papers and more. All campaigns are supported with extensive marketing campaigns, to guarantee quantifiable business leads for our clients. Since its launch in 2001, Telecoms.com attracts more than 86,000 unique visitors and 173,000 page views on a monthly basis. The recently redesigned website also provides a newer and easier-to-navigate resource directory from which to access Intelligence content. For more information, visit About Anam SMS Assure, Anam s flagship product is a combined service and technology proposition which allows Mobile Networks to maximize revenue from A2P SMS traffic terminating on their network. Working closely with Mobile Network Operators to secure their infrastructure, SMS Assure involves business process structuring, effective SMS filtering and a managed operational and business service that generates new revenue for previously unbilled A2P SMS terminating on the network. Anam s SMS Firewall (which forms the main technology element of our SMS Assure product) is based on industry leading and patented technology. Employing a multidimensional matrix-based approach to traffic analysis, the SMS Firewall runs a myriad of filtering techniques and correlations to identify SMS traffic attributable to SIM Boxes. Dynamic firewall rule management & continuous service monitoring by Anam s Managed Services Team ensures that SIM Box activity is kept under control in real time. SMS Assure is extensively deployed in Mobile networks across Asia, Caribbean and Europe. The company s proven formula for monetizing A2P asserts that for every 1m subscribers, SMS Assure can deliver incremental annual revenue of $1m. Anam is headquartered in Dublin Ireland & has offices in Kuala Lumpur & London.
Solving the SMS Revenue Leakage Challenge
Whitepaper Table of Contents 1 Background 2 SMS fraud technical overview 3 Affected parties 4 Common methodologies 5 Ways to control the different types of SMS fraud Solving the SMS Revenue Leakage Challenge
Research Report Charging and Billing for the Digital Economy
Research Report Charging and Billing for the Digital Economy Copyright Openet Telecom, 2013 Index Introduction 3 1. The Future for Traditional Billing and Charging 4 2. Innovating and Accelerating Time
Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud
Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Authored by: Dr. Ian Howells Dr. Volkmar Scharf-Katz Padraig Stapleton 1 TABLE
Solace s Solutions for Communications Services Providers
Solace s Solutions for Communications Services Providers Providers of communications services are facing new competitive pressures to increase the rate of innovation around both enterprise and consumer
Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue
SAP Brief SAP Mobile Services SAP SMS Firewall 365 Objectives Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue Cloud-based managed service helps control messaging abuse Cloud-based
Decisioning for Telecom Customer Intimacy. Experian Telecom Analytics
Decisioning for Telecom Customer Intimacy Experian Telecom Analytics Turning disruption into opportunity The traditional telecom business model is being disrupted by a variety of pressures. From heightened
Two-Factor Authentication: Tailor-Made for SMS
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication: Tailor-Made for SMS Exploring Myths, Misconceptions, and Best Practices for SMS-Based 2FA Table of Contents 4 Understanding Two-Factor
International Dialing and Roaming: Preventing Fraud and Revenue Leakage
page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
Hyper-Personalization with MNO Subscriber Data
Hyper-Personalization with MNO Subscriber Data Approaches and Recent Trends Regarding the Use of MNO Data for Hyper-Personalization By Zach Cohen, Shahzad Zia and Carly Christian Private and public-sector
TELECOM FRAUD CALL SCENARIOS
TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple
FICO Enterprise Fraud and Security Management. > Protection with a holistic view.
FICO Enterprise Fraud and Security Management > Protection with a holistic view. > Fraud is everywhere. It s pervasive, invasive and harms customers, merchants and institutions alike. How can you keep
White Paper Closing the Mobile Data Revenue Gap
White Paper Closing the Mobile Data Revenue Gap Copyright Openet Telecom, 2009 Copyright OPENET Telecom, 2010 2 Closing the Mobile Data Revenue Gap The demand for mobile data is exploding, presenting operators
Definition of Mobile Instant Messaging (MIM) Systems
J son & Partners Consulting Company presents the results of the research Mobile instant messaging systems as a direct threat to SMS. Definition of Mobile Instant Messaging (MIM) Systems MIM (Mobile Instant
Why Redknee s Pre-Integrated Real-Time Billing and Customer Care Solution is the Right Choice for CSPs
Why Redknee s Pre-Integrated Real-Time Billing and Customer Care Solution is the Right Choice for CSPs > > Summary In an increasingly saturated and competitive market, telecom operators face huge challenges
Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
White Paper. The business case for VAVOOMB
White Paper The business case for VAVOOMB SUMMARY For Mobile Operators everywhere traditional revenue streams of VAS and Voice are increasingly under attack from the OTT Voice and IP messaging services
Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group
Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group May 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Comarch Data Analytics and Monetization
Comarch Data Analytics and Monetization Today s reality makes it increasingly tough for telecoms to generate revenues based solely on their core business: providing network connectivity. On the other hand,
Access Mediation: Preserving Network Security and Integrity
Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering
The Mobile Problem. Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India
The Mobile Problem Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India M 3 AAWG Workshop: Fighting Spam and Bots EWI, NASSCOM, FICCI 3rd Worldwide Cybersecurity Summit Desired Outcomes 1.
The Order Management Tipping Point:
The Order Management Tipping Point: Why Salesforce is at the Center of the New Communication Service Provider Architecture Sponsored by Technology Changing the Customer Change is constant for all industries,
Decisioning for Telecom Customer Intimacy. Experian Telecom Analytics
Decisioning for Telecom Customer Intimacy Experian Telecom Analytics Turning disruption into opportunity The traditional telecom business model is being disrupted by a variety of pressures from heightened
How To Optimize Your Wholesale Business
The Intelligent Solution for Routing, Interconnect and Settlement WHOLESALE BILLING PARTNER SETTLEMENT LEAST COST ROUTING FRAUD MANAGEMENT BUSINESS INTELLIGENCE Optimize Your Entire Wholesale Billing Business
VAS ConSolidAtion, VirtuAliSAtion And the Cloud Pieter oonk, ProduCt MAnAger
VAS Consolidation, Virtualisation and The Cloud Pieter Oonk, Product Manager Executive Summary Over the past decade, computing power and the bandwidth to deliver it have become extraordinarily efficient,
FACT SHEET INTERNATIONAL SERVICES GLOBAL INTERNET ACCESS (GIA)
UNCOMPROMISING GLOBAL INTERNET CONNECTIVITY Telstra Wholesale s Global Internet Access (TW GIA) service provides high-performance, superior quality internet access in the Asia Pacific region and direct
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
A FINEXTRA RESEARCH REPORT SPONSORED BY AXWAY MARCH 2015 OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A REPORT ON A SURVEY BY FINEXTRA AND AXWAY
A FINEXTRA RESEARCH REPORT SPONSORED BY AXWAY MARCH 2015 OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A REPORT ON A SURVEY BY FINEXTRA AND AXWAY OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A
WHITE PAPER Moving Beyond the FFIEC Guidelines
WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
Cloud CRM. Scalable solutions for enterprise deployment
Cloud CRM Scalable solutions for enterprise deployment Simplicity in a complex world Finding, attracting, winning and retaining customers is the lifeblood of every business. But building a scalable, integrated
Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers
White paper Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers Service management solutions enable service providers to manage service
European Mobile Market: Beyond Price-based Strategies. Laura Allen Phillips, Research Analyst, Parks Associates
European Mobile Market: Beyond Price-based Strategies Laura Allen Phillips, Research Analyst, Parks Associates A Paradigm Shift Italy The European Mobile Industry European Mobile Market: Beyond Price-based
BoR (13) 185. BEREC Report on Transparency and Comparability of International Roaming Tariffs
BEREC Report on Transparency and Comparability of International Roaming Tariffs December 2013 Contents I. EXECUTIVE SUMMARY AND MAIN FINDINGS... 3 II. INTRODUCTION AND OBJECTIVES OF THE DOCUMENT... 5 III.
Mobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
Revenue Enhancement and Churn Prevention
Revenue Enhancement and Churn Prevention for Telecom Service Providers A Telecom Event Analytics Framework to Enhance Customer Experience and Identify New Revenue Streams www.wipro.com Anindito De Senior
Revenue Analytics for Long Term Evolution (LTE)
Revenue Analytics for Long Term Evolution (LTE) Technical White Paper October, 2012 cvidya Confidential Proprietary This document and the information contained in it is CONFIDENTIAL INFORMATION of cvidya,
The Order Management tipping point. Why Salesforce is at the center of the new Communication Service Provider architecture
The Order Management tipping point Why Salesforce is at the center of the new Communication Service Provider architecture Why Salesforce is at the center of the new Communication Service Provider architecture
Mobile Voice Off-Load
Mobile Voice Off-Load An AdvOSS Solution White Paper Latest version of this white paper can always be found at: http://advoss.com/resources/whitepapers/mobile-voice-offload.pdf For more information, contact
CONTEXT-AWARE MARKETING SYSTEMS ENABLE CSPs TO GENERATE ADDITIONAL REVENUE
RESEARCH STRATEGY REPORT CONTEXT-AWARE MARKETING SYSTEMS ENABLE CSPs TO GENERATE ADDITIONAL REVENUE ATUL ARORA AND JUSTIN VAN DER LANDE analysysmason.com About this report This report analyses communications
Case study: Kopo Kopo
April 2014 Case study: Kopo Kopo Adam Wills, Analyst [email protected] Product summary Year Launched: 2011 Business Model: Consumer (merchant), B2B (mobile-money service provider) Targeted Device: Basic
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Business Review. Customer-oriented High Quality Customer Service Better Returns to Shareholders. China Mobile (Hong Kong) Limited
18 Customer-oriented High Quality Customer Service Better Returns to Shareholders China Mobile (Hong Kong) Limited 19 The table below summarizes selected operating data of the Group for the period from
TELEGEOGRAPHY REPORT EXECUTIVE SUMMARY. Executive Summary
Executive Summary Few industries have experienced more wrenching changes than the international longdistance business. Over the past two decades, service providers have weathered market liberalization,
A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud
A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts
Anti Fraud Services. Associate Member of..
Anti Fraud Services Associate Member of.. Fraud Context: Global Risk Fraud losses as a percentage of global telecom revenues were estimated at 2.09% in 2013 by the Communications Fraud Control Association
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
A Case Study: Vodacom Group and Redknee
A Case Study: Vodacom Group and Redknee Driving Growth in the Roaming Market and Improving the Customer Experience Summary > How Redknee enabled Vodacom to address the increasing market competition and
How the Past Changes the Future of Fraud
How the Past Changes the Future of Fraud Addressing payment card fraud with models that evaluate multiple risk dimensions through intelligence Card fraud costs the U.S. card payments industry an estimated
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Battling illegal call operations with Fraud Management Systems
Battling illegal call operations with Fraud Management Systems 02/12 Battling illegal call operations with Fraud Management Systems Executive summary Contents 02 Executive summary 03 Compare: ratio of
About Silverstreet. ! Virtual Mobile Numbers - Inbound SMS numbers for 2-way traffic and response tracking purposes.
About Silverstreet Silverstreet is a specialist Mobile Messaging (SMS) company, offering global MT termination options over 800+ networks. Our primary focus is on mission critical traffic and high volume
Comarch Data Analytics and Monetization
Comarch Data Analytics and Monetization Today s reality makes it increasingly tough for telecoms to generate revenues based solely on their core business: providing network connectivity. On the other hand,
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy
29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses
Case Study KPNI: Huawei OSS/BSS Implementation
Case Study KPNI: Huawei OSS/BSS Implementation Prepared by Julian Morrison & Ewa Romaniuk www.pyr.com On behalf of Huawei January 2012 PYRAMID RESEARCH JANUARY 2012 CASE STUDY HUAWEI TABLE OF CONTENTS
The Global Attacker Security Intelligence Service Explained
White Paper How Junos Spotlight Secure Works The Global Attacker Security Intelligence Service Explained Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
DATA-DRIVEN EFFICIENCY
DATA-DRIVEN EFFICIENCY Combining actionable information with market insights to work intelligently and reduce costs ACTIONABLE INTELLIGENCE Ericsson is driving the development of actionable intelligence
International Carriers
International Carriers combatting by-pass fraud with Orange expertise and services Pierre Paufique December 2014 Anti-Fraud Interconnect Roaming & Supervision of Transactions 2014 why we should fight by-pass
Machine to Machine Communications As a Service
Machine to Machine Communications As a Service Machine-to-Machine (M2M) refers to technologies that allow both wireless and wired systems to communicate with other devices It s the fastest growing Telecom
Is your business secure in a hosted world?
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
CONSUMERLAB CONNECTED LIFESTYLES. An analysis of evolving consumer needs
CONSUMERLAB CONNECTED LIFESTYLES An analysis of evolving consumer needs An Ericsson Consumer Insight Summary Report January 2014 Contents INTRODUCTION AND KEY FINDINGS 3 THREE MARKETS, THREE REALITIES
Mobile Money Transfer Services. Deepankar Roy, Ph.D. National Institute of Bank Management, Pune, India
Mobile Money Transfer Services Deepankar Roy, Ph.D. National Institute of Bank Management, Pune, India Outline Overview of Mobile Money Transfers Who are the Key mobile wallet vendors? Successful examples
Celebrus for Telecommunications: Deepening customer intelligence with individual-level digital data
SECTOR SOLUTIONS Celebrus for Telecommunications: Deepening customer intelligence with individual-level digital data p1 Introduction Today s Telecommunications sector is highly dynamic. Firstly the very
CLARINS China commerce site adds to brand s momentum in China
An RIS News Case Study CLARINS China commerce site adds to brand s momentum in China Business Best known for luxury skin care products, CLARINS sells cosmetics in every country around the world through
Mobile Wallet Platform. Next generation mobile wallet solution
Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator
www.samsungnetworks.com Most Innovative LTE Commercial Launch Best Solution for Spectrum Optimization Cell Site Innovation
Most Innovative LTE Commercial Launch Best Solution for Spectrum Optimization Most Innovative Application/Service Outstanding Overall Technology CTO s Choice Best VoLTE Innovation Wide Area Network - Core
Yield Optimization. Increased revenue improved user experience
Yield Optimization Increased revenue improved user experience INTRODUCTION User experience is central to operator success. Satisfied subscribers are more loyal an essential consideration in competitive
Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs)
www.pipelinepub.com Volume 5, Issue 5 Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs) Operators encounter it daily: They work to provide their subscribers
MAXIMISING VALUE FROM DIRECT MARKETING: CUSTOMER ENGAGEMENT
MAXIMISING VALUE FROM DIRECT MARKETING: CUSTOMER ENGAGEMENT DATE: October 2013 Tim Gilmour Chief Marketing Officer aegon.com AEGON DIRECT & AFFINITY MARKETING SERVICES ADAMS (AND ITS SISTER COMPANIES WORLDWIDE)
Feature Guide Elastic Path Subscriptions. 1.800.942.5282 (toll-free within North America) +1.604.408.8078 (outside North America) www.elasticpath.
Feature Guide Elastic Path Subscriptions 1.800.942.5282 (toll-free within North America) +1.604.408.8078 (outside North America) www.elasticpath.com The industry s most complete subscription and billing
fraud & billing For example, Layer4 will identify: Compliance of telecom operators with service level agreements
TELECOM INSIGHT National Regulatory Authorities are faced with many challenges in establishing a national telecoms environment. Paramount is the need to protect revenue for legitimate local telecommunication
Multi-channel mobile marketing and CRM solutions for Mobile Network Operators
Multi-channel mobile marketing and CRM solutions for Mobile Network Operators future mobile technology marketing business entertainment media Interactive Messaging (SMS, MMS, Email and Voice) Mobile Internet
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
MULTICHANNEL MARKETING
REPORT Report Multichannel Marketing MULTICHANNEL MARKETING A Study Highlighting Current Approaches and Investment, Opportunities and Key Challenges 1 2 Introduction 4 Key findings 6 Conclusion 19 3 INTRODUCTION
International Mobile Roaming:
ITU/BDT Regional Economic and Financial Forum of Telecommunications/ICTs for Latin America and the Caribbean UIT/BDT Foro Regional sobre Economía y Finanzas de las Telecomunicaciones/TICs para América
Operating from the middle of the digital economy: Integrated Digital Service Providers. By Ed Bae, Sumit Banerjee and Tom Loozen
Operating from the middle of the digital economy: Integrated Digital Service Providers By Ed Bae, Sumit Banerjee and Tom Loozen 2 Operating from the middle of the digital economy: Integrated Digital Service
Marketing Automation Solutions Market India Increasing Enterprise Digital Marketing Initiatives Drive Growth at a CAGR of 25% by 2020
Marketing Automation Solutions Market India Increasing Enterprise Digital Marketing Initiatives Drive Growth at a CAGR of 25% by 2020 P82F-70 December 2014 Contents Section Slide Number Executive Summary
