New Stories

The Race to Serve Enterprises with Revenue-Generating IT Services Virtualized by SDN & NFV

July 2015

The Race to Serve Enterprises with Revenue-Generating IT Services Virtualized by SDN & NFV

interview with Gal Ofel

The SDN/NVF movement is giving telcos a new revenue-generating play in the cloud: virtualized network and IT services to enterprises in areas like security, enterprise service assurance, enterprise application prioritization and content caching.

Lifecycle Service Orchestration: Enterprise Ethernet & Cloud Exchange Meet OSS & SDN/NFV

July 2015

Lifecycle Service Orchestration: Enterprise Ethernet & Cloud Exchange Meet OSS & SDN/NFV

interview with Marie Fiala Timlin

SDN and lifecycle service orchestration are key to the next generation of telco-to-enterprise services.  In this interview, an expert explains how lifecycle service orchestration adds value to SDN, cloud exchanges, enterprise Ethernet, and mobile backhaul.

Automatically Stopping Fraud Traffic: iBasis Raises the Bar for Wholesaler Protection of Retail Carriers

May 2015

Automatically Stopping Fraud Traffic: iBasis Raises the Bar for Wholesaler Protection of Retail Carriers

interview with Daan Kleijnen

The margins in the retail voice business are so tight these days that many operators fail to make a vital investment in fraud protection, making them easy targets for IRSF and other frauds.  A leading wholesaler explains a new fraud control program that automatically disconnects a retailer’s fraud traffic.

False Answer Supervision Fraud: Applying Advanced Statistics to Find Needles in the CDR Haystack

January 2015

False Answer Supervision Fraud: Applying Advanced Statistics to Find Needles in the CDR Haystack

interview with Steve Heap

Fraud management solutions have made great technical advances via automated threshold setting, big data, and DPI.  Now this expert interview explains how a new breed of advanced statistics-based solutions is tackling very hard-to-detect fraud types such as the call signal spoofing of False Answer Supervision.

Fraud Management Collaboration: From “Great Idea” to Real Software & Intelligence Sharing

September 2014

Fraud Management Collaboration: From “Great Idea” to Real Software & Intelligence Sharing

interview with Katia González

Without effective multi-operator collaboration in fraud management, each operator ends up merely reacting to fraud threats on its own rather than building up a proactive defense.  In this interview, a leading wholesale provider explains its innovative program to enable the automated and expert-to-expert sharing of fraud intelligence and techniques.

Sharing Intelligence, Services, and Infrastructure across the Telecom Galaxy

August 2013

Sharing Intelligence, Services, and Infrastructure across the Telecom Galaxy

interview with Gary Zimmerman

The telecom industry is an industry of sharing.  In fact, the rise of mobile broadband is driving a greater reliance on real-time intelligence, services trading, and infrastructure exchange.  In this article, a leading info exchange provider explains the value of its services portfolio and points to other interoperability and sharing ideas under development.

Recruiting Smartphone Users as Partners in Telecom Fraud & Security Control

July 2013

Recruiting Smartphone Users as Partners in Telecom Fraud & Security Control

by Chris Hill

Premium Rate Service (PRS) fraud and spyware on a mobile phone can ruin an operator’s relationship with a  subscriber.  The attacker uses malware to automatically generate phone calls, SMSs and data sessions to high cost (premium) phone numbers.  This article discusses a new crowd sourcing mobile app that addresses the problem and helps operators better manage the threat.

International Revenue Share Fraud: Are We Winning the Battle Against Telecom Pirates?

November 2012

International Revenue Share Fraud: Are We Winning the Battle Against Telecom Pirates?

interview with Colin Yates

International Revenue Share Fraud (IRSF) is one of the telecom industry’s most enduring problems.  Yet many of us have only a foggy notion of how IRSF works and how operators around the globe are coping with the issue. This interview covers the bases: the origins of IRSF, typical fraud scenarios, efforts to get international cooperation on the issue, and the future outlook of IRSF.

Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats

July 2012

Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats

interview with Mark Johnson

A fraud and security expert gives a big picture talk on why industry convergence is driving the need for a broader “revenue risk intelligence.”  His prescription?  Yes, telecoms surely need to excel in technical  infrastructure such as traffic usage data, IP intrusion appliances, and physical barriers.  But just as important is the need to pair that knowledge with the real-life lessons of fighting criminals in general.

Real-Time Network Intelligence: The New Way to Read Telecom Tea Leaves

August 2011

Real-Time Network Intelligence: The New Way to Read Telecom Tea Leaves

by Suren Nathan

Real-time network intelligence is the key to deciding which products to launch, whose facilities to lease, and where to route traffic.  The article explains why telecoms — and especially enhanced service providers --  should ideally be equipped with both a fine-grained margin analysis solution and a SaaS platform, offering an upgrade path that requires no internat IT support.

Recent Articles