June 2012
by Dan Baker
Because a user conference is highly targeted at customers and prospects, it’s
one of the most cost effective and personal ways for a software vendor to spread
positive industry buzz and pave the way for sales.
September 2010
by David West
Build custom systems in-house vs. buying commercial software is a critical issue
for service providers. This article make a strong case for why commercial
software is best in most situations. Discussion points include: cost tradeoffs,
the illusion of in-house control, and staying current in a dynamic market like
fraud assurance.
Recent Articles
-
How Thales Embeds Comms Security for Electronic OEMs & Telecoms Delivering Next Generation IoT Systems & Services
—
interview with Stephen Spellicy — How high-speed communications, advanced security and analytics technology gets
delivered to the IoT OEMs and telecom providers. Learn why security, performance,
cost and reliability are key IoT challenges.
-
A WeDo Conference Talk: Consulting & Analytics: Improving your Business Today, Enhancing it Tomorrow
—
interview with Carla Cardoso & Bernado Lucas & Thomas Steagall — Leading risk management consultants explain their mission and walk-through RA,
subscription fraud, and collections cases. They also explain how analytics
and machine learning can supplement process optimization.
-
Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients
—
interview with Kiran Zachariah — A leader in IoT security monitoring and protection services explains the many
challenges of IoT security and how his firm is exploiting its deep research
and honeypots to protect telecom, industrial, and automotive OEM clients.
-
“Moments Matter” in Blocking Identity Fraud: Why Number Porting Data is a Vital Tool in Stopping Account Takeovers
—
interview with Kathy Timko — Matching the porting history of a telephone number to a carrier of record is
now crucial to identity/credit checks by financial, healthcare, and other firms
in the U.S.
Learn how fraudsters exploit carrier porting processes to perform
account takeover in 10 minutes; and why freshly updated porting data is needed
to combat $17 billion in identity fraud.
-
In the Era of Telecom Security Breaches, Mobileum Brings Signaling’s Deep Detection Capability to the Fraud Fight
—
interview with Miguel Carrero — Security-breach-driven fraud is on the increase as fraudsters gain deeper
knowledge of telecom spheres such as roaming. Using five fraud cases,
an expert shows how advanced signaling techniques are taking fraud control to
a higher level.
-
PrologMobile’s Simple and Brilliant Plan to Save US MNOs Billions a Year in Recovered Phones & Retained Customers
—
interview with Seth Heine — An expert in the mobile phone reverse supply chain explains how MNOs —
via a neutral third party information exchange — can recover their original
phones on the used market and save huge sums in multi-year customer retention.
-
Black Swan Solution Guide: The IPRN Database and its Use in IRSF & Wangiri Fraud Control
—
interview with Dan Baker & Colin Yates — The IPRN Database is a powerful new tool for helping control IRSF and Wangiri
frauds. The pioneer of the category explains the value and use of the
IPRN Database in this 14-page Black Swan Solution Guide.
-
ARM Data Center Software’s Cloud-Based Network Inventory Links Network, Operations, Billing, Sales & CRM to One Database
—
interview with Joe McDermott & Frank McDermott — A firm offering a cloud-based network inventory system explains the virtues
of: a single underlying database, flexible conversions, task-checking workflow,
new software business models, views that identify stranded assets, and connecting
to Microsoft’s cloud platform.
-
Tethering Fraud: How Guavus Blocks the Pumping of Mobile Data Traffic and Tools Up to Deliver 5G Service Management
—
interview with Kent McIntosh & David Yates — How is analytics being applied to next generation data threats? Learn
how tethering fraud occurs and is detected. Also discussed are: data volume
reduction at the network edge, IoT fraud concerns, and automating the healing
of high-quality 5G data services.
-
How GBSD Enables Advanced and Flexible Real-Time Fraud Blocking with its High-Trust, Mobile-Network-Embedded Softswitch
—
interview with Jeffrey Ross — Learn about a close-to-the-network platform that blocks mobile fruad, Reading
a variety of protocols and integrated with external applications, it’s
being used to combat: Wangiri, IRSF, SIM box bypass, and mobile money fraud.
-
White Paper: A Real-Time Cloud Service to Protect the Enterprise PBX from IRSF Fraud
—
by Dan Baker — Learn how a new cloud-based solution developed by Oculeus, any enterprise can
protect its PBX from IRSF fraud for as little as $5 a month.
-
WeDo Explores the IoT Ecosystem in Search of Tomorrow’s Pivotal Fraud & Business Assurance Solutions
—
interview with Carlos Marques — A veteran product manager scans the IoT terrain, discusses key fraud and assurance
challenges, and explains the preparatory steps WeDo is taking to become a key
player in this emerging market.
-
New Report: Telecom Fraud & Business Assurance Solutions, Services & Strategies
—
by Dan Baker & Luke Taylor & Colin Yates — TRI publishes a new market research report, Telecom Fraud & Business Assurance
Solutions, Services & Strategies. Free executive summary available.
-
Mobileum on the Move: Attracts Several Operators to its IRSF-Analyzing & Opex-Saving Counter-Fraud Machine
—
interview with Avnish Chauhan — What’s the value of machine learning in fraud control? CTO of a
leading counter-fraud solution provider discusses ML, biometrics, and
voice service analytics in the context of fraud, roaming and security.