Email a colleague    

January 2016

A Big Win/Win: Protecting Mobile Users While Boosting Revenue

A Big Win/Win: Protecting Mobile Users While Boosting Revenue

Dear Colleague:

The mobile business has probably never been tougher.  Operators today are being hit by challenges from all directions:

  • Costly LTE and bandwidth rollouts have been great for users, but have not contributed to big revenue gains;
  • Traditional voice, SMS, and other IP services are steadily being gobbled up by OTTs;
  • Profitable roaming charges are now being undercut by regulators in some regions; and,
  • New mobile and OTT competitors continue to enter the market.

So how can operators win in today’s brutally competitive climate?

Well, I think the strategy is no different than it’s ever been: the winning operators are the ones who choose and deploy compelling services that boost revenues and profits.

Now certainly having a network technology (3G, LTE, 5G, etc.) that’s better than or equal to that of your competitors is key.  But unfortunately, network investments are planned years in advance.  So in the near term, the only place where product marketers can really influence revenue growth is in value added services.

But there’s a problem: since most value added services are IP-based today, they are quite vulnerable.  OTTs are quite adept at replicating and more cheaply delivering just about any “killer IP service” a mobile operator dreams up.

Real-Time Cloud Services in Mobile

Increasingly mobile operators will turn to the cloud to find compelling services.

These real-time cloud services will leverage a mobile operator’s unique capability to perform in-line network analytics, and then react to events through network policy.

Such in-line cloud services are now emerging in applications such as: content caching at the mobile edge, mobile device security, and enterprise service assurance.

Now Allot Communications commissioned TRI to write a paper I’m going to discuss one such service, a proven, real-time mobile user security service deployed at several global operators:

Network In-Line Malware Blocking & Web Surfing Protection
for Consumers and Small/Medium Businesses

This 10-page paper that you can freely download is entitled: A Big Win/Win: Protecting Mobile Users While Boosting Revenue: The Benefits of Providing a Real-Time Cloud Service in Malware Threat Protection for Consumers & SMBs.

Protecting Mobile Users While Boosting Revenue

Details & Benefits of a Proven Cloud Security Service

The paper discusses what the service entails, the nature of the security threat, its benefits, and the advantages it brings to the operator.  And the paper provides details on:

  • How the service attacks a growing problem: mobile security;
  • Why the time is right for 24/7 mobility protection;
  • How it can boost user satisfaction while also lowering on-going costs;
  • How the service protects the user transparently;
  • Why the service is a money-maker at various global operators;
  • Why the service is economical to maintain;
  • Some keen operating advantages it offers over device-resident software;
  • Why it’s future technology friendly; and,
  • The reasons why the services is essentially OTT-proof.

So follow the link and have a read.  It’s instructive to look at this service — not just for the many benefits it brings to the problem of malware protection — but as representative of many real-time cloud services to come.

Hope you find the paper profitable reading.


Dan Baker
Research Director, TRI


Copyright 2016 Black Swan Telecom Journal

 

About the Expert

Dan Baker

Dan Baker

Dan Baker is research director of Technology Research Institute (TRI) and editor of the on-line magazines Black Swan Telecom Journal, Top Operator Journal and Telexchange Journal.

Baker is author of the 2015 TRI report, Telecom Fraud Management Services, Software & Strategies, featuring commentary by 14 domain experts.   Contact Dan via

Related Stories

  • A Big Win/Win: Protecting Mobile Users While Boosting Revenue by Dan Baker — Increasingly mobile operators will turn to the cloud to find compelling services.  This white paper explains the benefits of a cloud security service that detects and blocks malware.
  • LTE Monitoring: The Virtue of Combining Service and Security Assurance interview with James Heath & Steve Shalita — The arrival of  LTE, the all-IP wireless standard, greatly complicates the guaranteee of service quality and security.  This article details of the many challenge and reasons why additional investments will be required to remain secure.  Fortunately a saving grace is proposed: a single Network Behavioral analysis (NBA) system for anomaly detection that serves the dual missions of service assurance and cybersecurity.

Related Articles

  • BT Americas Security Chief: Security is No Longer Just an IT Problem, It’s a Major Board Room Concern interview with Jason Cook — A global expert on security explains six key motivators that are driving enterprises and telecoms to strengthen their security protection.
  • A Big Win/Win: Protecting Mobile Users While Boosting Revenue by Dan Baker — Increasingly mobile operators will turn to the cloud to find compelling services.  This white paper explains the benefits of a cloud security service that detects and blocks malware.
  • A Powerful Tool for Fraud & Security Investigators: Real-Time Packet-to-Event Translation interview with Steven Shalita — Network forensics enables investigators to reconstruct and analyze network activity.  But automated packet-to-event translation could make forensics widely accessible to non-technical investigators.  The article explains: the new visual playback paradym; changes in packet storage strategy; and the vision of a single instrumentation instance driving multiple assurance applications.
  • Security Early Warning System: The Challenge for Telecom by James Heath & Paul Scanlon — A Denial of Service (DoS) attack is a cyber-security breach that uses a tsunami of data to overwhelm an enterprise’s connections, stopping it from communicating or doing business online.  This article explains why DoS and other security matters are coming to a head as LTE and IP expand.  Here you’ll also learn the reasons why telecoms are becoming key security partners with enterprises.
  • LTE Monitoring: The Virtue of Combining Service and Security Assurance interview with James Heath & Steve Shalita — The arrival of  LTE, the all-IP wireless standard, greatly complicates the guaranteee of service quality and security.  This article details of the many challenge and reasons why additional investments will be required to remain secure.  Fortunately a saving grace is proposed: a single Network Behavioral analysis (NBA) system for anomaly detection that serves the dual missions of service assurance and cybersecurity.
  • Single Sign-On: The Cornerstone of Network Security & Integrity interview with Sergio Pellizzari — The greatest security threat in telecom is not the careless Web surfer, but the innocent misconfiguration of network elements like routers, switches, and firewalls.  This article delves into single-sign and explains how it’s become a vital security measure.  You’ll learn about the robustness of carrier-grade vs. enterprise solutions and read examples of what can go wrong without a proper single-sign on solution in place.