Email a colleague    

January 2016

A Big Win/Win: Protecting Mobile Users While Boosting Revenue

A Big Win/Win: Protecting Mobile Users While Boosting Revenue

Dear Colleague:

The mobile business has probably never been tougher.  Operators today are being hit by challenges from all directions:

  • Costly LTE and bandwidth rollouts have been great for users, but have not contributed to big revenue gains;
  • Traditional voice, SMS, and other IP services are steadily being gobbled up by OTTs;
  • Profitable roaming charges are now being undercut by regulators in some regions; and,
  • New mobile and OTT competitors continue to enter the market.

So how can operators win in today’s brutally competitive climate?

Well, I think the strategy is no different than it’s ever been: the winning operators are the ones who choose and deploy compelling services that boost revenues and profits.

Now certainly having a network technology (3G, LTE, 5G, etc.) that’s better than or equal to that of your competitors is key.  But unfortunately, network investments are planned years in advance.  So in the near term, the only place where product marketers can really influence revenue growth is in value added services.

But there’s a problem: since most value added services are IP-based today, they are quite vulnerable.  OTTs are quite adept at replicating and more cheaply delivering just about any “killer IP service” a mobile operator dreams up.

Real-Time Cloud Services in Mobile

Increasingly mobile operators will turn to the cloud to find compelling services.

These real-time cloud services will leverage a mobile operator’s unique capability to perform in-line network analytics, and then react to events through network policy.

Such in-line cloud services are now emerging in applications such as: content caching at the mobile edge, mobile device security, and enterprise service assurance.

Now Allot Communications commissioned TRI to write a paper I’m going to discuss one such service, a proven, real-time mobile user security service deployed at several global operators:

Network In-Line Malware Blocking & Web Surfing Protection
for Consumers and Small/Medium Businesses

This 10-page paper that you can freely download is entitled: A Big Win/Win: Protecting Mobile Users While Boosting Revenue: The Benefits of Providing a Real-Time Cloud Service in Malware Threat Protection for Consumers & SMBs.

Protecting Mobile Users While Boosting Revenue

Details & Benefits of a Proven Cloud Security Service

The paper discusses what the service entails, the nature of the security threat, its benefits, and the advantages it brings to the operator.  And the paper provides details on:

  • How the service attacks a growing problem: mobile security;
  • Why the time is right for 24/7 mobility protection;
  • How it can boost user satisfaction while also lowering on-going costs;
  • How the service protects the user transparently;
  • Why the service is a money-maker at various global operators;
  • Why the service is economical to maintain;
  • Some keen operating advantages it offers over device-resident software;
  • Why it’s future technology friendly; and,
  • The reasons why the services is essentially OTT-proof.

So follow the link and have a read.  It’s instructive to look at this service — not just for the many benefits it brings to the problem of malware protection — but as representative of many real-time cloud services to come.

Hope you find the paper profitable reading.

Dan Baker
Research Director, TRI

Copyright 2016 Black Swan Telecom Journal

Dan Baker

Dan Baker

Dan Baker is research director of Technology Research Institute (TRI) and editor of the on-line magazines Black Swan Telecom Journal, Top Operator, and FraudTech Journal.

Technology Research Institute (TRI) has been writing and researching telecom software and systems markets since 1994.  Its industry reports have covered the gamut of telecom systems from billing and service assurance... to customer care and provisioning.  In recent years, TRI has authored major reports on Fraud Management, Revenue Assurance and Telecom Analytics/Big Data solutions.   Contact Dan via

Black Swan Solution Guides & Papers

cSwans of a Feather

  • NuData Analyzes Behaviors to Stop Automated Fraud Attacks & Identify Fake Customers Inside the Firewall interview with Robert Capps — A cybercrime expert examines the role of behavioral analysis and explains why it’s critical even when the device identity is known.  He also explains how human-like automation is detected and why an analysis of browser level activity delivers an extra edge in identifying fraud attacks.
  • Metadata Toolkit: Mediating the IP Network in Support of Fresh Security Apps interview with Bob Noel — Mediating the IP network has always been an issue due to its sheer complexity.  But now a clever software supplier uses metadata to abstract network events and economically enable the development of near-real-time security apps.
  • A Big Win/Win: Protecting Mobile Users While Boosting Revenue by Dan Baker — Increasingly mobile operators will turn to the cloud to find compelling services.  This white paper explains the benefits of a cloud security service that detects and blocks malware.
  • LTE Monitoring: The Virtue of Combining Service and Security Assurance interview with James Heath & Steve Shalita — The arrival of  LTE, the all-IP wireless standard, greatly complicates the guaranteee of service quality and security.  This article details of the many challenge and reasons why additional investments will be required to remain secure.  Fortunately a saving grace is proposed: a single Network Behavioral analysis (NBA) system for anomaly detection that serves the dual missions of service assurance and cybersecurity.

Related Articles