SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
GRUPPO TELECOM ITALIA




How can operators merge fraud
in a full IP environment?
London, 20.03.2012



Stefano Maria De' Rossi   Daniele Gulinatti
Once upon a time:




                     COMMUNICATE
                     • voice
  What individuals   • sms
   do on mobile ?
New generation Telecom environment

             DO                         COMMUNICATE
              • documents                • voice
              • Banking                  • sms
              • Payment                  • email



                           What
                       individuals do
                        on mobile ?


            ENJOY                       FIND
             • photos/video              • info/answers
             • music                     • places
             • games                     • products
             • networking                • people
The future of mobile
Pressure is on for service providers to keep
 pace and meet the tough demand of an
        always connected lifestyle
Industry Key points
   Voice is still the main share of revenues for operators (ca. 70% ) but trend is falling:
    CAGR estimated between – 0,2% and – 1,2% with geographical exceptions (eg.
    emerging markets)
   Voice (fixed and mobile) is declining in favor of IP based communications models:
    VoIP and social communicationn (OTTs)




                         Source: Gartner (Aug 2011): WW Telecom Services Revenue Comparison   8
Industry Key points: Market Trends - Worldwide
Total mobile service revenues are increasing WW, driven by the mobile data
revenue growth - that is due to the spread of new data hungry devices,
smartphones and tablets and to the spread of apps platforms (Apps for iOS, Android
etc.)




Sources: elaboration of Ovum “Mobile Voice and Data Forecast: 2010–15”, February 2011 (based on GSMA data)
         elaboration of Gartner “Forecast: Mobile Services, Worldwide, 2007-2015, 1Q11 Update”, March 2011
Industry Key points: Mobile Internet market Trends
Global mobile data traffic will increase 26-fold between 2010 and 2015. Mobile
data traffic will grow at a compound annual growth rate (CAGR) of 92% from 2010
to 2015, reaching 6.3 exabytes per month by 2015




Source: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2010–2015, February 2011 Cisco, Global
Expected market evolution
Riding the data tsunami
Challenge ahead

Traffic volumes on mobile networks are
growing much faster than the revenue they
generate for mobile operators –this results in
operational and financial pressure for telcos
for upgrading their networks to higher
capacity and coverage.


Increasing     competition,      regulatory
pressure, and the proliferation of flat-rate
pricing for data services puts enormous
pressure on their margins.
Two vital questions




      How can operators manage the huge increase in
      data volumes?


      And where will the money come from to build the
      networks needed to handle the coming data tsunami?
      Or in other words…how to monetize the service level
      on the networks ?
Two vital questions




      How can operators manage the huge increase in
      data volumes?
4g on the horizon: LTE overview
In order to ensure their network capacity, Telco Operators are
investing in network expansion, or deploying new network
technologies, such as Long Term Evolution (LTE).


• LTE is the next step in the evolution of the Third Generation
  Partenership Project (3GPP).
• Designed to meet the high speed data and multimedia transport
  needs of Operators.
• Benefit for users are:
   •Higher data Rates
   •New service
   •Truly Mobile Broadband
LTE specification


  HSDPA                                            LTE
14 Mbps DL                                      100 Mbps DL
5,7 Mbps UL                                     50 Mbps UL




              LTE has 10X users per cell than
                          HSDPA
Voice in LTE
Voice in LTE is a disruptive moment for the Industry: not a technology evolution
but a revolution
Industry evolution: opportunity or threat ?
Industry Hot Topics – Value of Core Services

   The shift to an “All IP” network paradigm (LTE) will make voice a
    data application (VoIP) which may impact on present termination,
    interconnection and roaming business models.


   OTTs players are offering on the global marketplace voice and
    messaging services through apps (Viber, Skype, Whatsup) based on
    free business models.


   Defend Voice Business from OTTs providing voice as a “one more
    app” concept is key to protect margins and sustain investment
    capacity.
In search of outcomes: GSMA perspective



      RCS                             voLTE




    FIRM                              IMS
Two vital questions




      How can operators manage the huge increase in
      data volumes?


      And where will the money come from to build the
      networks needed to handle the coming data tsunami?
      Or in other words…how to monetize the service level
      on the networks ?
Telco battlefield
Mobile business: surfing data opportunities
 In order to move away from flat rates and offer more advanced data
 pricing models, new monetization models are needed requiring
 integration between:




         POLICY                              CHARGING
       MANAGEMENT                           CAPABILITIES
The apple experience

If consumers are willing to pay a premium for the Apple experience,
why wouldn’t they be willing to pay for the higher-quality experience
from telecom operators?
Mobile Technological evolution while protecting profitability
Telco market: new services trend
Changes in the telco world are affected by radical evolutions starting
from new technologies up to new services linked to different markets
(Internet, media, banking).




          New types of threats and frauds are on the rise
The world of fraud at a glance




        Traditional               New &
          Fraud                  Emerging POINT
                                         SUB
                                  Fraud




                      Telecom fraud
Traditional fraud

                       International Revenue share Fraud
                       Subscription/Identity Theft
                       Interconnect/By-Pass Fraud/call reselling
                       Dealer Fraud
     Traditional
                       Pbx Hacking
       Fraud
                       Incoming call bonus abuse
                       Commercial offer abuse (equipment)




               Telecom fraud
New & Emerging Fraud
 Non Authorised Content Broadcast
 Distribution of Illegal or Unwanted Content

 P2P Content Reselling

 Video Share

 Mobile/ Smartphone Malware

 Consumption of Network Resources with no                New &
  revenue or ability to bill
                                                         Emerging
 Change of billing model making it impossible to bill

 ID Spoofing (Access and Services Identity)
                                                          Fraud



                                       Telecom fraud
2011 CFCA Survey
We have to think differently …
M2M Fraud

          M2M Fraud                    Counter-Measures
  • Tampering with unattended     • Rule based - HUR, Overlap,
    devices                         Velocity, Invalid service usage
                                    etc
  • SIM Swap Cloning
                                  • Profiling – monitor deviation
  • Malware
                                    from accepted usage patterns
  • Denial of Service
                                  • Real-Time controls – using in-
  • Unauthorised access to data     line rules, tariff checks and
                                    policy controls to bar
                                    unauthorised services, or
                                    alert device owners




                                                               34
New challenges …
Fraud Management issue on a NGN


• Knowledge on NGN network Fraud
  environment
• Specifics on potential points of attack
• Specifics on what information is available
  from key points
• Information correlation necessary
• New detection techniques




                                               36
Detection issue on a NGN

• Correlation of data from multiple sources, e.g.
   • Bearer / IMS Session
   • PS Core records (actual data usage)
   • Content data / merchant information
   • Payment processes – separate records to the
      transaction records
• Much larger volumes of data
• Variety of identifiers
• Subscribers may be victims rather than
  perpetrators



                                                    37
Impact on the Fraud Management System

• Map out FMS touch points
• Need for complex event correlation
• Appropriate systems for „Big Data‟ analysis
• More effective rules management
• Invest in the right tools
• Context based usage checks and profiling
• FMS system flexibility




                                                38
Key takeaway
As an industry we need to review the structure and design of our
fraud teams in order to ensure maximum effectiveness and delivery
for our organisations.
In order to target success in our fight against frauds we must ensure
we have:

   Appropriate Structure                  Develop fraud awareness
   Correct focus & strategy               Exchange intelligence & best
   Appropriate skill sets                  practice
   Appropriate tools                      Assess the fraud exposure of
                                            new services
                                           Collaborate with other GSMA
                                            working groups and projects
STEFANOMARIA.DEROSSI@TELECOMITALIA.IT

  DANIELE.GULINATTI@TELECOMITALIA.IT

Más contenido relacionado

La actualidad más candente

2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud2600Hz
 
Anomaly Detection in Telco Networks
Anomaly Detection in Telco NetworksAnomaly Detection in Telco Networks
Anomaly Detection in Telco NetworksEsbert Frédéric
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz Asia Pte Ltd
 
Internet of things
Internet of things  Internet of things
Internet of things gule mariam
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths DebunkedJive Communications
 
03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFAChristopher Born
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is HereLancope, Inc.
 
Anomali Product Brochure
Anomali Product BrochureAnomali Product Brochure
Anomali Product BrochureTodd Helfrich
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101Cloudflare
 
Digital policing applications and services catalogue
Digital policing applications and services catalogueDigital policing applications and services catalogue
Digital policing applications and services catalogueRobin Brooke
 
Big data - Intelligence Driven Security, Roy Katmor
Big data - Intelligence Driven Security,  Roy KatmorBig data - Intelligence Driven Security,  Roy Katmor
Big data - Intelligence Driven Security, Roy KatmorMIT Forum of Israel
 
Jcj corporate blind overview november 19 2012 1-1
Jcj corporate blind  overview november 19 2012 1-1Jcj corporate blind  overview november 19 2012 1-1
Jcj corporate blind overview november 19 2012 1-1ashk4n
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Alan Quayle
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaCloudflare
 
Why Organisations Need_Barac
Why Organisations Need_BaracWhy Organisations Need_Barac
Why Organisations Need_BaracBarac
 

La actualidad más candente (20)

2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Anomaly Detection in Telco Networks
Anomaly Detection in Telco NetworksAnomaly Detection in Telco Networks
Anomaly Detection in Telco Networks
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
Internet of things
Internet of things  Internet of things
Internet of things
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
 
03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
 
Anomali Product Brochure
Anomali Product BrochureAnomali Product Brochure
Anomali Product Brochure
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Public wifi
Public wifiPublic wifi
Public wifi
 
Digital policing applications and services catalogue
Digital policing applications and services catalogueDigital policing applications and services catalogue
Digital policing applications and services catalogue
 
Big data - Intelligence Driven Security, Roy Katmor
Big data - Intelligence Driven Security,  Roy KatmorBig data - Intelligence Driven Security,  Roy Katmor
Big data - Intelligence Driven Security, Roy Katmor
 
Jcj corporate blind overview november 19 2012 1-1
Jcj corporate blind  overview november 19 2012 1-1Jcj corporate blind  overview november 19 2012 1-1
Jcj corporate blind overview november 19 2012 1-1
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
 
Why Organisations Need_Barac
Why Organisations Need_BaracWhy Organisations Need_Barac
Why Organisations Need_Barac
 

Destacado

Using Hadoop to Drive Down Fraud for Telcos
Using Hadoop to Drive Down Fraud for TelcosUsing Hadoop to Drive Down Fraud for Telcos
Using Hadoop to Drive Down Fraud for TelcosCloudera, Inc.
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security OperationsPriyanka Aash
 
Transforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using GraphsTransforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using GraphsRam Shankar Siva Kumar
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...jzadeh
 
Machine learning Mindmap
Machine learning MindmapMachine learning Mindmap
Machine learning MindmapYee Jie NG
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurityidsecconf
 
Data Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceData Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceMichael Roytman
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Alex Pinto
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big DataAmazon Web Services
 
Computer security - A machine learning approach
Computer security - A machine learning approachComputer security - A machine learning approach
Computer security - A machine learning approachSandeep Sabnani
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsPriyanka Aash
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Cybereason
 

Destacado (20)

Using Hadoop to Drive Down Fraud for Telcos
Using Hadoop to Drive Down Fraud for TelcosUsing Hadoop to Drive Down Fraud for Telcos
Using Hadoop to Drive Down Fraud for Telcos
 
Cfca Global Fraud Loss Survey2009
Cfca Global Fraud Loss Survey2009Cfca Global Fraud Loss Survey2009
Cfca Global Fraud Loss Survey2009
 
Mind mapping
Mind mapping Mind mapping
Mind mapping
 
Tackling Card not present Fraud
Tackling Card not present FraudTackling Card not present Fraud
Tackling Card not present Fraud
 
introduzione al data mining
introduzione al data mining introduzione al data mining
introduzione al data mining
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Transforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using GraphsTransforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using Graphs
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
 
CRM Value proposition - smdr
CRM Value proposition - smdrCRM Value proposition - smdr
CRM Value proposition - smdr
 
Machine learning Mindmap
Machine learning MindmapMachine learning Mindmap
Machine learning Mindmap
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurity
 
Data Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceData Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data Science
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data
 
Computer security - A machine learning approach
Computer security - A machine learning approachComputer security - A machine learning approach
Computer security - A machine learning approach
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
 

Similar a Merging fraud in a full IP environment

Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Evaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldEvaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldGENBANDcorporate
 
Telecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different futureTelecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different futureRob Van Den Dam
 
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...IDATE DigiWorld
 
Wi-Fi New Service Models For Next Generation Networks
Wi-Fi New Service Models For Next Generation NetworksWi-Fi New Service Models For Next Generation Networks
Wi-Fi New Service Models For Next Generation NetworksGreen Packet
 
3 Macro Trends That Could Put Your IT Channel Partners Out of Business
3 Macro Trends That Could Put Your IT Channel Partners Out of Business3 Macro Trends That Could Put Your IT Channel Partners Out of Business
3 Macro Trends That Could Put Your IT Channel Partners Out of BusinessZINFI Technologies, Inc.
 
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...Alan Quayle
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
 
Impact of covid 19 on sectors in India - Pinnacle Digital
Impact of covid 19 on sectors in India -  Pinnacle DigitalImpact of covid 19 on sectors in India -  Pinnacle Digital
Impact of covid 19 on sectors in India - Pinnacle DigitalAnuj Tanwar
 
Innovating and enabling digital futures 12-07-2011
Innovating and enabling digital futures   12-07-2011Innovating and enabling digital futures   12-07-2011
Innovating and enabling digital futures 12-07-2011Jude Umeh
 
Service Assurance for an All-IP environment Sep2011
Service Assurance for an All-IP environment Sep2011Service Assurance for an All-IP environment Sep2011
Service Assurance for an All-IP environment Sep2011AricentCSS
 
Telco Evolution Sample
Telco Evolution SampleTelco Evolution Sample
Telco Evolution SampleAlan Quayle
 
top Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdftop Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdfTarekHassan840678
 
8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdfonline Marketing
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionPaul Van Doorn
 
The OTT phenomena and its impact on Telecos
The OTT phenomena and its impact on TelecosThe OTT phenomena and its impact on Telecos
The OTT phenomena and its impact on TelecosAsad Habib ur Rehman
 

Similar a Merging fraud in a full IP environment (20)

Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Evaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldEvaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP World
 
Telecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different futureTelecom 2020: Preparing for a very different future
Telecom 2020: Preparing for a very different future
 
The Stupid Network
The Stupid NetworkThe Stupid Network
The Stupid Network
 
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
 
HP Event Recap: Transformation Time for Telcos
HP Event Recap: Transformation Time for TelcosHP Event Recap: Transformation Time for Telcos
HP Event Recap: Transformation Time for Telcos
 
Wi-Fi New Service Models For Next Generation Networks
Wi-Fi New Service Models For Next Generation NetworksWi-Fi New Service Models For Next Generation Networks
Wi-Fi New Service Models For Next Generation Networks
 
3 Macro Trends That Could Put Your IT Channel Partners Out of Business
3 Macro Trends That Could Put Your IT Channel Partners Out of Business3 Macro Trends That Could Put Your IT Channel Partners Out of Business
3 Macro Trends That Could Put Your IT Channel Partners Out of Business
 
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Impact of covid 19 on sectors in India - Pinnacle Digital
Impact of covid 19 on sectors in India -  Pinnacle DigitalImpact of covid 19 on sectors in India -  Pinnacle Digital
Impact of covid 19 on sectors in India - Pinnacle Digital
 
Innovating and enabling digital futures 12-07-2011
Innovating and enabling digital futures   12-07-2011Innovating and enabling digital futures   12-07-2011
Innovating and enabling digital futures 12-07-2011
 
Service Assurance for an All-IP environment Sep2011
Service Assurance for an All-IP environment Sep2011Service Assurance for an All-IP environment Sep2011
Service Assurance for an All-IP environment Sep2011
 
Telco Evolution Sample
Telco Evolution SampleTelco Evolution Sample
Telco Evolution Sample
 
top Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdftop Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdf
 
8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf8 ways Technology has helped the Talent Industry - Volt International.pdf
8 ways Technology has helped the Talent Industry - Volt International.pdf
 
Gartner summit 2009 wireless_mobile_brochure
Gartner summit 2009 wireless_mobile_brochureGartner summit 2009 wireless_mobile_brochure
Gartner summit 2009 wireless_mobile_brochure
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosion
 
The OTT phenomena and its impact on Telecos
The OTT phenomena and its impact on TelecosThe OTT phenomena and its impact on Telecos
The OTT phenomena and its impact on Telecos
 

Más de Stefano Maria De' Rossi

Tecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud managementTecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud managementStefano Maria De' Rossi
 
Data mining in support of fraud management
Data mining in support of fraud managementData mining in support of fraud management
Data mining in support of fraud managementStefano Maria De' Rossi
 
Storia della bambina e della stella marina
Storia della bambina e della stella marinaStoria della bambina e della stella marina
Storia della bambina e della stella marinaStefano Maria De' Rossi
 
Using business intelligence for competitive advantage
Using business intelligence for competitive advantageUsing business intelligence for competitive advantage
Using business intelligence for competitive advantageStefano Maria De' Rossi
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...Stefano Maria De' Rossi
 
Competitive Intelligence e Risk Managment
Competitive Intelligence e Risk ManagmentCompetitive Intelligence e Risk Managment
Competitive Intelligence e Risk ManagmentStefano Maria De' Rossi
 
Customer Profiling & Predictive Analysis
Customer Profiling & Predictive AnalysisCustomer Profiling & Predictive Analysis
Customer Profiling & Predictive AnalysisStefano Maria De' Rossi
 

Más de Stefano Maria De' Rossi (20)

Tecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud managementTecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud management
 
Crm value proposition
Crm value propositionCrm value proposition
Crm value proposition
 
2015 GALA breve presentazione_12.05
2015 GALA breve presentazione_12.052015 GALA breve presentazione_12.05
2015 GALA breve presentazione_12.05
 
GALA breve presentazione maggio 2015
GALA breve presentazione maggio 2015GALA breve presentazione maggio 2015
GALA breve presentazione maggio 2015
 
2015 GALA presentazione apr2016
2015 GALA presentazione apr20162015 GALA presentazione apr2016
2015 GALA presentazione apr2016
 
slide PROGEDIL PS da paura
slide PROGEDIL  PS da paura slide PROGEDIL  PS da paura
slide PROGEDIL PS da paura
 
Presentazione AD Mind 2012
Presentazione AD Mind 2012Presentazione AD Mind 2012
Presentazione AD Mind 2012
 
Data mining in support of fraud management
Data mining in support of fraud managementData mining in support of fraud management
Data mining in support of fraud management
 
Storia della bambina e della stella marina
Storia della bambina e della stella marinaStoria della bambina e della stella marina
Storia della bambina e della stella marina
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 
Presentazione ADM 2011
Presentazione ADM 2011Presentazione ADM 2011
Presentazione ADM 2011
 
Competitive_intelligence
Competitive_intelligenceCompetitive_intelligence
Competitive_intelligence
 
Identifying high value customers
Identifying high value customersIdentifying high value customers
Identifying high value customers
 
Costruire la relazione
Costruire la relazioneCostruire la relazione
Costruire la relazione
 
Using business intelligence for competitive advantage
Using business intelligence for competitive advantageUsing business intelligence for competitive advantage
Using business intelligence for competitive advantage
 
Competitive intelligence overview
Competitive intelligence overviewCompetitive intelligence overview
Competitive intelligence overview
 
Studio Labsus v2009
Studio Labsus v2009Studio Labsus v2009
Studio Labsus v2009
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
Competitive Intelligence e Risk Managment
Competitive Intelligence e Risk ManagmentCompetitive Intelligence e Risk Managment
Competitive Intelligence e Risk Managment
 
Customer Profiling & Predictive Analysis
Customer Profiling & Predictive AnalysisCustomer Profiling & Predictive Analysis
Customer Profiling & Predictive Analysis
 

Último

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 

Último (20)

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 

Merging fraud in a full IP environment

  • 1. GRUPPO TELECOM ITALIA How can operators merge fraud in a full IP environment? London, 20.03.2012 Stefano Maria De' Rossi Daniele Gulinatti
  • 2.
  • 3. Once upon a time: COMMUNICATE • voice What individuals • sms do on mobile ?
  • 4. New generation Telecom environment DO COMMUNICATE • documents • voice • Banking • sms • Payment • email What individuals do on mobile ? ENJOY FIND • photos/video • info/answers • music • places • games • products • networking • people
  • 5. The future of mobile
  • 6.
  • 7. Pressure is on for service providers to keep pace and meet the tough demand of an always connected lifestyle
  • 8. Industry Key points  Voice is still the main share of revenues for operators (ca. 70% ) but trend is falling: CAGR estimated between – 0,2% and – 1,2% with geographical exceptions (eg. emerging markets)  Voice (fixed and mobile) is declining in favor of IP based communications models: VoIP and social communicationn (OTTs) Source: Gartner (Aug 2011): WW Telecom Services Revenue Comparison 8
  • 9. Industry Key points: Market Trends - Worldwide Total mobile service revenues are increasing WW, driven by the mobile data revenue growth - that is due to the spread of new data hungry devices, smartphones and tablets and to the spread of apps platforms (Apps for iOS, Android etc.) Sources: elaboration of Ovum “Mobile Voice and Data Forecast: 2010–15”, February 2011 (based on GSMA data) elaboration of Gartner “Forecast: Mobile Services, Worldwide, 2007-2015, 1Q11 Update”, March 2011
  • 10. Industry Key points: Mobile Internet market Trends Global mobile data traffic will increase 26-fold between 2010 and 2015. Mobile data traffic will grow at a compound annual growth rate (CAGR) of 92% from 2010 to 2015, reaching 6.3 exabytes per month by 2015 Source: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2010–2015, February 2011 Cisco, Global
  • 12. Riding the data tsunami
  • 13. Challenge ahead Traffic volumes on mobile networks are growing much faster than the revenue they generate for mobile operators –this results in operational and financial pressure for telcos for upgrading their networks to higher capacity and coverage. Increasing competition, regulatory pressure, and the proliferation of flat-rate pricing for data services puts enormous pressure on their margins.
  • 14. Two vital questions How can operators manage the huge increase in data volumes? And where will the money come from to build the networks needed to handle the coming data tsunami? Or in other words…how to monetize the service level on the networks ?
  • 15. Two vital questions How can operators manage the huge increase in data volumes?
  • 16. 4g on the horizon: LTE overview In order to ensure their network capacity, Telco Operators are investing in network expansion, or deploying new network technologies, such as Long Term Evolution (LTE). • LTE is the next step in the evolution of the Third Generation Partenership Project (3GPP). • Designed to meet the high speed data and multimedia transport needs of Operators. • Benefit for users are: •Higher data Rates •New service •Truly Mobile Broadband
  • 17. LTE specification HSDPA LTE 14 Mbps DL 100 Mbps DL 5,7 Mbps UL 50 Mbps UL LTE has 10X users per cell than HSDPA
  • 18. Voice in LTE Voice in LTE is a disruptive moment for the Industry: not a technology evolution but a revolution
  • 20. Industry Hot Topics – Value of Core Services  The shift to an “All IP” network paradigm (LTE) will make voice a data application (VoIP) which may impact on present termination, interconnection and roaming business models.  OTTs players are offering on the global marketplace voice and messaging services through apps (Viber, Skype, Whatsup) based on free business models.  Defend Voice Business from OTTs providing voice as a “one more app” concept is key to protect margins and sustain investment capacity.
  • 21. In search of outcomes: GSMA perspective RCS voLTE FIRM IMS
  • 22. Two vital questions How can operators manage the huge increase in data volumes? And where will the money come from to build the networks needed to handle the coming data tsunami? Or in other words…how to monetize the service level on the networks ?
  • 24. Mobile business: surfing data opportunities In order to move away from flat rates and offer more advanced data pricing models, new monetization models are needed requiring integration between: POLICY CHARGING MANAGEMENT CAPABILITIES
  • 25. The apple experience If consumers are willing to pay a premium for the Apple experience, why wouldn’t they be willing to pay for the higher-quality experience from telecom operators?
  • 26. Mobile Technological evolution while protecting profitability
  • 27.
  • 28. Telco market: new services trend Changes in the telco world are affected by radical evolutions starting from new technologies up to new services linked to different markets (Internet, media, banking). New types of threats and frauds are on the rise
  • 29. The world of fraud at a glance Traditional New & Fraud Emerging POINT SUB Fraud Telecom fraud
  • 30. Traditional fraud  International Revenue share Fraud  Subscription/Identity Theft  Interconnect/By-Pass Fraud/call reselling  Dealer Fraud Traditional  Pbx Hacking Fraud  Incoming call bonus abuse  Commercial offer abuse (equipment) Telecom fraud
  • 31. New & Emerging Fraud  Non Authorised Content Broadcast  Distribution of Illegal or Unwanted Content  P2P Content Reselling  Video Share  Mobile/ Smartphone Malware  Consumption of Network Resources with no New & revenue or ability to bill Emerging  Change of billing model making it impossible to bill  ID Spoofing (Access and Services Identity) Fraud Telecom fraud
  • 33. We have to think differently …
  • 34. M2M Fraud M2M Fraud Counter-Measures • Tampering with unattended • Rule based - HUR, Overlap, devices Velocity, Invalid service usage etc • SIM Swap Cloning • Profiling – monitor deviation • Malware from accepted usage patterns • Denial of Service • Real-Time controls – using in- • Unauthorised access to data line rules, tariff checks and policy controls to bar unauthorised services, or alert device owners 34
  • 36. Fraud Management issue on a NGN • Knowledge on NGN network Fraud environment • Specifics on potential points of attack • Specifics on what information is available from key points • Information correlation necessary • New detection techniques 36
  • 37. Detection issue on a NGN • Correlation of data from multiple sources, e.g. • Bearer / IMS Session • PS Core records (actual data usage) • Content data / merchant information • Payment processes – separate records to the transaction records • Much larger volumes of data • Variety of identifiers • Subscribers may be victims rather than perpetrators 37
  • 38. Impact on the Fraud Management System • Map out FMS touch points • Need for complex event correlation • Appropriate systems for „Big Data‟ analysis • More effective rules management • Invest in the right tools • Context based usage checks and profiling • FMS system flexibility 38
  • 39. Key takeaway As an industry we need to review the structure and design of our fraud teams in order to ensure maximum effectiveness and delivery for our organisations. In order to target success in our fight against frauds we must ensure we have:  Appropriate Structure  Develop fraud awareness  Correct focus & strategy  Exchange intelligence & best  Appropriate skill sets practice  Appropriate tools  Assess the fraud exposure of new services  Collaborate with other GSMA working groups and projects
  • 40.