TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management.

Size: px
Start display at page:

Download "TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management."

Transcription

1 NICC London 8 November 2017 Robert Baker European Managing Director First Orion rbaker@firstorion.com TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management. 1

2 TPS Protect The Launch What Does the App do? Trust Score Unobtrusive 2 How does this enhance the TPS services? Why do this now? Allows TPS registration TPS legislation from 1999 Provides a consolidated complaint flow TPS successfully prevents telemarketing calls ~40% Protect Consumers from scam callers Scam and nuisance calls increasing on mobile. Provide Consumers information about telemarketers Lack of official mobile solutions left market open for many unscrupulous OTTs / OEMs 1 Scam 2

3 TPS Protect - Android version key: In clear Anonymized Register: Number -> Pseudo- Number Data Stored on App - Number - Pseudo-Number If user files a complaint - - Postcode Register Subscribers for TPS Number, , postcode Registration Data, number and date App Data Engine / Subscribers file FONES complaints Calling Party Number CLOUD Contact Details (Dependent on report flow) Contact Number, , Address. Collect call data realtime data TPS Register TPS s Blocks, Approves, Lookups, Reports, Data Calls received, Disposition, Duration, who hung up. 3

4 TPS Protect - IOS Version provides less data key: In clear Anonymized Register: Number -> Pseudo- Number Data Stored on App - Number - Pseudo-Number If user files a complaint - - Postcode Register Subscribers for TPS Number, , postcode Registration Data, number and date App Data Engine / Subscribers file FONES complaints Calling Party Number CLOUD Contact Details (Dependent on report flow) Contact Number, , Address. Collect call data realtime data TPS Register TPS s Blocks, Approves, Lookups, Reports, data 4

5 Big Data Solution producing a score TPS Protect ollectsand analyzes the disparate data points, distilling that data down into comprehensive and insightful consumable output units Selected Raw Data Selected Refined Data Real-time Scores Every 10 Minutes Time of Call R&VT info Peak Day Category Volume Geo Distribution 30-Day Blocks Robo Flag Lookups Total Blocks Peak Hour Answer Rate Volume by Minimum Threshold Failed Call Rate FCC Volume Volume Ratio TelcomFiles (e.g. LERG) Block Ratio Scam Indicators 30-Day Volume Unique Individuals called FCC Robo Flag In Block List Vol Score Block Score Volume Spike Score Answer / Delivery Rates Hourly Nuisance Value Scores Call Duration Data Sources Real-Time Scoring Call Categories Patented Algorithm Data Scientists Informational Call Registry Research & Verification Team 5

6 A glimpse into the future of Scam calls in the UK? Issues today OTT apps that over-rate calls as scams based on user feedback alone Carriers doing their own blocking Lack of transparency who blocked my calls? Who do I complain to? Focus on reducing quantity Scams the most difficult to protect against but do the most damage Data is king the big carriers have an advantage CLI is meaningless 6

7 T-Mobile (USA) Scam ID, Scam Block and NAME ID Enable scam notification by default. Allow users to opt-in to scam blocking via feature codes, apps and portals. ScamID and ScamBlock all users are eligible USSD Code easy to access No application required all network based Reporting & feedback loop for users (web portal) Industry Portal to register legitimate numbers Report phone harassment directly to the FTC / FCC Headline numbers / facts 76.5 Million users Missing ~10 in 1 Million scam calls Over tagging ~2 in 1 million scam calls And Improving Finger Printing technique Passive layer 2 traffic mirror

8 How does this work? Origination options Research team Regulatory Data TDR & Suspicious Traffic INDEPENDEN T THIRD PARTY Cloud Analytics / Scoring / Categorization Connect User reporting through Apps & Portals Protect User Pref erences Run-time updates & Preferences Number activity data 3rd party other Carrier data Carrier Network Termination options Block Alert Answer Traffic mirror Query Response VM ( SIP, CAMEL, INAP, AIN, ISUP, ENUM, HTTP/REST, CNAM ) Carrier Call Processing Flow CAPTCHA or Whisper No Longer Rely on CLI Passive Layer 2 taps allows characteristics of a scam call to be modelled in real-time 8

9 Simplified view Carrier A Create a central independent number reputation database Carrier B Solution that identifies scams regardless of spoofing Level playing field for all carriers Score and Category Call Data aggregate d and anonymize d Carrier D TPS Data Engine Carrier C Highly transparent why are my calls being blocked? One stop shop Independent solution, carriers no longer making their own decisions Consistent with approach in Canada (CRTC and Carrier Consortium) Make use of DoNotOriginate and industry portal for legitimate numbers ABOVE ALL THIS IS THE BEST

10 STIR/SHAKEN will help thwart Spoofing. Analytics are a MUST to identify Scams. Phone numbers can be good and bad at the same time SHAKEN does not change this Fingerprinting/analytics can discern good from bad in both signed and unsigned traffic The same number can make signed good calls, unsigned good calls, and spoofed scam calls SHAKEN allows call scoring to be more definitive for verified calls If IXCs implement SHAKEN it will be a huge help SHAKEN offers protection for good users of good numbers Not Scam Signed/Verified Good Good Bad Bad Not Signed/Verified Scam M3AAWG 41st General Meeting Toronto October 2017

11 Scammers response to STIR/SHAKEN? SIM Boxes Multi-User VoIP Survey Call Centers PBX/RTP Hacking M3AAWG 41st General Meeting Toronto October 2017

12 This caller is Evil (his number is a tool) SHAKEN Added protection for good callers Verifies a CLI is not spoofed Cannot attest to caller intent Doesn t prove the caller is who they say they are Traceback is a must Analytics Needed to identify Scam calls with or without SHAKEN Needs to include signaling fingerprinting May need to include RTP fingerprinting in the future M3AAWG 41st General Meeting Toronto October 2017

13 What can I do? Recommend TPS Protect to your mobile customers It is free for scam identification Enhances the TPS Service by providing protection Consider the future for eradicating scam calls TPS Protect in-network gets better with more data and the more carriers that use it SHAKEN/STIR provides more data but does not solve the problem of scam and nuisance calls on its own A shared number reputation database provides the best solution for YOUR 13 customers

Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar

Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Panelists: Dr. Eric Burger Chief Technology Officer FCC Jim McEachern Principal Technologist ATIS Moderator: Brent Struthers STI-GA

More information

Understanding Cyber Attacks That Leverage the Telephony Channel

Understanding Cyber Attacks That Leverage the Telephony Channel SESSION ID: CCT-R04 Understanding Cyber Attacks That Leverage the Telephony Channel Payas Gupta Research Scientist CRISSP-AD, New York University Abu Dhabi payasgupta@nyu.edu In collaboration with Mustaque

More information

Bob Gnapp Director Member Training & Network Analysis

Bob Gnapp Director Member Training & Network Analysis Robocalls and Spoofing Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 This presentation may be used by attendees for informational purposes only. No part of this presentation

More information

Robocalls and Rural Call Completion Issues

Robocalls and Rural Call Completion Issues Robocalls and Rural Call Completion Issues Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 Copyright 2018 National Exchange Association, Inc. All rights reserved. This

More information

Robocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98

Robocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98 Robocall signaling draft-sipcore-callinfo-spam Henning Schulzrinne IETF 98 Background (for the un-stired and un-shaken) Unwanted calls are typically some are illegal, some are just unwanted (by many) example:

More information

CHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS

CHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS Media Contact: Will Wiquist, (202) 418-0509 will.wiquist@fcc.gov For Immediate Release CHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS Call Authentication

More information

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017 Response of Microsoft Corporation to Ofcom s consultation document Guidelines for CLI Facilities 14 November 2017 14 November 2017 Microsoft s response to Ofcom s consultation on changes to the CLI guidelines

More information

Beyond Blind Defense: Gaining Insights from Proactive App Sec

Beyond Blind Defense: Gaining Insights from Proactive App Sec Beyond Blind Defense: Gaining Insights from Proactive App Sec Speaker Rami Essaid CEO Distil Networks Blind Defense Means Trusting Half Your Web Traffic 46% of Web Traffic is Bots Source: Distil Networks

More information

Robocall and fake caller-id detection

Robocall and fake caller-id detection Technical Disclosure Commons Defensive Publications Series December 01, 2017 Robocall and fake caller-id detection Junda Liu Naveen Kalla Shi Lu Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

January 14, Advanced Methods To Target and Eliminate Unlawful Robocalls, WC Docket No

January 14, Advanced Methods To Target and Eliminate Unlawful Robocalls, WC Docket No Amanda E. Potter AT&T Services, Inc. Assistant Vice President- 1120 20th Street, NW Senior Legal Counsel Suite 1000 Washington, DC 20036 Phone: 202.457.2103 E-mail: amanda.potter@att.com January 14, 2019

More information

paladin vendor report 2017

paladin vendor report 2017 paladin vendor report 2017 Introduction At Paladin Group, we re deeply immersed in the fraud solution landscape. It s our day-to-day work to understand the latest solution providers, services, and tools.

More information

AdaptiveMobile Security Practice

AdaptiveMobile Security Practice AdaptiveMobile Security Practice Overview & Case Study AdaptiveMobile s Security Practice provide a suite of managed security services undertaking analysis of potential threats in networks and delivering

More information

STIR and SHAKEN Framework Overview. IIT Real-Time Conference 2016 Chris Wendt

STIR and SHAKEN Framework Overview. IIT Real-Time Conference 2016 Chris Wendt STIR and SHAKEN Framework Overview IIT Real-Time Conference 2016 Chris Wendt 1 Introduction - Telephone Network The telephone network is a complex set of interconnecting devices and network devices This

More information

THE EVOLUTION OF CALLER ID FOR MOBILE, IP, AND OTT Renewing Truth in Calling with Secure Caller Identity

THE EVOLUTION OF CALLER ID FOR MOBILE, IP, AND OTT Renewing Truth in Calling with Secure Caller Identity DATA SERVICES WHITE PAPER THE EVOLUTION OF CALLER ID FOR MOBILE, IP, AND OTT Renewing Truth in Calling with Secure Caller Identity TABLE OF CONTENTS 2 EXECUTIVE SUMMARY 3 4 4 5 6 6 6 9 9 THE TELEPHONE

More information

A Plan For Robocalls: Robosmelter

A Plan For Robocalls: Robosmelter A Plan For Robocalls: Robosmelter Ben Klang, Sene Sorrow Mojo Lingo LLC January 17, 2013 Submitted to the Federal Trade Commission s Robocall Challenge Abstract The rise of Voice over IP (VoIP) technologies

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for ios User Guide Version 1.2.2 12 December 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for ios User Guide Version 1.0 26 June 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and

More information

Privacy. Looking Ahead. J. Trevor Hughes Executive Director International Association of Privacy Professionals

Privacy. Looking Ahead. J. Trevor Hughes Executive Director International Association of Privacy Professionals Privacy Looking Ahead J. Trevor Hughes Executive Director International Association of Privacy Professionals Emerging Privacy Issues Show me the harm: ID Theft SSNs Spam Telemarketing FCRA Security The

More information

The Spoofing/Authentication Threat

The Spoofing/Authentication Threat The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally

More information

Redefining Mobile Advertising in Africa

Redefining Mobile Advertising in Africa Redefining Mobile Advertising in Africa The challenge of mobile marketing Marketers today struggle with the following: Reaching enough customers Targeting precise audiences Performance & ROI Adrenaline

More information

Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers

Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda

More information

Machine-Powered Learning for People-Centered Security

Machine-Powered Learning for People-Centered Security White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today

More information

Chess Entries 4 All Website Privacy Policy

Chess Entries 4 All Website Privacy Policy Chess Entries 4 All Website Privacy Policy Introduction This website is operated Mmes Billington-Phillips.co and we are a controller for the purposes of the Data Protection Act 1998 and the EU General

More information

31M. Emergency Routing Service 24/7/365. Emergency Routing Service (ERS) provides organizations with E9-1-1

31M. Emergency Routing Service 24/7/365. Emergency Routing Service (ERS) provides organizations with E9-1-1 Emergency Routing Service SAFETY SERVICES Emergency Routing Service (ERS) provides organizations with E9-1-1 call routing and enhanced location delivery to over 6,000 Public Safety Answering Points (PSAPs)

More information

Behind the Yellow Curtain Symantec s Proactive Protection and Detection Technology

Behind the Yellow Curtain Symantec s Proactive Protection and Detection Technology Behind the Yellow Curtain Symantec s Proactive Protection and Detection Technology Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer 1 A Feedback Loop: Products and Big Data Intelligence

More information

Open mustard seed. Patrick Deegan, Ph.D. ID3

Open mustard seed. Patrick Deegan, Ph.D. ID3 Open mustard seed Patrick Deegan, Ph.D. ID3 OpenSocial FSN (draft) August 8, 2013 Open Mustard Seed (OMS) Introduction The OMS Trustworthy Compute Framework (TCF) extends the core functionality of Personal

More information

Our Data Protection Officer is Andrew Garrett, Operations Manager

Our Data Protection Officer is Andrew Garrett, Operations Manager Construction Youth Trust Privacy Notice We are committed to protecting your personal information Construction Youth Trust is committed to respecting and keeping safe any personal information you share

More information

AMP-Based Flow Collection. Greg Virgin - RedJack

AMP-Based Flow Collection. Greg Virgin - RedJack AMP-Based Flow Collection Greg Virgin - RedJack AMP- Based Flow Collection AMP - Analytic Metadata Producer : Patented US Government flow / metadata producer AMP generates data including Flows Host metadata

More information

Ex Parte Advanced Methods to Target and Eliminate Unlawful Robocalls -- CG Docket No

Ex Parte Advanced Methods to Target and Eliminate Unlawful Robocalls -- CG Docket No 1200 G Street, NW P: +1 202-628-6380 Suite 500 W: www.atis.org Washington, DC 20005 May 4, 2017 Via Email Marlene H. Dortch Secretary Federal Communications Commission 445 12th Street, S.W. Washington,

More information

LONG TERM TECHNICAL OPTIONS

LONG TERM TECHNICAL OPTIONS LONG TERM TECHNICAL OPTIONS CRTC/MAAWG Workshop on Caller ID Spoofing Montreal June 18-19 2014 Richard Shockey Shockey Consulting Chairman of the Board SIP Forum Reston, VA 20291 richard@shockey.us Voice

More information

Industry Webinar. National Lifeline Accountability Database. Wednesday, October 29, 2014

Industry Webinar. National Lifeline Accountability Database. Wednesday, October 29, 2014 National Lifeline Accountability Database Industry Webinar Wednesday, October 29, 2014 Agenda Registration for webinars through the end of 2014 is now available on our website Topics by audience request

More information

Technical Brief: DYN DELIVERY

Technical Brief: DYN  DELIVERY Technical Brief: DYN EMAIL DELIVERY 603 668 4998 Technical Brief: Dyn Email Delivery Introduction Dyn s Email Delivery platform allows reputable senders to send both bulk and transactional emails to their

More information

Artificial Intelligence Drives the next Generation of Internet Security

Artificial Intelligence Drives the next Generation of Internet Security Artificial Intelligence Drives the next Generation of Internet Security Sam Lee Regional Director sam.lee@cujo.com Copyright 2017 CUJO LLC, All rights reserved. Artificial Intelligence Leads the Way Copyright

More information

1 of 11 10/1/ :26 AM

1 of 11 10/1/ :26 AM 1 of 11 10/1/2010 12:26 AM About Us Careers Calculators Contact Us Search Home Your Money HQ ID Theft & Fraud FRAUD ALERT E-mail Scams ID Theft and Fraud Avoid Becoming a Victim What To Do If You Are a

More information

Video Interconnection Exchange (VIE)

Video Interconnection Exchange (VIE) VIE makes video calling as simple and ubiquitous as traditional voice calling - regardless of network, service or device. VIE: THE WORLD'S FIRST GLOBAL VIDEO EXCHANGE BRINGING TOGETHER VIDEO CONFERENCING

More information

African Theatre Association (AfTA) PRIVACY POLICY

African Theatre Association (AfTA) PRIVACY POLICY African Theatre Association (AfTA) PRIVACY POLICY 1. Our Privacy Pledge We store your personal data safely. We won't share your details with anyone else. You can change your preferences or opt out from

More information

TCPA Features Guide. 100 Enterprise Way, Suite A-300. Scotts Valley, CA

TCPA Features Guide. 100 Enterprise Way, Suite A-300. Scotts Valley, CA TCPA Features Guide West Corporation 100 Enterprise Way, Suite A-300 Scotts Valley, CA 95066 888-527-5225 www.schoolmessenger.com Table of Contents Introduction... 3 The Telephone Consumer Protection Act

More information

Contact: Wealth Passport Help Center

Contact: Wealth Passport Help Center Wealth Passport Mobile Version 1.0 Getting Started Guide Contact: Wealth Passport Help Center 888-635-5350 1 DOWNLOADING THE WEALTH PASSPORT APP iphone Download 1. Open the Apple App Store app on your

More information

How to Select the Right Marketing Cloud Edition

How to Select the Right Marketing Cloud Edition How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire

More information

TAKING NETWORK TESTING TO THE NEXT LEVEL

TAKING NETWORK TESTING TO THE NEXT LEVEL TAKING NETWORK TESTING TO THE NEXT LEVEL WELCOME TO THE NEXT LEVEL OF NETWORK TESTING. Do you understand the performance and customer experience of your mobile network? P3 does. Our holistic approach is

More information

OnlineNIC PRIVACY Policy

OnlineNIC PRIVACY Policy OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.

More information

TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS.

TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS. TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS Introduction State and local government departments, agencies and groups face a wide variety of events. Each have their own unique characteristics.

More information

Scam Call Trends and Projections Report

Scam Call Trends and Projections Report Scam Call Trends and Projections Report Fall 2018 While the scam call epidemic continues to grow, consumers are actively searching for ways to protect themselves against annoying and often fraudulent calls.

More information

Advanced Malware Protection: A Buyer s Guide

Advanced Malware Protection: A Buyer s Guide Advanced Malware Protection: A Buyer s Guide What You Will Learn This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should

More information

F5 DDoS Hybrid Defender : Setup. Version

F5 DDoS Hybrid Defender : Setup. Version F5 DDoS Hybrid Defender : Setup Version 13.1.0.3 Table of Contents Table of Contents Introducing DDoS Hybrid Defender... 5 Introduction to DDoS Hybrid Defender...5 DDoS deployments... 5 Example DDoS Hybrid

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid

More information

Whitepaper. Jan 16, 2019 Version 2.0. R o b o c a l l s. i o Page 1

Whitepaper. Jan 16, 2019 Version 2.0. R o b o c a l l s. i o Page 1 Whitepaper Jan 16, 2019 Version 2.0 R o b o c a l l s. i o Page 1 Table of Contents 1. Overview 1.1 Communications Market Overview 2. Previous Attempts to Eliminate Spam Calls That Failed 2.1 Do Not Call

More information

Load Balancer Survival Tips: Black Friday & Cyber Monday

Load Balancer Survival Tips: Black Friday & Cyber Monday Load Balancer Survival Tips: Black Friday & Cyber Monday EBOOK c07.18 The annual holiday shopping season starting with Black Friday is the litmus test for application availability and performance for online

More information

GTB Enterprise Contact Center Powered by Telax Included In Package Not Included in Package

GTB Enterprise Contact Center Powered by Telax Included In Package Not Included in Package GTB Enterprise Contact Center Powered by Telax Max Calls In Queue Unlimited Unlimited Data Center Features 24x7x365 Data Center Monitoring Yes Yes Geographical Survivability Yes Yes Automatic Software

More information

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Automated Response in Cyber Security SOC with Actionable Threat Intelligence Automated Response in Cyber Security SOC with Actionable Threat Intelligence while its biggest weakness is lack of visibility: SOCs still can t detect previously unknown threats, which is a consistent

More information

Video AI Alerts An Artificial Intelligence-Based Approach to Anomaly Detection and Root Cause Analysis for OTT Video Publishers

Video AI Alerts An Artificial Intelligence-Based Approach to Anomaly Detection and Root Cause Analysis for OTT Video Publishers Video AI Alerts An Artificial Intelligence-Based Approach to Anomaly Detection and Root Cause Analysis for OTT Video Publishers Live and on-demand programming delivered by over-the-top (OTT) will soon

More information

P a g e 1 ROBOCALLS 2.0

P a g e 1 ROBOCALLS 2.0 P a g e 1 P a g e 2 Whitepaper Aug 13, 2018 Version 0.1 Table of Contents Document Control..1 1. Overview... 3 2. Architecture Overview... 3 3. Robocalls Issue Overview... 3 4. The Application... 4 4.1.

More information

Industry Robocall Strike Force Report

Industry Robocall Strike Force Report Industry Robocall Strike Force Report April 28, 2017 1. Introduction (AT&T) 1.1. Overview On October 26, 2016, the Industry Robocall Strike Force issued a report describing progress made during the first

More information

The Keys to Monitoring Internal Web Applications

The Keys to Monitoring Internal Web Applications WHITEPAPER The Keys to Monitoring Internal Web Applications Much of the focus on applications today revolves around SaaS apps delivered from the cloud. However, many large enterprises are also required

More information

A1. Technical methodology

A1. Technical methodology A1. Technical methodology The Ofcom mobile research app project is the latest phase of Ofcom s work to measure mobile performance and the consumer experience of using mobile services. The new methodology

More information

Nuance Loop Voice & Data Credit

Nuance Loop Voice & Data Credit Nuance Loop Voice & Data Credit 2018 Nuance Communications, Inc. All rights reserved 2 Nuance Loop - delivering increased revenue and ARPU for mobile operators Mobile operators face increasing pressure

More information

Privacy Policy Közbeszerzés Figyelő Ltd.

Privacy Policy Közbeszerzés Figyelő Ltd. Privacy Policy Közbeszerzés Figyelő Ltd. Privacy Policy Közbeszerzés Figyelő Ltd.... 1 Privacy policy... 1 Online shopping... 4 Direct marketing... 5 Customer service... 7 Developement and improvement...

More information

A revolutionary visual security and analytics solution

A revolutionary visual security and analytics solution A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing

More information

UC Office for Smart Phone - iphone Edition

UC Office for Smart Phone - iphone Edition UC Office for Smart Phone - iphone Edition User Guide Revision 1.0 Contents 1 INTRODUCTION... 1 1.1 Overview... 1 2 REQUIREMENTS... 1 2.1 Hardware and Software Requirements... 1 2.2 Licensing Requirements...

More information

Kaspersky Security Network

Kaspersky Security Network The Kaspersky Security Network (KSN) is a complex distributed infrastructure dedicated to intelligently processing cybersecurity-related data streams from millions of voluntary participants around the

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

PALLADION Feature Set

PALLADION Feature Set PALLADION Feature Set FEATURE SET Introduction: PALLADION makes the job of running SIP based network infrastructure much more straightforward, resulting in much more reliable and predictable SIP based

More information

Real-Time Communications Witout Boundaries. Ribbon Policy Solutions

Real-Time Communications Witout Boundaries. Ribbon Policy Solutions Real-Time Communications Witout Boundaries Ribbon Policy Solutions As SIP session traffic continues to grow a trend accelerated by the rapid adoption of multimedia devices like smartphones and tablets

More information

National PCC Day workshop

National PCC Day workshop National PCC Day workshop The Power of INFORMED VISIBILITY (IV ) Digital Intelligence! The United States Postal Service (USPS ) is connecting digital intelligence with the physical world expanding mail

More information

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS

More information

Top 10 use cases of HP ArcSight Logger

Top 10 use cases of HP ArcSight Logger Top 10 use cases of HP ArcSight Logger Sridhar Karnam @Sri747 Karnam@hp.com #HPSecure Big data is driving innovation The Big Data will continue to expand Collect Big Data for analytics Store Big Data for

More information

Privacy Information - Privacy and Cookies Policy In Full

Privacy Information - Privacy and Cookies Policy In Full Privacy Information - Privacy and Cookies Policy In Full Contents 1. Introduction & General Terms 2. Who are we? 3. What information will Gaucho collect about me? 4. How will Gaucho use the information

More information

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief Adaptive Authentication Adapter for Juniper SSL VPNs Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing

More information

VERIZON ACHIEVES BEST IN TEST AND WINS THE P3 MOBILE BENCHMARK USA

VERIZON ACHIEVES BEST IN TEST AND WINS THE P3 MOBILE BENCHMARK USA VERIZON ACHIEVES BEST IN TEST AND WINS THE P3 MOBILE BENCHMARK USA INTRODUCTION in test 10/2018 Mobile Benchmark USA The international benchmarking expert P3 has been testing the performance of cellular

More information

DETAIL OF THE WORK ITEM ON GROWTH OF VALUE ADDED SERVICES

DETAIL OF THE WORK ITEM ON GROWTH OF VALUE ADDED SERVICES ASIA-PACIFIC TELECOMMUNITY 1 st Meeting of SATRC Working Group on Policy, Regulation and Services in SAP-IV Document 22 23 October 2012, Tehran, Islamic Rep. of Iran 22 October 2012 Pakistan Telecommunication

More information

CLX Campaign Manager User Guide

CLX Campaign Manager User Guide CLX Campaign Manager User Guide The purpose of this Guide is to briefly describe usage of the Campaign Manager Portal. This tool is used to ingest US Shortcode based Campaigns. This guide details what

More information

A Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync

A Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync A Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync Introduction Microsoft Lync connects people everywhere as part of their everyday productivity experience. When issues

More information

Cisco Webex Messenger

Cisco Webex Messenger Cisco Webex Messenger This describes the processing of personal data (or personal identifiable information) by Cisco Webex Messenger. 1. Overview of Cisco Webex Messenger Capabilities Cisco Webex Messenger

More information

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH PRIVACY NOTICE Curv360 is a part of the Project Better Energy Limited group of companies and is a controller of any personal data you provide. We respect your data and your privacy is important to us.

More information

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents The first truly secure way to easily and quickly sign and exchange digitally approved documents Electronic signature functionality is rapidly becoming an essential tool in every business, with users increasingly

More information

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development

More information

He lios. Complete Cloud Telephony Solution. Simply packed with clever features to help you make the most of your telephone communications

He lios. Complete Cloud Telephony Solution. Simply packed with clever features to help you make the most of your telephone communications Complete Cloud Telephony Solution NIMBOS COMMUNICATIONS LTD Tel: 03330 433550 Simply packed with clever features to help you make the most of your telephone communications Introduction Helios is a cost

More information

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

PRIVACY POLICY Last Updated May, 2018

PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY OVERVIEW This Privacy Policy establishes rules to govern the collection, use and disclosure of personal information collected by Banff & Lake Louise

More information

BT CLOUD VOICE COMMUNICATOR USER GUIDE.

BT CLOUD VOICE COMMUNICATOR USER GUIDE. BT CLOUD VOICE COMMUNICATOR iphone EDITION. USER GUIDE. WHAT S IN THIS GUIDE. 1. Introduction. 3 1.1 Overview 3 1.2 Audience 3 2. Requirements. 4 2.1 Hardware & Software Requirements 4 2.2 Licensing Requirements

More information

Over-the-Top B2C Mobile Messaging

Over-the-Top B2C Mobile Messaging Over-the-Top B2C Mobile Messaging B2C Messaging Today B2C mobile messaging is a multi-billion dollar market in growth mode and is used by businesses to attract, retain, and engage with customers for both

More information

Carrier Reliability & Management: Overview of Plivo s Carrier Network

Carrier Reliability & Management: Overview of Plivo s Carrier Network Carrier Reliability & Management: Overview of Plivo s Carrier Network Build your company on direct connections with access to 1600+ carrier networks WWW.PLIVO.COM/CARRIERS Global Coverage with Latency-free

More information

Protect vital DNS assets and identify malware

Protect vital DNS assets and identify malware N2 THREATAVERT Protect vital DNS assets and identify malware Service Providers recognize network security drives brand equity because it directly impacts subscriber satisfaction. Secure networks are also

More information

Copyright 2018 Trend Micro Incorporated. All rights reserved.

Copyright 2018 Trend Micro Incorporated. All rights reserved. Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent

More information

Unified Communication Platform

Unified Communication Platform fonouc Unified Communication Platform fonouc Unified Communications Service Platform, is a scalable, managed, turnkey solution for carries and service providers, designed to provide multi-tenant business

More information

PROTECT AND AUDIT SENSITIVE DATA

PROTECT AND AUDIT SENSITIVE DATA PROTECT AND AUDIT SENSITIVE DATA Teleran Data and Compliance KEY FEATURES Monitors user, application, query and data usage activity Enforces data access policies in real-time Alerts staff in real-time

More information

Update from the RIPE NCC

Update from the RIPE NCC Update from the RIPE NCC INEX Meeting, Dublin, 14 December 2011 Mirjam Kühne, RIPE NCC Outline RIPE Labs - Background, Purpose, Content, Participation IPv6 Activities and Statistics RIPE Atlas RIPEstat

More information

Fraude dans la Telephonie

Fraude dans la Telephonie Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem

More information

Automated Call Quality, CLI and Performance Testing

Automated Call Quality, CLI and Performance Testing . Automated Call Quality, CLI and Performance Testing 2 itest The most comprehensive test platform available. itest is a testing and performance monitoring platform designed specifically for the 21st Century

More information

Master Every Stage of Your Mobile App Lifecycle: Micro Focus Mobile Center. Brochure. Application Development, Test & Delivery

Master Every Stage of Your Mobile App Lifecycle: Micro Focus Mobile Center. Brochure. Application Development, Test & Delivery Master Every Stage of Your Mobile App Lifecycle: Micro Focus Mobile Center Brochure Application Development, Test & Delivery Brochure Master Every Stage of Your Mobile App Lifecycle: Center Master the

More information

Insight Frequently Asked Questions version 2.0 (8/24/2011)

Insight Frequently Asked Questions version 2.0 (8/24/2011) Insight Frequently Asked Questions version 2.0 (8/24/2011) Insight Overview 1. What is a reputation system and how does it work? Insight, our reputation system, leverages anonymous telemetry data from

More information

Canadian Radio television and Telecommunications Commission. Interconnection Steering Committee. Report to the CRTC. by the

Canadian Radio television and Telecommunications Commission. Interconnection Steering Committee. Report to the CRTC. by the Canadian Radio television and Telecommunications Commission Interconnection Steering Committee Report to the CRTC by the Emergency s Working Group (ESWG) Phase II Stage 2 Feature Analysis - Update Report

More information

AlertTraveler Mobile App User Guide

AlertTraveler Mobile App User Guide AlertTraveler Mobile App User Guide AlertTraveler is a mobile application for ios and Android devices that utilizes GPS and your travel itinerary. AlertTraveler provides you with country and city intelligence

More information

Into the cloud... Based on a true story. SnapComms delivers critical internal communications solution to a global market

Into the cloud... Based on a true story. SnapComms delivers critical internal communications solution to a global market Into the cloud... Based on a true story SnapComms delivers critical internal communications solution to a global market 1,600,000 end-users worldwide 10,000,000 global connections per hour 40 Dedicated

More information

January 14, Dear Commissioner Rosenworcel:

January 14, Dear Commissioner Rosenworcel: David C. Bartlett Vice President Federal Government Affairs 1099 New York Ave., NW, Suite 250 Washington, DC 20001 202-429-3101 January 14, 2019 Hon. Jessica Rosenworcel Commissioner Federal Communications

More information

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template RFP/RFI Questions for Managed Security Services Sample MSSP RFP Template Table of Contents Request for Proposal Template Overview 1 Introduction... 1 How to Use this Document... 1 Suggested RFP Outline

More information

PRIVACY POLICY QUICK GUIDE TO CONTENTS

PRIVACY POLICY QUICK GUIDE TO CONTENTS PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),

More information

AT&T Messaging as a Platform (MaaP)

AT&T Messaging as a Platform (MaaP) AT&T Messaging as a Platform (MaaP) Neil McGrath (nm1499@att.com) Lead End-to-End Architect Multi-Device Cloud Messaging (CM) Messaging as a Platform (MaaP) MaaP Overview Payment Services Digital Goods

More information

sipmon DATASHEET sipmon datasheet contains comprehensive list of features and their detailed description.

sipmon DATASHEET sipmon datasheet contains comprehensive list of features and their detailed description. sipmon DATASHEET sipmon datasheet contains comprehensive list of features and their detailed description. PRICELESS VISIBILITY OF CLIENTS` NETWORK Warning you before your customers do. sipmon sipmon is

More information

Telecom Decision CRTC

Telecom Decision CRTC Telecom Decision CRTC 2015-496 PDF version Ottawa, 6 November 2015 File number: 8621-C12-01/08 CISC Canadian Steering Committee on Numbering Revised Canadian International Mobile Subscriber Identity Guideline

More information