TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management.
|
|
- Angela Townsend
- 5 years ago
- Views:
Transcription
1 NICC London 8 November 2017 Robert Baker European Managing Director First Orion rbaker@firstorion.com TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management. 1
2 TPS Protect The Launch What Does the App do? Trust Score Unobtrusive 2 How does this enhance the TPS services? Why do this now? Allows TPS registration TPS legislation from 1999 Provides a consolidated complaint flow TPS successfully prevents telemarketing calls ~40% Protect Consumers from scam callers Scam and nuisance calls increasing on mobile. Provide Consumers information about telemarketers Lack of official mobile solutions left market open for many unscrupulous OTTs / OEMs 1 Scam 2
3 TPS Protect - Android version key: In clear Anonymized Register: Number -> Pseudo- Number Data Stored on App - Number - Pseudo-Number If user files a complaint - - Postcode Register Subscribers for TPS Number, , postcode Registration Data, number and date App Data Engine / Subscribers file FONES complaints Calling Party Number CLOUD Contact Details (Dependent on report flow) Contact Number, , Address. Collect call data realtime data TPS Register TPS s Blocks, Approves, Lookups, Reports, Data Calls received, Disposition, Duration, who hung up. 3
4 TPS Protect - IOS Version provides less data key: In clear Anonymized Register: Number -> Pseudo- Number Data Stored on App - Number - Pseudo-Number If user files a complaint - - Postcode Register Subscribers for TPS Number, , postcode Registration Data, number and date App Data Engine / Subscribers file FONES complaints Calling Party Number CLOUD Contact Details (Dependent on report flow) Contact Number, , Address. Collect call data realtime data TPS Register TPS s Blocks, Approves, Lookups, Reports, data 4
5 Big Data Solution producing a score TPS Protect ollectsand analyzes the disparate data points, distilling that data down into comprehensive and insightful consumable output units Selected Raw Data Selected Refined Data Real-time Scores Every 10 Minutes Time of Call R&VT info Peak Day Category Volume Geo Distribution 30-Day Blocks Robo Flag Lookups Total Blocks Peak Hour Answer Rate Volume by Minimum Threshold Failed Call Rate FCC Volume Volume Ratio TelcomFiles (e.g. LERG) Block Ratio Scam Indicators 30-Day Volume Unique Individuals called FCC Robo Flag In Block List Vol Score Block Score Volume Spike Score Answer / Delivery Rates Hourly Nuisance Value Scores Call Duration Data Sources Real-Time Scoring Call Categories Patented Algorithm Data Scientists Informational Call Registry Research & Verification Team 5
6 A glimpse into the future of Scam calls in the UK? Issues today OTT apps that over-rate calls as scams based on user feedback alone Carriers doing their own blocking Lack of transparency who blocked my calls? Who do I complain to? Focus on reducing quantity Scams the most difficult to protect against but do the most damage Data is king the big carriers have an advantage CLI is meaningless 6
7 T-Mobile (USA) Scam ID, Scam Block and NAME ID Enable scam notification by default. Allow users to opt-in to scam blocking via feature codes, apps and portals. ScamID and ScamBlock all users are eligible USSD Code easy to access No application required all network based Reporting & feedback loop for users (web portal) Industry Portal to register legitimate numbers Report phone harassment directly to the FTC / FCC Headline numbers / facts 76.5 Million users Missing ~10 in 1 Million scam calls Over tagging ~2 in 1 million scam calls And Improving Finger Printing technique Passive layer 2 traffic mirror
8 How does this work? Origination options Research team Regulatory Data TDR & Suspicious Traffic INDEPENDEN T THIRD PARTY Cloud Analytics / Scoring / Categorization Connect User reporting through Apps & Portals Protect User Pref erences Run-time updates & Preferences Number activity data 3rd party other Carrier data Carrier Network Termination options Block Alert Answer Traffic mirror Query Response VM ( SIP, CAMEL, INAP, AIN, ISUP, ENUM, HTTP/REST, CNAM ) Carrier Call Processing Flow CAPTCHA or Whisper No Longer Rely on CLI Passive Layer 2 taps allows characteristics of a scam call to be modelled in real-time 8
9 Simplified view Carrier A Create a central independent number reputation database Carrier B Solution that identifies scams regardless of spoofing Level playing field for all carriers Score and Category Call Data aggregate d and anonymize d Carrier D TPS Data Engine Carrier C Highly transparent why are my calls being blocked? One stop shop Independent solution, carriers no longer making their own decisions Consistent with approach in Canada (CRTC and Carrier Consortium) Make use of DoNotOriginate and industry portal for legitimate numbers ABOVE ALL THIS IS THE BEST
10 STIR/SHAKEN will help thwart Spoofing. Analytics are a MUST to identify Scams. Phone numbers can be good and bad at the same time SHAKEN does not change this Fingerprinting/analytics can discern good from bad in both signed and unsigned traffic The same number can make signed good calls, unsigned good calls, and spoofed scam calls SHAKEN allows call scoring to be more definitive for verified calls If IXCs implement SHAKEN it will be a huge help SHAKEN offers protection for good users of good numbers Not Scam Signed/Verified Good Good Bad Bad Not Signed/Verified Scam M3AAWG 41st General Meeting Toronto October 2017
11 Scammers response to STIR/SHAKEN? SIM Boxes Multi-User VoIP Survey Call Centers PBX/RTP Hacking M3AAWG 41st General Meeting Toronto October 2017
12 This caller is Evil (his number is a tool) SHAKEN Added protection for good callers Verifies a CLI is not spoofed Cannot attest to caller intent Doesn t prove the caller is who they say they are Traceback is a must Analytics Needed to identify Scam calls with or without SHAKEN Needs to include signaling fingerprinting May need to include RTP fingerprinting in the future M3AAWG 41st General Meeting Toronto October 2017
13 What can I do? Recommend TPS Protect to your mobile customers It is free for scam identification Enhances the TPS Service by providing protection Consider the future for eradicating scam calls TPS Protect in-network gets better with more data and the more carriers that use it SHAKEN/STIR provides more data but does not solve the problem of scam and nuisance calls on its own A shared number reputation database provides the best solution for YOUR 13 customers
Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar
Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Panelists: Dr. Eric Burger Chief Technology Officer FCC Jim McEachern Principal Technologist ATIS Moderator: Brent Struthers STI-GA
More informationUnderstanding Cyber Attacks That Leverage the Telephony Channel
SESSION ID: CCT-R04 Understanding Cyber Attacks That Leverage the Telephony Channel Payas Gupta Research Scientist CRISSP-AD, New York University Abu Dhabi payasgupta@nyu.edu In collaboration with Mustaque
More informationBob Gnapp Director Member Training & Network Analysis
Robocalls and Spoofing Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 This presentation may be used by attendees for informational purposes only. No part of this presentation
More informationRobocalls and Rural Call Completion Issues
Robocalls and Rural Call Completion Issues Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 Copyright 2018 National Exchange Association, Inc. All rights reserved. This
More informationRobocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98
Robocall signaling draft-sipcore-callinfo-spam Henning Schulzrinne IETF 98 Background (for the un-stired and un-shaken) Unwanted calls are typically some are illegal, some are just unwanted (by many) example:
More informationCHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS
Media Contact: Will Wiquist, (202) 418-0509 will.wiquist@fcc.gov For Immediate Release CHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS Call Authentication
More informationResponse of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017
Response of Microsoft Corporation to Ofcom s consultation document Guidelines for CLI Facilities 14 November 2017 14 November 2017 Microsoft s response to Ofcom s consultation on changes to the CLI guidelines
More informationBeyond Blind Defense: Gaining Insights from Proactive App Sec
Beyond Blind Defense: Gaining Insights from Proactive App Sec Speaker Rami Essaid CEO Distil Networks Blind Defense Means Trusting Half Your Web Traffic 46% of Web Traffic is Bots Source: Distil Networks
More informationRobocall and fake caller-id detection
Technical Disclosure Commons Defensive Publications Series December 01, 2017 Robocall and fake caller-id detection Junda Liu Naveen Kalla Shi Lu Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationJanuary 14, Advanced Methods To Target and Eliminate Unlawful Robocalls, WC Docket No
Amanda E. Potter AT&T Services, Inc. Assistant Vice President- 1120 20th Street, NW Senior Legal Counsel Suite 1000 Washington, DC 20036 Phone: 202.457.2103 E-mail: amanda.potter@att.com January 14, 2019
More informationpaladin vendor report 2017
paladin vendor report 2017 Introduction At Paladin Group, we re deeply immersed in the fraud solution landscape. It s our day-to-day work to understand the latest solution providers, services, and tools.
More informationAdaptiveMobile Security Practice
AdaptiveMobile Security Practice Overview & Case Study AdaptiveMobile s Security Practice provide a suite of managed security services undertaking analysis of potential threats in networks and delivering
More informationSTIR and SHAKEN Framework Overview. IIT Real-Time Conference 2016 Chris Wendt
STIR and SHAKEN Framework Overview IIT Real-Time Conference 2016 Chris Wendt 1 Introduction - Telephone Network The telephone network is a complex set of interconnecting devices and network devices This
More informationTHE EVOLUTION OF CALLER ID FOR MOBILE, IP, AND OTT Renewing Truth in Calling with Secure Caller Identity
DATA SERVICES WHITE PAPER THE EVOLUTION OF CALLER ID FOR MOBILE, IP, AND OTT Renewing Truth in Calling with Secure Caller Identity TABLE OF CONTENTS 2 EXECUTIVE SUMMARY 3 4 4 5 6 6 6 9 9 THE TELEPHONE
More informationA Plan For Robocalls: Robosmelter
A Plan For Robocalls: Robosmelter Ben Klang, Sene Sorrow Mojo Lingo LLC January 17, 2013 Submitted to the Federal Trade Commission s Robocall Challenge Abstract The rise of Voice over IP (VoIP) technologies
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for ios User Guide Version 1.2.2 12 December 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for ios User Guide Version 1.0 26 June 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and
More informationPrivacy. Looking Ahead. J. Trevor Hughes Executive Director International Association of Privacy Professionals
Privacy Looking Ahead J. Trevor Hughes Executive Director International Association of Privacy Professionals Emerging Privacy Issues Show me the harm: ID Theft SSNs Spam Telemarketing FCRA Security The
More informationThe Spoofing/Authentication Threat
The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally
More informationRedefining Mobile Advertising in Africa
Redefining Mobile Advertising in Africa The challenge of mobile marketing Marketers today struggle with the following: Reaching enough customers Targeting precise audiences Performance & ROI Adrenaline
More informationIpswitch: The New way of Network Monitoring and how to provide managed services to its customers
BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda
More informationMachine-Powered Learning for People-Centered Security
White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today
More informationChess Entries 4 All Website Privacy Policy
Chess Entries 4 All Website Privacy Policy Introduction This website is operated Mmes Billington-Phillips.co and we are a controller for the purposes of the Data Protection Act 1998 and the EU General
More information31M. Emergency Routing Service 24/7/365. Emergency Routing Service (ERS) provides organizations with E9-1-1
Emergency Routing Service SAFETY SERVICES Emergency Routing Service (ERS) provides organizations with E9-1-1 call routing and enhanced location delivery to over 6,000 Public Safety Answering Points (PSAPs)
More informationBehind the Yellow Curtain Symantec s Proactive Protection and Detection Technology
Behind the Yellow Curtain Symantec s Proactive Protection and Detection Technology Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer 1 A Feedback Loop: Products and Big Data Intelligence
More informationOpen mustard seed. Patrick Deegan, Ph.D. ID3
Open mustard seed Patrick Deegan, Ph.D. ID3 OpenSocial FSN (draft) August 8, 2013 Open Mustard Seed (OMS) Introduction The OMS Trustworthy Compute Framework (TCF) extends the core functionality of Personal
More informationOur Data Protection Officer is Andrew Garrett, Operations Manager
Construction Youth Trust Privacy Notice We are committed to protecting your personal information Construction Youth Trust is committed to respecting and keeping safe any personal information you share
More informationAMP-Based Flow Collection. Greg Virgin - RedJack
AMP-Based Flow Collection Greg Virgin - RedJack AMP- Based Flow Collection AMP - Analytic Metadata Producer : Patented US Government flow / metadata producer AMP generates data including Flows Host metadata
More informationEx Parte Advanced Methods to Target and Eliminate Unlawful Robocalls -- CG Docket No
1200 G Street, NW P: +1 202-628-6380 Suite 500 W: www.atis.org Washington, DC 20005 May 4, 2017 Via Email Marlene H. Dortch Secretary Federal Communications Commission 445 12th Street, S.W. Washington,
More informationLONG TERM TECHNICAL OPTIONS
LONG TERM TECHNICAL OPTIONS CRTC/MAAWG Workshop on Caller ID Spoofing Montreal June 18-19 2014 Richard Shockey Shockey Consulting Chairman of the Board SIP Forum Reston, VA 20291 richard@shockey.us Voice
More informationIndustry Webinar. National Lifeline Accountability Database. Wednesday, October 29, 2014
National Lifeline Accountability Database Industry Webinar Wednesday, October 29, 2014 Agenda Registration for webinars through the end of 2014 is now available on our website Topics by audience request
More informationTechnical Brief: DYN DELIVERY
Technical Brief: DYN EMAIL DELIVERY 603 668 4998 Technical Brief: Dyn Email Delivery Introduction Dyn s Email Delivery platform allows reputable senders to send both bulk and transactional emails to their
More informationArtificial Intelligence Drives the next Generation of Internet Security
Artificial Intelligence Drives the next Generation of Internet Security Sam Lee Regional Director sam.lee@cujo.com Copyright 2017 CUJO LLC, All rights reserved. Artificial Intelligence Leads the Way Copyright
More information1 of 11 10/1/ :26 AM
1 of 11 10/1/2010 12:26 AM About Us Careers Calculators Contact Us Search Home Your Money HQ ID Theft & Fraud FRAUD ALERT E-mail Scams ID Theft and Fraud Avoid Becoming a Victim What To Do If You Are a
More informationVideo Interconnection Exchange (VIE)
VIE makes video calling as simple and ubiquitous as traditional voice calling - regardless of network, service or device. VIE: THE WORLD'S FIRST GLOBAL VIDEO EXCHANGE BRINGING TOGETHER VIDEO CONFERENCING
More informationAfrican Theatre Association (AfTA) PRIVACY POLICY
African Theatre Association (AfTA) PRIVACY POLICY 1. Our Privacy Pledge We store your personal data safely. We won't share your details with anyone else. You can change your preferences or opt out from
More informationTCPA Features Guide. 100 Enterprise Way, Suite A-300. Scotts Valley, CA
TCPA Features Guide West Corporation 100 Enterprise Way, Suite A-300 Scotts Valley, CA 95066 888-527-5225 www.schoolmessenger.com Table of Contents Introduction... 3 The Telephone Consumer Protection Act
More informationContact: Wealth Passport Help Center
Wealth Passport Mobile Version 1.0 Getting Started Guide Contact: Wealth Passport Help Center 888-635-5350 1 DOWNLOADING THE WEALTH PASSPORT APP iphone Download 1. Open the Apple App Store app on your
More informationHow to Select the Right Marketing Cloud Edition
How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire
More informationTAKING NETWORK TESTING TO THE NEXT LEVEL
TAKING NETWORK TESTING TO THE NEXT LEVEL WELCOME TO THE NEXT LEVEL OF NETWORK TESTING. Do you understand the performance and customer experience of your mobile network? P3 does. Our holistic approach is
More informationOnlineNIC PRIVACY Policy
OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.
More informationTARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS.
TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS Introduction State and local government departments, agencies and groups face a wide variety of events. Each have their own unique characteristics.
More informationScam Call Trends and Projections Report
Scam Call Trends and Projections Report Fall 2018 While the scam call epidemic continues to grow, consumers are actively searching for ways to protect themselves against annoying and often fraudulent calls.
More informationAdvanced Malware Protection: A Buyer s Guide
Advanced Malware Protection: A Buyer s Guide What You Will Learn This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should
More informationF5 DDoS Hybrid Defender : Setup. Version
F5 DDoS Hybrid Defender : Setup Version 13.1.0.3 Table of Contents Table of Contents Introducing DDoS Hybrid Defender... 5 Introduction to DDoS Hybrid Defender...5 DDoS deployments... 5 Example DDoS Hybrid
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationWhitepaper. Jan 16, 2019 Version 2.0. R o b o c a l l s. i o Page 1
Whitepaper Jan 16, 2019 Version 2.0 R o b o c a l l s. i o Page 1 Table of Contents 1. Overview 1.1 Communications Market Overview 2. Previous Attempts to Eliminate Spam Calls That Failed 2.1 Do Not Call
More informationLoad Balancer Survival Tips: Black Friday & Cyber Monday
Load Balancer Survival Tips: Black Friday & Cyber Monday EBOOK c07.18 The annual holiday shopping season starting with Black Friday is the litmus test for application availability and performance for online
More informationGTB Enterprise Contact Center Powered by Telax Included In Package Not Included in Package
GTB Enterprise Contact Center Powered by Telax Max Calls In Queue Unlimited Unlimited Data Center Features 24x7x365 Data Center Monitoring Yes Yes Geographical Survivability Yes Yes Automatic Software
More informationAutomated Response in Cyber Security SOC with Actionable Threat Intelligence
Automated Response in Cyber Security SOC with Actionable Threat Intelligence while its biggest weakness is lack of visibility: SOCs still can t detect previously unknown threats, which is a consistent
More informationVideo AI Alerts An Artificial Intelligence-Based Approach to Anomaly Detection and Root Cause Analysis for OTT Video Publishers
Video AI Alerts An Artificial Intelligence-Based Approach to Anomaly Detection and Root Cause Analysis for OTT Video Publishers Live and on-demand programming delivered by over-the-top (OTT) will soon
More informationP a g e 1 ROBOCALLS 2.0
P a g e 1 P a g e 2 Whitepaper Aug 13, 2018 Version 0.1 Table of Contents Document Control..1 1. Overview... 3 2. Architecture Overview... 3 3. Robocalls Issue Overview... 3 4. The Application... 4 4.1.
More informationIndustry Robocall Strike Force Report
Industry Robocall Strike Force Report April 28, 2017 1. Introduction (AT&T) 1.1. Overview On October 26, 2016, the Industry Robocall Strike Force issued a report describing progress made during the first
More informationThe Keys to Monitoring Internal Web Applications
WHITEPAPER The Keys to Monitoring Internal Web Applications Much of the focus on applications today revolves around SaaS apps delivered from the cloud. However, many large enterprises are also required
More informationA1. Technical methodology
A1. Technical methodology The Ofcom mobile research app project is the latest phase of Ofcom s work to measure mobile performance and the consumer experience of using mobile services. The new methodology
More informationNuance Loop Voice & Data Credit
Nuance Loop Voice & Data Credit 2018 Nuance Communications, Inc. All rights reserved 2 Nuance Loop - delivering increased revenue and ARPU for mobile operators Mobile operators face increasing pressure
More informationPrivacy Policy Közbeszerzés Figyelő Ltd.
Privacy Policy Közbeszerzés Figyelő Ltd. Privacy Policy Közbeszerzés Figyelő Ltd.... 1 Privacy policy... 1 Online shopping... 4 Direct marketing... 5 Customer service... 7 Developement and improvement...
More informationA revolutionary visual security and analytics solution
A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing
More informationUC Office for Smart Phone - iphone Edition
UC Office for Smart Phone - iphone Edition User Guide Revision 1.0 Contents 1 INTRODUCTION... 1 1.1 Overview... 1 2 REQUIREMENTS... 1 2.1 Hardware and Software Requirements... 1 2.2 Licensing Requirements...
More informationKaspersky Security Network
The Kaspersky Security Network (KSN) is a complex distributed infrastructure dedicated to intelligently processing cybersecurity-related data streams from millions of voluntary participants around the
More informationHOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL
HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE
More informationPALLADION Feature Set
PALLADION Feature Set FEATURE SET Introduction: PALLADION makes the job of running SIP based network infrastructure much more straightforward, resulting in much more reliable and predictable SIP based
More informationReal-Time Communications Witout Boundaries. Ribbon Policy Solutions
Real-Time Communications Witout Boundaries Ribbon Policy Solutions As SIP session traffic continues to grow a trend accelerated by the rapid adoption of multimedia devices like smartphones and tablets
More informationNational PCC Day workshop
National PCC Day workshop The Power of INFORMED VISIBILITY (IV ) Digital Intelligence! The United States Postal Service (USPS ) is connecting digital intelligence with the physical world expanding mail
More informationCLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies
Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS
More informationTop 10 use cases of HP ArcSight Logger
Top 10 use cases of HP ArcSight Logger Sridhar Karnam @Sri747 Karnam@hp.com #HPSecure Big data is driving innovation The Big Data will continue to expand Collect Big Data for analytics Store Big Data for
More informationPrivacy Information - Privacy and Cookies Policy In Full
Privacy Information - Privacy and Cookies Policy In Full Contents 1. Introduction & General Terms 2. Who are we? 3. What information will Gaucho collect about me? 4. How will Gaucho use the information
More informationAdaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
Adaptive Authentication Adapter for Juniper SSL VPNs Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
More informationVERIZON ACHIEVES BEST IN TEST AND WINS THE P3 MOBILE BENCHMARK USA
VERIZON ACHIEVES BEST IN TEST AND WINS THE P3 MOBILE BENCHMARK USA INTRODUCTION in test 10/2018 Mobile Benchmark USA The international benchmarking expert P3 has been testing the performance of cellular
More informationDETAIL OF THE WORK ITEM ON GROWTH OF VALUE ADDED SERVICES
ASIA-PACIFIC TELECOMMUNITY 1 st Meeting of SATRC Working Group on Policy, Regulation and Services in SAP-IV Document 22 23 October 2012, Tehran, Islamic Rep. of Iran 22 October 2012 Pakistan Telecommunication
More informationCLX Campaign Manager User Guide
CLX Campaign Manager User Guide The purpose of this Guide is to briefly describe usage of the Campaign Manager Portal. This tool is used to ingest US Shortcode based Campaigns. This guide details what
More informationA Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync
A Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync Introduction Microsoft Lync connects people everywhere as part of their everyday productivity experience. When issues
More informationCisco Webex Messenger
Cisco Webex Messenger This describes the processing of personal data (or personal identifiable information) by Cisco Webex Messenger. 1. Overview of Cisco Webex Messenger Capabilities Cisco Webex Messenger
More informationProject Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH
PRIVACY NOTICE Curv360 is a part of the Project Better Energy Limited group of companies and is a controller of any personal data you provide. We respect your data and your privacy is important to us.
More informationSecure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents
The first truly secure way to easily and quickly sign and exchange digitally approved documents Electronic signature functionality is rapidly becoming an essential tool in every business, with users increasingly
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationHe lios. Complete Cloud Telephony Solution. Simply packed with clever features to help you make the most of your telephone communications
Complete Cloud Telephony Solution NIMBOS COMMUNICATIONS LTD Tel: 03330 433550 Simply packed with clever features to help you make the most of your telephone communications Introduction Helios is a cost
More informationAdaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief
Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective
More informationPRIVACY POLICY Last Updated May, 2018
PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY OVERVIEW This Privacy Policy establishes rules to govern the collection, use and disclosure of personal information collected by Banff & Lake Louise
More informationBT CLOUD VOICE COMMUNICATOR USER GUIDE.
BT CLOUD VOICE COMMUNICATOR iphone EDITION. USER GUIDE. WHAT S IN THIS GUIDE. 1. Introduction. 3 1.1 Overview 3 1.2 Audience 3 2. Requirements. 4 2.1 Hardware & Software Requirements 4 2.2 Licensing Requirements
More informationOver-the-Top B2C Mobile Messaging
Over-the-Top B2C Mobile Messaging B2C Messaging Today B2C mobile messaging is a multi-billion dollar market in growth mode and is used by businesses to attract, retain, and engage with customers for both
More informationCarrier Reliability & Management: Overview of Plivo s Carrier Network
Carrier Reliability & Management: Overview of Plivo s Carrier Network Build your company on direct connections with access to 1600+ carrier networks WWW.PLIVO.COM/CARRIERS Global Coverage with Latency-free
More informationProtect vital DNS assets and identify malware
N2 THREATAVERT Protect vital DNS assets and identify malware Service Providers recognize network security drives brand equity because it directly impacts subscriber satisfaction. Secure networks are also
More informationCopyright 2018 Trend Micro Incorporated. All rights reserved.
Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent
More informationUnified Communication Platform
fonouc Unified Communication Platform fonouc Unified Communications Service Platform, is a scalable, managed, turnkey solution for carries and service providers, designed to provide multi-tenant business
More informationPROTECT AND AUDIT SENSITIVE DATA
PROTECT AND AUDIT SENSITIVE DATA Teleran Data and Compliance KEY FEATURES Monitors user, application, query and data usage activity Enforces data access policies in real-time Alerts staff in real-time
More informationUpdate from the RIPE NCC
Update from the RIPE NCC INEX Meeting, Dublin, 14 December 2011 Mirjam Kühne, RIPE NCC Outline RIPE Labs - Background, Purpose, Content, Participation IPv6 Activities and Statistics RIPE Atlas RIPEstat
More informationFraude dans la Telephonie
Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem
More informationAutomated Call Quality, CLI and Performance Testing
. Automated Call Quality, CLI and Performance Testing 2 itest The most comprehensive test platform available. itest is a testing and performance monitoring platform designed specifically for the 21st Century
More informationMaster Every Stage of Your Mobile App Lifecycle: Micro Focus Mobile Center. Brochure. Application Development, Test & Delivery
Master Every Stage of Your Mobile App Lifecycle: Micro Focus Mobile Center Brochure Application Development, Test & Delivery Brochure Master Every Stage of Your Mobile App Lifecycle: Center Master the
More informationInsight Frequently Asked Questions version 2.0 (8/24/2011)
Insight Frequently Asked Questions version 2.0 (8/24/2011) Insight Overview 1. What is a reputation system and how does it work? Insight, our reputation system, leverages anonymous telemetry data from
More informationCanadian Radio television and Telecommunications Commission. Interconnection Steering Committee. Report to the CRTC. by the
Canadian Radio television and Telecommunications Commission Interconnection Steering Committee Report to the CRTC by the Emergency s Working Group (ESWG) Phase II Stage 2 Feature Analysis - Update Report
More informationAlertTraveler Mobile App User Guide
AlertTraveler Mobile App User Guide AlertTraveler is a mobile application for ios and Android devices that utilizes GPS and your travel itinerary. AlertTraveler provides you with country and city intelligence
More informationInto the cloud... Based on a true story. SnapComms delivers critical internal communications solution to a global market
Into the cloud... Based on a true story SnapComms delivers critical internal communications solution to a global market 1,600,000 end-users worldwide 10,000,000 global connections per hour 40 Dedicated
More informationJanuary 14, Dear Commissioner Rosenworcel:
David C. Bartlett Vice President Federal Government Affairs 1099 New York Ave., NW, Suite 250 Washington, DC 20001 202-429-3101 January 14, 2019 Hon. Jessica Rosenworcel Commissioner Federal Communications
More informationRFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template
RFP/RFI Questions for Managed Security Services Sample MSSP RFP Template Table of Contents Request for Proposal Template Overview 1 Introduction... 1 How to Use this Document... 1 Suggested RFP Outline
More informationPRIVACY POLICY QUICK GUIDE TO CONTENTS
PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),
More informationAT&T Messaging as a Platform (MaaP)
AT&T Messaging as a Platform (MaaP) Neil McGrath (nm1499@att.com) Lead End-to-End Architect Multi-Device Cloud Messaging (CM) Messaging as a Platform (MaaP) MaaP Overview Payment Services Digital Goods
More informationsipmon DATASHEET sipmon datasheet contains comprehensive list of features and their detailed description.
sipmon DATASHEET sipmon datasheet contains comprehensive list of features and their detailed description. PRICELESS VISIBILITY OF CLIENTS` NETWORK Warning you before your customers do. sipmon sipmon is
More informationTelecom Decision CRTC
Telecom Decision CRTC 2015-496 PDF version Ottawa, 6 November 2015 File number: 8621-C12-01/08 CISC Canadian Steering Committee on Numbering Revised Canadian International Mobile Subscriber Identity Guideline
More information