AdaptiveMobile Security Practice

Similar documents
Mavenir Spam and Fraud Control

Turning Grey into Gold AdaptiveMobile Threat Intelligence Unit s Analysis on Recapturing A2P Messaging Revenue

Social Engineering: We are the target Sponsor Guide

Written by Sue Clarke, May Security and Policy Management. TECHNOLOGY AUDIT Symantec KEY FINDINGS

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

Guillaume Le Mener Head of Marketing & Corporate Development Mavenir. Leonardo Hilario Planning & Project Manager Telefónica Hispanoamérica

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.

The Smart Enterprise. InGuard Application. 24/7/365 Protection from Toll Fraud Attack

Jane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.

The Voice over Mobile Broadband (VoMBB) Market:

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

Analysys Mason Research Key Themes for 2013

CELLULAR M2M DEVICE CONNECTIONS AND REVENUE: WORLDWIDE TRENDS AND FORECASTS

M2M device connections and revenue: worldwide forecast

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

World Broadband Statistics: A Short Report from Global Broadband Statistics

WIRELESS NETWORK DATA TRAFFIC: WORLDWIDE TRENDS AND FORECASTS

The Middle Eastern Mobile Market: trends and forecasts Daniel Jones Edited by Sarah Peake

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Worldwide telecoms market forecast

OVERVIEW BROCHURE GRC. When you have to be right

Information Security Specialist. IPS effectiveness

RSA INCIDENT RESPONSE SERVICES

Security with FailSafe

The Economist rate card 2017 (GBP)

CloudSOC and Security.cloud for Microsoft Office 365

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

TRUE SECURITY-AS-A-SERVICE

Logicalis What we do

THE ACCENTURE CYBER DEFENSE SOLUTION

The Economist rate card 2017 (USD)

Extend Your Reach. with. Signature Core Fiber Optic Cabling System

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

Cyber Security at large scale

Sensor networks. Ericsson

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

SmartZone Rack Energy Kits Energy and Environmental Monitoring for Small Data Centers

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

next-generation datacenters

McAfee Total Protection for Data Loss Prevention

Latin America telecoms market: interim forecast update LATIN AMERICA TELECOMS MARKET: INTERIM FORECAST UPDATE

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Threat Detection and Response. Deployment Guide

RSA INCIDENT RESPONSE SERVICES

Six Sigma in the datacenter drives a zero-defects culture

OUR SECURITY, DELIVERED YOUR WAY

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Legacy Voice vs. OTT Voice

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY

ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Telecom MISP. Building a Telecom Information Sharing Platform. Alexandre De Oliveira

Smart Protection Network. Raimund Genes, CTO

Security-as-a-Service: The Future of Security Management

Machine-Powered Learning for People-Centered Security

LPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS

CUSTOMER INTERACTION MANAGER WITH INTEGRATED DIGITAL MESSAGING

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Symantec Endpoint Protection Cloud (SEPC)

OSSIR. 8 Novembre 2005

VimpelCom s Beeline Machine-to-Machine (M2M) Services

Cisco Service Control Service Security: Outgoing Spam Mitigation Solution Guide, Release 4.1.x

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

Ariba Network Registration Guide

Over 20 years of experience in the international telecom market.

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales

Service Provider VPN Market Disruption in the Central and Eastern European Market

Pay-TV services worldwide: trends and forecasts PAY-TV SERVICES WORLDWIDE: TRENDS AND FORECASTS

Symantec Protection Suite Add-On for Hosted Security

Published on Market Research Reports Inc. (

Big Data Analytics for Intelligent Backhaul Networks

Protect vital DNS assets and identify malware

MOBILE WI-FI Policy enforced Wi-Fi for moving vehicle applications

Arbor White Paper Keeping the Lights On

4net Technologies. Fixed Voice and Data Services V

FIREWALL BEST PRACTICES TO BLOCK

Telecom Cloud Market Research Report- Global Forecast 2022

Insights Into the SMS Industry and Market Trends

Account Takeover: Why Payment Fraud Protection is Not Enough

Jane s Military & Security Assessments Intelligence Centre. Understand Threats. Assess Capabilities. Challenge Assumptions.

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

AKAMAI CLOUD SECURITY SOLUTIONS

Smart Data Center Solutions

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Cisco s Appliance-based Content Security: IronPort and Web Security

New Digital Business Models Driving the Softwarization of the Network

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

with Advanced Protection

Cisco Gains Real-time Visibility in the Business with SAP HANA

A leading antivirus software company outsmarts viruses and malware and makes the Internet safer.

Business and R&D needs strengthening / needing eachother

CONNECTED CARS: WORLDWIDE TRENDS AND FORECASTS

Automated Context and Incident Response

Service Provider VPN Market Disruption in the LATAM Market

CLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Imperva Incapsula Website Security

Transcription:

AdaptiveMobile Security Practice Overview & Case Study AdaptiveMobile s Security Practice provide a suite of managed security services undertaking analysis of potential threats in networks and delivering customized configurations and security cartridges containing profiles of active & potential attacks. These services are provided using AdaptiveMobile s network-centric security software platform NPP, which gives operators the ability to identify threats from compromised devices connecting to their network, the ability to surgically control application traffic flows for selected devices in real time and to interact with subscribers to resolve the threat. Advanced Threat Detection Dark Data Forsensics Actionable Intelligence Detecting new advanced mobile treats and exploits Global security network leveraging our unique insight from 30 billion dark data events and one billion mobile subscribers a day Continual Signature updates to our platforms across the globe and delivery of enhanced security offerings to operators Our unique approach to security within networks whether mobile, Wi-Fi, DSL or cable is built upon four core principles: Security Analytics: the continual correlation of events across different application services in order to detect new threats and compromised devices. Behavioral Reputation: building and maintaining a set of reputation attributes for each device connecting to the network, influencing how traffic will be manipulated, and the subscriber experience. Surgical Control: the ability to dynamically select traffic from specific devices or for specific services for active real-time filtering while allowing traffic from uncompromised users to flow without additional latency. Individual Granularity: being able to scale to deliver individual level granular controls for hundreds of millions of subscribers, allowing for parental and corporate self-care within the network.

The Global Security Practice collates statistics, suspect traffic profiles, and subscriber reports; and generates new threat signatures and threat analysis engines that are automatically updated within each network deployment. The Security Practice has a unique real-time insight in to Global Mobile Threats with unparalleled sources of data to identify and analyse, to deliver protection and provide informed statements on emerging trends in attacks, phishing and spam. In addition to delivering appropriate security databases and configurations for threat response, the Security Practice, using the Global Security Centre product, also provides intelligence on sources of attacks and the cross border exploitation of service boundaries (Multiple bearers, OTT services and inter-provider). Global Security Centre

Service Offerings AdaptiveMobile Security Practice provides three service packages, aimed at meeting the specific needs of various operators requirements. Bronze Service A service for operators who want to address known Spam in their network. Note this is only applicable to those operators who have an established customer feedback system in place for spam as service configuration is driven primarily by received customer complaint feedback. Service suits typically inbound off-net (MT) traffic deployments. Functional Components Includes Requirements upon Operator Delivery Global Fingerprints Known call to actions Automated Cartridge feed from (blacklists, numbers) and existing Security Centre. fingerprints Typically 1 update per month. Subscriber Submitted Collection of operator s Operator to provide regular feed Automated Cartridge feed from Fingerprints subscriber spam reports (e.g. of data, either via flat file, via existing Security Centre. SRS, 1909 etc.) data and AdaptiveMobile specified SMPP Frequency determined by delivery as a fingerprint feed interface into AdaptiveMobile submission profile Security Centre, or direct from MO traffic routing to Shortcode. Active National Spam Known high impact spam System integration to Automated Cartridge feed Fingerprints campaigns with triggered AdaptiveMobile Security Centre activity in network Quarterly Security Reviews Review calls of overall trends Mutually available schedule For initial period calls once per and spam activity. week for the first 6 weeks. Then every 2 weeks until end of first quarter After first quarter, call once every 3 months

Silver Service For those operators who need to address both Spam and Unsolicited Commercial Communication Service configuration is based upon specific suspicious traffic measured within the network, so the operator can be sure that the profile of spam seen specifically within their network is addressed. Service suits both on-net (MO) and off-net inbound (MT) protection. Suitable also for markets where no subscriber spam complaint mechanism exists. Service includes all Bronze capabilities plus: Functional Components Includes Requirements upon Operator Delivery Active Defence Active monitoring of traffic to Cartridge feed of Fingerprints find current campaigns active & Security Practice recommend Cartridge feed of Blacklist URL s active spammers both on-net filter configurations, and analyse Configuration of PMC filters and inbound. resultant triggered traffic Operator Specific (Active Identification of new spam Cartridge feed Discovery) Fingerprints attacks and creation of new Active monitoring of suspicious fingerprint sets that applies to traffic, Fingerprints delivered as that specific operators network. spam discovered & validated Fortnightly Security Review Routine detailed review with Mutually available schedule For initial period calls once per Operator covering: week for the first 3 months. - spam campaigns active Then every 2 weeks. - spammers of interest - new & emerging security threats - recommendations on system configuration evolution Additional System Tuning Delivery of additional filters, Review of results and Ongoing PMC access policies and filter configuration endorsement of changes Cartridge feed of appropriate refinements to address changes components in spammer behaviour analysed Abusive Spammer Detection Determination of spammers Requires systems and data Supply of subscriber details who have exceeded agreed access to PMC, TSM / Analytics or automatic configuration of thresholds or specific service (Quarantine) & Reporting system Blacklist usage profiles. Utilising analysis of traffic, subscriber activity and reputation, specific subscribers can be identified that are sending spam volumes in excess of an agreed threshold.

Gold Service Designed for those Operators who are seeking to fully address all forms of SMS abuse in their network including Spam & Unsolicited Commercial Communication. Commonly taken by Tier-1 operators & those in specific regulatory environments. Service includes all Silver capabilities plus: Functional Components Includes Requirements upon Operator Delivery Active Defence Active monitoring of traffic to Cartridge feed of Fingerprints find current campaigns active & Security Practice recommend Cartridge feed of Blacklist URL s active spammers both on-net filter configurations, and analyse Configuration of PMC filters and inbound. resultant triggered traffic Operator Specific (Active Identification of new spam Cartridge feed Discovery) Fingerprints attacks and creation of new Active monitoring of suspicious fingerprint sets that applies to traffic, Fingerprints delivered as that specific operators network. spam discovered & validated Weekly Security Review Routine detailed review with Mutually available schedule Fortnightly calls with operator operator covering: - spam campaigns active - spammers of interest - new & emerging security threats - recommendations on system configuration evolution Security Analyst prime Analysis of reasonable volume Prime point of contact for Nominated prime point of of operator queries on spam specific spam related queries contact for email queries and abusive subscriber activity. Ongoing consultation on system tuning and network profile. Abusive Spammer Detection Determination of spammers Requires systems and data Supply of subscriber details who have exceeded agreed access to PMC, TSM / Analytics or automatic configuration of thresholds or specific service (Quarantine) & ERM system Blacklist usage profiles. Utilising analysis of traffic, subscriber activity and reputation, specific subscribers can be identified. Spammer Detection Analytics Application of off-line analytics Connectivity / Processing Algorithms provided by Algorithms that can determine additional capacity on server AdaptiveMobile spammer behaviours through Security Practice post processing of traffic data.

Case Study Delivering Measurable market value Addressing SMS Abuse: Tier one mobile operator, USA The low SMS tariffs in the USA created from fierce competition between mobile operators has resulted in North America being the major source of SMS abuse globally 1. Threat volumes have been such that operators have periodically blacklisted US carriers, which has resulted in customer care complaints for this operator. The operator has taken the Gold package of AdaptiveMobile s Security Practice, which in conjunction with Adaptive Mobile NPP, gives them filtering of SMS traffic to remove spam and frauds before it is delivered to their subscribers or to other operators. The results include: - Reduction of 99.9% in on-network generated abuse & spam - 78% reduction overall in inbound spam to the network - 98% reduction in customer complaints This has also achieved significant improvement in the customer experience both in reducing unwanted messaging with consequential revenue and subscriber credit loss and addressing network cell congestion due to heavy spammers. Costs associated with these impacts are known to exceed a million dollars a month. 1 Adaptive Mobile, US SMS Spam Ecosystem, December 2012

The diagram below illustrates the nature of spammers, the activities undertaken by AdaptiveMobile Security Practice to counter their activities, and the successes achieved. The results of these activities can be seen in the following section. AdaptiveMobile s Security Practice, in conjunction with NPP is the most effective platform globally for addressing mobile messaging spam because: The results are the blocking of messages known to be spam/fraud, preventing false positives which would result in lost revenue and customer complaints We identify new suspicious SMS patterns, including identifying SIM banks and spammers that are operating campaigns across multiple devices We identify persistent spammers and dynamically respond, blocking or quarantining messages; throttling or restricting service for the device We provide a global review mechanism that correlates information on suspect new threats from this operator with those from other operators, to produce and disseminate new fingerprints Operators retain the ability for local control to decide which variants of spam should be blocked for all users; and to offer individual users the ability to set their own policies for greater protection. The results above are representative of the effect that AdaptiveMobile s Security Practice services achieve in networks worldwide.

Head Office Ferry House, 48-52 Lower Mount Street, Dublin 2. Contact: sales@adaptivemobile.com Regional Sales Contact Numbers: US, Canada, Latin America Sales: +1 972 377 0014 UK Sales: +44 808 120 7638 Middle East Sales: +97144 33 75 83 Africa Sales: +27 83 7044111 Asia Sales: +66 89 87 42 32 European Sales: +353 (1) 524 9000 Regional Operational Support Contact Numbers: UK: +44 208 114 9589 Ireland: +353 1 514 3945 France: +33 975 180 171 India: 000-800-100-7129 US, Canada, Latin America: +1 877 267 0444 For discussion of typical use cases, overview of AdaptiveMobile s existing deployments or a full walkthrough of service provider experience, contact your local office: www.adaptivemobile.com/contact-us About AdaptiveMobile AdaptiveMobile is the world leader in mobile security protecting over one billion subscribers worldwide and the only mobile security company offering products designed to protect all services on both fixed and mobile networks through in-network and cloud solutions. With deep expertise and a unique focus on network-tohandset security, AdaptiveMobile s award winning security solutions provide its customers with advanced threat detection and actionable intelligence, combined with the most comprehensive mobile security products available on the market today. AdaptiveMobile s sophisticated, revenue-generating security-asa-service portfolio empowers consumers and enterprises alike to take greater control of their own security. AdaptiveMobile was founded in 2003 and boasts some of the world s largest mobile operators as customers and the leading security and telecom equipment vendors as partners. The company is headquartered in Dublin with offices in the North America, Europe, South Africa, Middle East and Asia Pacific. www.adaptivemobile.com