Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales

Similar documents
Guillaume Le Mener Head of Marketing & Corporate Development Mavenir. Leonardo Hilario Planning & Project Manager Telefónica Hispanoamérica

Bringing Messaging Revenue Back to Operators Mavenir B2C Messaging Solution

Mavenir Spam and Fraud Control

Express Monitoring 2019

Oracle Communications Diameter Signaling Router

Bringing Messaging Revenue Back to Operators Mavenir B2C Messaging Solution

SMS. What is grey routing? Why should buyers of business SMS care?

Real-time Communications Security and SDN

Build VoLTE Services using NFV & Cloud Reduce complexity and increase RoI

Imperva Incapsula Website Security

Cisco Converged Services Platform

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.

New Digital Business Models Driving the Softwarization of the Network

6 KEY SECURITY REQUIREMENTS

RCS OVERVIEW. Fábio Moraes GSMA October 2018 Future Networks Programme

Our Vision. Our Mission

SAARC Elite Networking Forum

Nuance Loop Voice & Data Credit

IBM Cloud Internet Services: Optimizing security to protect your web applications

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Transition to IP & IPX Working Group IP/IPX a key pre-requisite to further transformation

Cyber Security Technologies

Bringing the User Experience into the Web Age Multi-ID Solution Brief

Product Brochure Traffix Signaling Delivery Controller (SDC)

Investor Presentation February 2019

ITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016

Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience

HOLISTIC COMMUNICATIONS SECURITY

Security for SIP-based VoIP Communications Solutions

Positive Technologies Telecom Attack Discovery DATA SHEET

locuz.com SOC Services

Nuno Pestana, WeDo Technologies

Preparing your network for the next wave of innovation

Achieving End-to-End Security in the Internet of Things (IoT)

AKAMAI CLOUD SECURITY SOLUTIONS

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

The Five Phases of Virtualization: From Hardware Rigidity to Web-Scale Flexibility

RCS THE GLOBAL PERSPECTIVE DAVID O BYRNE, PROGRAMME DIRECTOR - GSMA

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

5G SIM: Maximising MNO Investment in 5G Networks

Revolutionising mobile networks with SDN and NFV

On the Radar: Positive Technologies protects against SS7 network vulnerabilities

Syed Ismail Shah, PhD Chairman, PTA,

Cisco Borderless Networks Value Proposition

Interconnection and Roaming

RE-ARCHITECTING THE GI LAN OPTIMIZE & MONETIZE MOBILE BROADBAND. Bart Salaets Solution Architect

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Sierra Wireless. Corporate Overview. May 2017

Analysys Mason Research Key Themes for 2013

What is SD WAN and should I know or care about it? Ken LaMere Ecessa

Securing LTE Networks What, Why, and How

How Smart Networks are changing the Corporate WAN

Are we breached? Deloitte's Cyber Threat Hunting

Brocade and Sandvine. Detailed Insights for OTT Application Traffic KEY BENEFITS SOLUTIONS BRIEF BUSINESS CHALLENGE

HOW TO SELECT A SECURITY-BASED MESSAGING PARTNER. Six key features to consider when choosing a mission-critical messaging partner for your business.

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

Hybrid Cloud (Telco & IT) - en fleksibel og optimal implementering

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers

Cybersecurity for Service Providers

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Turning Grey into Gold AdaptiveMobile Threat Intelligence Unit s Analysis on Recapturing A2P Messaging Revenue

Cognitive Security in the Era of Always Online. Yiannis Giokas VP R&D

The Windstream Enterprise Advantage for Banking

AdaptiveMobile Security Practice

SECURITY SERVICES SECURITY

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Healthcare IT Modernization and the Adoption of Hybrid Cloud

ELASTIC SERVICES PLATFORM

Mobile Edge Computing

E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a

Push-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk. David Wetherelt, Director International Carrier Sales

Leveraging

Accelerating growth and digital adoption with seamless identity trust

Managing the Subscriber Experience

with Advanced Protection

IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES

Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days

in Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM

MAVENIR AND WIND RIVER

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.

Keep Growing Interim Results Presentation. 25 July 2018

Brocade and Procera. Detailed Insights for OTT Application Traffic KEY BENEFITS SOLUTIONS BRIEF BUSINESS CHALLENGE

Mobile Connect & Messaging

Mobile, Fixed, and Broadband Network Services

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Vodafone mobile product update. VPS Partners. April C2 Vodafone restricted

Embedded SIM Study. September 2015 update

OTT Players. Challenges and Opportunities

Microsoft 365 Business FAQs

Accelerate Your Cloud Journey

Allot Corporate Presentation

CDG Technology Forum Inter-Technology Networking

Internet of Things Toolkit for Small and Medium Businesses

Gary Bhomer. Director, Telstra Wholesale

Altitude Software. Data Protection Heading 2018

cncto /kəˈnɛkto/ =

WHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points

SAP SMS 365 SAP Messaging Proxy 365 Product Description August 2016 Version 1.0

Transcription:

Mavenir Keynote Think Smarter Secure communication Innovate Services By Mohamed Issa Regional Head of Africa Sales

The New Mavenir: Combining Market Leaders Combing three industry-leading companies to establish a key player in evolved, cloud-proven networking solutions Innovate: Transform: Succeed Advanced VAS & Security NGN Core & VAS Cloud RAN

The New Mavenir: Snapshot 350+ Carriers 17 of top 20 TIER 1 CARRIERS GLOBALLY Our Customers Support Mobile Subscribers 3+ BILLION NGN Operating in 150+ COUNTRIES 10 BILLION Monetization Requests Annually Industry s LEADING TECHNOLOGY With World s First VoWiFi, VoLTE, and RCS 2,200+ EMPLOYEES Worldwide 37% Share of VoLTE / VoWiFi in the U.S. and Canada 71% Share of VoLTE / VoWiFi in France, Germany, UK 75% Share of RCS in the U.S. and Canada Leading VoWiFi / VoLTE, RCS and Messaging RCS Market Share >50% Share of global messaging Source: Based on GSMA, GSA, TeleGeography and Mavenir (July 2016) Number of launched Mobile operator networks ¹ LTM as of Q3 16.

Mavenir s Innovative Market Firsts VoWiFi VoLTE RCS World s first Commercially deployed IMS-based VoWiFi Fully supported mobility between LTE<->VoWiFI World s first Commercially deployed VoLTE World s first Commercially deployed fully virtualized VoLTE network World s first Commercially deployed RCS5 solution World s first Commercially deployed fully virtualized RCS network Messaging World s first Commercially deployed SMS Solutions handling nearly half of the world s text/multimedia messages Multi-Line Multi-Device Disruptive Network-based solution using the carrier as a platform for innovation.

Strategy and Solution Details

Mavenir s Key Solution Areas 5G NFV/SDN Optimized Network Elements 5G Capable Core Network Mavenir Cloud Range MANO (Management and Orchestration) Suite Mavenir SmartC-RANTM Solution Advanced Communications Voice, Video, Advanced Messaging Products Multi-Line, Multi Device Service Delivery Continued Service Innovation Innovative Platform for Service Providers (Open APIs, SDKs) IoT Core and Access Infrastructure Provider IoT GW (w/partner) Vertical Use Case Solutions (Elder Care, Connected Car) NaaS (Network as a Service) Security SS7 Firewall & Diameter Firewall - Signaling Security SpamShield - Spam & Fraud Control SBC (A/I SBC Products) Session Border Controllers for Access and Interconnect Security Gateway RAN <-> Operator Core Link 2017 Mavenir Systems Mavenir Company Overview Page 6

Security Mavenir s security solutions are built to protect CSPs networks from sophisticated security threats. Mavenir s highly efficient and topographically independent solution, provides 360-degree security and privacy protection, addressing many types of signalling network attacks, as well as spam and fraud exploits, providing advanced, real-time detection of malicious traffic alongside smart prevention mechanisms. Mavenir provides complete control to mobile operators over the messaging stream, signalling interfaces, and borders of the network.

Revenue leakage Devices are stolen in the other countries - Usable after hard reset No import tax is paid No tax is paid by the selling entity No taxable after sales/support business Better mobile network usage

Securing the mobile world Prevent Mobile phone crime and phone smuggling Secure mobile communication, and guarantee high quality service Creating New revenue streams to governments as well as attracting foreign investments via enabling fair competition

The challenge Big brands regulate prices for the new handsets Phone smuggling becomes a big business Increases crime, Phone thefts Revenue leakage due to customs avoidance and Smuggling No support for the smuggled devices risk to consumers Standard 3GPP operator solutions do not help! Mobile crime has become a serious problem that needs to be tackled!!!

XURA approach - Monetising Security Structural solution to the problem on all levels Regulation and the law Technical enforcement Financial benefit

An IMEI check is initiated by the network for: Supplementary service operation, Mobile originated short message Mobile terminated short message Location update/periodic location update Emergency calls IMSI attach Mobile terminated USSD (Unstructured Supplementary Service Data), Location update with a new visitor Mobile originated voice call Mobile originated data call Mobile terminated voice calls Mobile terminated data calls GPRS/Data attach GPRS/Data PDP context create SMS delivery over GPRS/Data

Registration and Grace Period When switching on the handset for the first time, and if the handset was never registered, a notification will be sent by the system to the subscriber to inform them about the necessity to register the phone to be able to continue using the handset, and the handset is then given a temporary access. White List: containing all IMEIs whose type has been approved Black List: containing all IMEIs that are stolen, illegal or otherwise faulty Grey List: containing IMEIs that in grace period

SIGTRAN Check_IMEI Provisioning Domain Public Access International IMEI DB Administration Domain Provisioning APIs Xura Management Station SMS Registration SMPP CPR Central Unit Agents Xura Analytics Operators Domain Network 1 Network 2 Network 3

Benefits Subscriber Guaranteed quality of the equipment Protection against theft Less crime and more safety No fake premium phones Government Additional tax income Import tax protection Allowing fair competition by eliminating Grey market Attract foreign investments from global brands, Civil safety Operator Protection for equipment sale revenue Better service quality with elimination illegitimate handsets Known equipment on the network

Signaling Security challenges Exposing Signaling is Necessary Network Evolution is Inevitable Global Communication between subscribers on different networks Roaming NFV LTE, IMS, VoLTE, RCS Vulnerabilities Exist IoT and SDN Evidence of Malicious Activity Growing risk of Harmful Accidental Signaling Signaling Security Is Essential SS7 Diameter SIP

Our Signaling Security Solutions Vulnerability Penetration Audit Test Offline Signaling Analysis SMART Support Service Understand What vulnerabilities does your network expose? Understand which vulnerabilities your network exposes XURA Your Network See potential external threats reaching your network XURA Your Network The Security Management and Response Team (SMART) Support Service provides periodic audits and analysis of signaling proactively alerts customers to new threats provides recommendations to address concerns. Maintain Leverage expert services to maintain and enhance network security Passive Monitoring Active Monitoring Active Filtering Monitor How do others interact with your network via signaling? Automatic threat detection with powerful near-real-time analytics XURA Enhanced stateful and interactive detection rules XURA Full firewall to detect and block harmful signaling and prevent fraud XURA Enforce Implement a solution to enforce your signaling interaction security policy Your Network Your Network Your Network 2017 Mavenir Systems Mavenir Company Overview Page 18

Monitor Enforce Understand Maintain Our Signaling Security Products Powerful, near real-time Monitoring and Analytics XA Analytics Correlation module SIP Signaling Security Expertise Monitor SS7 Firewall Diameter Firewall SIP Firewall SMART professional Support services 2017 Mavenir Systems Mavenir Company Overview Page 19

Secondary Primary Mavenir Delivers on Key Criteria Our customers need Only Mavenir delivers Secure network operation Intelligence about network threats and how to mitigate them Expertise and Experience Powerful Analytics Subscriber protection Fraud prevention Core network stability + Quick reaction to protect against new threats without introducing risk to network operation A solution that has minimal impact on existing systems and introduces no new risk to core signaling Fast, Safe Resolution Proven Reliability Own Signaling Stacks Powerful Protection Flexible Integration SS7, Diameter, SIP security Maximum return on investment Make one investment in a future-proof solution, with low operational costs Intuitive Operation NFV-ready

Messaging Fraud impacts subscribers, enterprises and operators Poor user experience Inability to interact with the application Delivery failure when roaming Variability in delivery QoS Reduced use of A2P messaging Reduced network service availability Subscribers in cells congested by SIM Boxes Roamers in networks connected via links congested by A2P messaging Subscribers calling/messaging others in networks connected via congested links General Revenue Loss A2P Messaging Revenue Loss Losses from SMS fraud up to $6 Billion annually Communications Fraud Control Association, 2016 Poor subscriber satisfaction Poor A2P user experience Service availability problems Increased volumes of SPAM and malicious content enabled by low cost delivery Increased Churn

Our Spam and Fraud Solutions provide 360 cover Open Messaging Centre Spoof Home Subscriber SMS Firewall SpamSheild Control Every Route SIM-Box or Relaying App On-net SIM-Box or Relaying App via Grey-Route Complex Indeterminable Rules Application connected via Grey-Route Fake Messaging Service Centre Rapid Evolution of Detection Rules

Machine Learning and Rule Evolution are Key Differentiators Determinable Rules >> New bypass techniques emerge Revenue Loss Continues Complex Ever-changing Rules >> New bypass techniques almost IMPOSSIBLE Revenue Loss Stopped - Quickly & Effectively Control Every Route Delay >> More traffic bypasses Real-Time Analysis >> Stops Bypass FASTER Manual Rule Definition Complex set of rules required Dynamic Complex Rule Evolution Complex Indeterminable Rules Manual + High-cost Automatic Manual Traffic Analysis Complex variations (sources and content) Real-time Machine Learning Rapid Evolution of Detection Rules Traditional Methods vs SpamShield

Innovation

#catalystforinnovation