SlideShare une entreprise Scribd logo
1  sur  32
Where do we go from here ?
                October 24 & 25, 2011
     Windsor Barra Hotel, Rio de Janeiro - Brazil
    Tal Eisner – Senior Director Product Strategy
TODAY

            How did we get
            here and what
            happened on the
            way?
Current
Landscape                       Where
                                should we
                  What’s        go from
                  Interesting   here ?
                  Today?
Telecom Evolution




3
Current
 Landscape


     IRSF           Cloud & SaaS      Controls & Alerts     Behavior analysis
       Roaming fraud           Data Fraud     Content Fraud
            Subscription fraud                          PrePaid Fraud
                    Risks in Convergence
PBX Hacking        Reporting                  Back Office Fraud
                             Handset Fraud                Managed Services

    PRS
                   Mobile Money                    Risk Assessment


              Wangiri Fraud                WIFI Roaming
  ByPass Fraud SMS Fraud                         Interconnect
1     9 7       0
    payphone ‘tapping’                1    9 9        0
                                      3rd party billing, calling card,

           1                 0
                                         tumbling ESN, cloning,
                   9 8                   ghosting and PBX DISA




                         GET HERE
                 meter tampering,
                 black box, red box


                                                 2       0 0         0
                                          Subscription, IMEI cloning,
2      0 1     5                           free phone, call forward,
                                              pre-paid, PRS, CDR
                                              suppression, magic
    2     0 2       0                     phones, social engineering,
                                           voice mail hacking, IRSF,
                                                Roaming Fraud
Trends in Telecoms


Enterprise &   Privacy Issues    Mobile        Telecoms            Risk
 Corporate       get Focus       Money is      expand to      methodologies
 as a target                    getting its   Utilities and      become
                                momentum          other         essential
                                                sectors         financial
                                                (M2M)             tools,
                                                                 not just
                                                              Security-Fraud
                                                                 oriented




  6
Trends in FM&RA


FM entered      RA only           Fraud        FMS’s need    Scenarios
 mature          gained       management       to “digest”    based
mainstream   prominence        and revenue    tremendous      on data
many years   as a separate    assurance are     volume of    “beyond
   ago        discipline in      merging           data       usage”
                  the
              mid-2000s




 7
Today’s Focus



         PBX
                 Hacking
        Back
                Office Fraud
       Mobile
                 Money
PBX Fraud
PBX Hacking
              PBX stays a headline topic along
              the years
              Financial damages are increasing
              Reputation issues re-occur
              Corporate customers suffer and
              complain
              Detection is in place but is that
              enough ?

10
TURNING
                          a lemon to
                       Limoncello MEANS

                         Alerting options                    Increasing
                         Via SMS/Emails                       internal
                                                           positioning for
                                                               Fraud
                                                            Departments

     Detection
  mechanism to            Protection
 monitor outgoing         offering for       Behavior
and incoming traffic       corporate          analysis
   to PBX / PRI’s         customers         capabilities

                                                             FMAAS (Fraud
                                                             Management As
                                                               A Service)
FRAUD

12
Trademark as Asset

"It takes 20 years to build a
reputation and five minutes
to ruin it. If you think about
        that, you'll do things
                   differently"
                    Warren Buffet




                                    14
Sales at Telecom

     Sales forces are divided to
     several groups:
     −   Telemarketing (over the phone)
     −   D2D (divided to geographical areas)
     −   Stores and sales channels
     −   Distributers
     Telecom carriers strive their
     sales representatives towards
     highly aggressive targets
     Often, the sales personal does

           E-V-E-R-Y T-H-I-N-G
15
           to meet these targets!
How strictly are you
                 monitoring their actions ?
         The     What is the level of freedom
     permanent   you provide in order to
      dilemma    pursue “the desired signature
                 on contracts “ ?
                 What will be the price of
                 constant critique ?
                 Sales organizations often
                 avoid asking too many
                 questions when the contracts
                 keep coming…
16
Insiders Fraud – A growing concern

     £1.3 billion internal fraud in the UK 2009 - highest in 22 years
     “Fraud in the workplace is likely to accelerate during
     downturn“


                           UK Fraud Trends
                           in the 2000s
      Fraud Value (£m)




                                             Source: KPMG UK January 2010

17
Risks & Threats

     Inflation of bills on
     innocent customers
     Debit – Credit Method
     − In order to cover tracks and
       go unnoticed new accounts
       will be created and activated
       in relevant systems (CRM)
       but on the same time 100%
       credit will be given
       systematically
     Unauthorized perks
18
Company policies
Corporate awareness
Look for linkage between employees
and known fraudsters
Log aggregation
Reactive investigations
                          But is this
                          Enough?
Lessons learned from reactive investigations
     showed each actions leaves “a footprint in the IT
     surrounding sand” – monitoring reactively will
     reveal fraud
     − A shift to a proactive approach
     Awareness ,education and policies are important
     BUT > > Prevention is better than an endless
     search for cure
     No privileged /”invisible” employees
     Security oriented offenses are often related to
     fraud
21
Unique Approach to Combat
             Back office & Insider Fraud

     New approach of “sniffing” the activities in IT
     − Recording of Business processes within sensitive applications
     − Less susceptible to ‘privileged users’ covering their tracks
     A single integrated solution
     Unique capability to make sure your employees are
     accountable for sensitive business processes
     Manages all fraud threats and risks
     − All are displayed, analyzed and managed in a single case
       management screen
     Integrated link analysis visualization
     Rapid deployment
23
Teaming of Mobile Operators (MO)
with Financial Institutions (FI),
offering “money transfer” capabilities
by using the mobile handset as an
identifier & enabler.
Offerings:
• Mobile wallet
• Money transfer (remittance)
• Payments (utility companies, other
  agencies)
• Salaries
• Corporate usage (e.g. money for traveling
  employees)
• NFC-Near Field Communication
Revenue Assurance
      •   Detect leakages (lost
          transactions/records)
      •   Detect deviations (trends)
      •   Margin Analysis
      •   Tools: KPIs Alerts,
          comparisons, trends          Fraud
                                       •   Theft (e.g. impersonation,
                                           hacking, etc.)
                                       •   Subscription fraud
                                       •   Internal fraud
                                       •   Tools: rules, time-space
                                           engine, data mining, behavior
                                           analysis, link analysis
26
 26
Regulatory
     • “Money Laundering” patterns
     • Verify reports to regulators & governing agencies
     • Provide required transparencies (e.g. SOX like)




27
US say all That
About cVidya
                          Mission
     – Leading the Revenue Intelligence and
       protection category
     – Providing profit maximization
       product-based solutions
     – Impact of 2-7% of operator’s revenues
     – Targeting Telecom, Media &
       Entertainment service providers

                                         – #1 Provider by Gartner
       – > 150 customers                 – “10 Companies to Watch” by
       – > 1 billion subscribers
                                           Frost and Sullivan
                                         – “Fast 50” by Deloitte
       – > 15 billion CDRs per day
                                         – TMF Ambassador and RA
       – Global presence in 18             leadership
          locations                            Market Presence
                                      Recognition
29
Razorsight 2011
 cVidya Overview

 Worldwide Leading Customers   Prestigious Awards




 World Class Partners          Driving Industry Standards
Customer Base




31
New technologies propose new turns at the
     Revenue Intelligence stream
     FM&RA units need to keep track and be
     ahead of challenges
     Keep a head of products Launch to asses
     Risks
     Increase your department’s position in the
     company by offering prevention services to
     your customers
                   Awareness to sales channels
                   becomes essential
                   Telecom = Bank , How will you
                   prepare ?



32
Thank You for Listening
Come speak to us at the Booth #3
        Tal.Eisner@cVidya.com
www.cVidya.com | www.cVidyaCloud.com

Contenu connexe

Tendances

I går, i dag og i morgen - Security Systems Roadmap, Chris Mallon, IBM US
I går, i dag og i morgen - Security Systems Roadmap, Chris Mallon, IBM USI går, i dag og i morgen - Security Systems Roadmap, Chris Mallon, IBM US
I går, i dag og i morgen - Security Systems Roadmap, Chris Mallon, IBM USIBM Danmark
 
New Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking ApplicationsNew Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking ApplicationsDR.P.S.JAGADEESH KUMAR
 
Strong authentication as a business driver for e-banking & e-commerce
Strong authentication as a business driver for e-banking & e-commerceStrong authentication as a business driver for e-banking & e-commerce
Strong authentication as a business driver for e-banking & e-commercenathconsult
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)NAFCU Services Corporation
 
2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail payments2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail paymentsBoni
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Arm Igf
 
Deutsche Bank Research on eInvoicing
Deutsche Bank Research on eInvoicingDeutsche Bank Research on eInvoicing
Deutsche Bank Research on eInvoicingFriso de Jong
 
Brand Protect Services
Brand Protect ServicesBrand Protect Services
Brand Protect ServicesDavid Hughes
 

Tendances (9)

I går, i dag og i morgen - Security Systems Roadmap, Chris Mallon, IBM US
I går, i dag og i morgen - Security Systems Roadmap, Chris Mallon, IBM USI går, i dag og i morgen - Security Systems Roadmap, Chris Mallon, IBM US
I går, i dag og i morgen - Security Systems Roadmap, Chris Mallon, IBM US
 
New Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking ApplicationsNew Malicious Attacks on Mobile Banking Applications
New Malicious Attacks on Mobile Banking Applications
 
Strong authentication as a business driver for e-banking & e-commerce
Strong authentication as a business driver for e-banking & e-commerceStrong authentication as a business driver for e-banking & e-commerce
Strong authentication as a business driver for e-banking & e-commerce
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
 
Fast Pitch Forum (VANTOS)
Fast Pitch Forum (VANTOS)Fast Pitch Forum (VANTOS)
Fast Pitch Forum (VANTOS)
 
2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail payments2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail payments
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
 
Deutsche Bank Research on eInvoicing
Deutsche Bank Research on eInvoicingDeutsche Bank Research on eInvoicing
Deutsche Bank Research on eInvoicing
 
Brand Protect Services
Brand Protect ServicesBrand Protect Services
Brand Protect Services
 

En vedette

Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?cVidya Networks
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
 
When revenue intelligence meets the cloud
When revenue intelligence meets the cloudWhen revenue intelligence meets the cloud
When revenue intelligence meets the cloudcVidya Networks
 
“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...cVidya Networks
 
How to monetize and generate revenues from data services in a competitive market
How to monetize and generate revenues from data services in a competitive marketHow to monetize and generate revenues from data services in a competitive market
How to monetize and generate revenues from data services in a competitive marketcVidya Networks
 
TM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyaTM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyacVidya Networks
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update WebinarcVidya Networks
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategycVidya Networks
 
cVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya Networks
 
cVidya and Atlantic Tele-Network Inc - Revenue Assurance Presentation
cVidya and Atlantic Tele-Network Inc - Revenue Assurance PresentationcVidya and Atlantic Tele-Network Inc - Revenue Assurance Presentation
cVidya and Atlantic Tele-Network Inc - Revenue Assurance PresentationcVidya Networks
 
Telco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthTelco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthcVidya Networks
 
Utilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiesUtilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiescVidya Networks
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudcVidya Networks
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssurancecVidya Networks
 
Enterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiesEnterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiescVidya Networks
 
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...cVidya Networks
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk" cVidya Networks
 
Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012cVidya Networks
 

En vedette (19)

Where do we go from here?
Where do we go from here?Where do we go from here?
Where do we go from here?
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
When revenue intelligence meets the cloud
When revenue intelligence meets the cloudWhen revenue intelligence meets the cloud
When revenue intelligence meets the cloud
 
“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...
 
How to monetize and generate revenues from data services in a competitive market
How to monetize and generate revenues from data services in a competitive marketHow to monetize and generate revenues from data services in a competitive market
How to monetize and generate revenues from data services in a competitive market
 
TM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyaTM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidya
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
 
cVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum Conference
 
cVidya and Atlantic Tele-Network Inc - Revenue Assurance Presentation
cVidya and Atlantic Tele-Network Inc - Revenue Assurance PresentationcVidya and Atlantic Tele-Network Inc - Revenue Assurance Presentation
cVidya and Atlantic Tele-Network Inc - Revenue Assurance Presentation
 
Telco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthTelco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growth
 
Utilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiesUtilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management Strategies
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraud
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue Assurance
 
Enterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiesEnterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New Opportunities
 
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidya
 
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"  "The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
"The Impact of Data Traffic Explosion and LTE on Revenue Assurance and Risk"
 
Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012
 

Similaire à Where Do We Go From Here?

Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012cVidya Networks
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber CafeAmy Lenzo
 
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightMahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightParitosh Sharma
 
Countering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud ThreatsCountering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud ThreatsVivastream
 
Information Security
Information SecurityInformation Security
Information Securitytrunko
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out The Lorenzi Group
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyacVidya Networks
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudMichael Holden
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Crm Quick Win Linkedin 2009
Crm Quick Win Linkedin 2009Crm Quick Win Linkedin 2009
Crm Quick Win Linkedin 2009ykaripsiadis
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureRYAN ORTON
 

Similaire à Where Do We Go From Here? (20)

Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber Cafe
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Merging fraud in a full IP environment
Merging fraud in a full IP environmentMerging fraud in a full IP environment
Merging fraud in a full IP environment
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightMahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
 
Countering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud ThreatsCountering Cross-Channel Fraud Threats
Countering Cross-Channel Fraud Threats
 
Information Security
Information SecurityInformation Security
Information Security
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 
The guide to combatting cross channel fraud
The guide to combatting cross channel fraudThe guide to combatting cross channel fraud
The guide to combatting cross channel fraud
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidya
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Taveau cartes2012 speaker
Taveau cartes2012 speakerTaveau cartes2012 speaker
Taveau cartes2012 speaker
 
Crm Quick Win Linkedin 2009
Crm Quick Win Linkedin 2009Crm Quick Win Linkedin 2009
Crm Quick Win Linkedin 2009
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_Brochure
 

Plus de cVidya Networks

The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...cVidya Networks
 
Big Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalBig Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalcVidya Networks
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssurancecVidya Networks
 
Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?cVidya Networks
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud managementcVidya Networks
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssurancecVidya Networks
 
TM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelTM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelcVidya Networks
 
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiesJoint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiescVidya Networks
 
Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...cVidya Networks
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...cVidya Networks
 

Plus de cVidya Networks (11)

The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
Big Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalBig Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to External
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
 
Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud management
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
 
TM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelTM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and Alltel
 
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiesJoint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
 
Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
Unlocking Customer Behavior Insights To Boost Pricing Performance - cVidya We...
 

Dernier

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Where Do We Go From Here?

  • 1. Where do we go from here ? October 24 & 25, 2011 Windsor Barra Hotel, Rio de Janeiro - Brazil Tal Eisner – Senior Director Product Strategy
  • 2. TODAY How did we get here and what happened on the way? Current Landscape Where should we What’s go from Interesting here ? Today?
  • 4. Current Landscape IRSF Cloud & SaaS Controls & Alerts Behavior analysis Roaming fraud Data Fraud Content Fraud Subscription fraud PrePaid Fraud Risks in Convergence PBX Hacking Reporting Back Office Fraud Handset Fraud Managed Services PRS Mobile Money Risk Assessment Wangiri Fraud WIFI Roaming ByPass Fraud SMS Fraud Interconnect
  • 5. 1 9 7 0 payphone ‘tapping’ 1 9 9 0 3rd party billing, calling card, 1 0 tumbling ESN, cloning, 9 8 ghosting and PBX DISA GET HERE meter tampering, black box, red box 2 0 0 0 Subscription, IMEI cloning, 2 0 1 5 free phone, call forward, pre-paid, PRS, CDR suppression, magic 2 0 2 0 phones, social engineering, voice mail hacking, IRSF, Roaming Fraud
  • 6. Trends in Telecoms Enterprise & Privacy Issues Mobile Telecoms Risk Corporate get Focus Money is expand to methodologies as a target getting its Utilities and become momentum other essential sectors financial (M2M) tools, not just Security-Fraud oriented 6
  • 7. Trends in FM&RA FM entered RA only Fraud FMS’s need Scenarios mature gained management to “digest” based mainstream prominence and revenue tremendous on data many years as a separate assurance are volume of “beyond ago discipline in merging data usage” the mid-2000s 7
  • 8. Today’s Focus PBX Hacking Back Office Fraud Mobile Money
  • 10. PBX Hacking PBX stays a headline topic along the years Financial damages are increasing Reputation issues re-occur Corporate customers suffer and complain Detection is in place but is that enough ? 10
  • 11. TURNING a lemon to Limoncello MEANS Alerting options Increasing Via SMS/Emails internal positioning for Fraud Departments Detection mechanism to Protection monitor outgoing offering for Behavior and incoming traffic corporate analysis to PBX / PRI’s customers capabilities FMAAS (Fraud Management As A Service)
  • 13.
  • 14. Trademark as Asset "It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you'll do things differently" Warren Buffet 14
  • 15. Sales at Telecom Sales forces are divided to several groups: − Telemarketing (over the phone) − D2D (divided to geographical areas) − Stores and sales channels − Distributers Telecom carriers strive their sales representatives towards highly aggressive targets Often, the sales personal does E-V-E-R-Y T-H-I-N-G 15 to meet these targets!
  • 16. How strictly are you monitoring their actions ? The What is the level of freedom permanent you provide in order to dilemma pursue “the desired signature on contracts “ ? What will be the price of constant critique ? Sales organizations often avoid asking too many questions when the contracts keep coming… 16
  • 17. Insiders Fraud – A growing concern £1.3 billion internal fraud in the UK 2009 - highest in 22 years “Fraud in the workplace is likely to accelerate during downturn“ UK Fraud Trends in the 2000s Fraud Value (£m) Source: KPMG UK January 2010 17
  • 18. Risks & Threats Inflation of bills on innocent customers Debit – Credit Method − In order to cover tracks and go unnoticed new accounts will be created and activated in relevant systems (CRM) but on the same time 100% credit will be given systematically Unauthorized perks 18
  • 19. Company policies Corporate awareness Look for linkage between employees and known fraudsters Log aggregation Reactive investigations But is this Enough?
  • 20.
  • 21. Lessons learned from reactive investigations showed each actions leaves “a footprint in the IT surrounding sand” – monitoring reactively will reveal fraud − A shift to a proactive approach Awareness ,education and policies are important BUT > > Prevention is better than an endless search for cure No privileged /”invisible” employees Security oriented offenses are often related to fraud 21
  • 22. Unique Approach to Combat Back office & Insider Fraud New approach of “sniffing” the activities in IT − Recording of Business processes within sensitive applications − Less susceptible to ‘privileged users’ covering their tracks A single integrated solution Unique capability to make sure your employees are accountable for sensitive business processes Manages all fraud threats and risks − All are displayed, analyzed and managed in a single case management screen Integrated link analysis visualization Rapid deployment 23
  • 23.
  • 24. Teaming of Mobile Operators (MO) with Financial Institutions (FI), offering “money transfer” capabilities by using the mobile handset as an identifier & enabler. Offerings: • Mobile wallet • Money transfer (remittance) • Payments (utility companies, other agencies) • Salaries • Corporate usage (e.g. money for traveling employees) • NFC-Near Field Communication
  • 25. Revenue Assurance • Detect leakages (lost transactions/records) • Detect deviations (trends) • Margin Analysis • Tools: KPIs Alerts, comparisons, trends Fraud • Theft (e.g. impersonation, hacking, etc.) • Subscription fraud • Internal fraud • Tools: rules, time-space engine, data mining, behavior analysis, link analysis 26 26
  • 26. Regulatory • “Money Laundering” patterns • Verify reports to regulators & governing agencies • Provide required transparencies (e.g. SOX like) 27
  • 27. US say all That
  • 28. About cVidya Mission – Leading the Revenue Intelligence and protection category – Providing profit maximization product-based solutions – Impact of 2-7% of operator’s revenues – Targeting Telecom, Media & Entertainment service providers – #1 Provider by Gartner – > 150 customers – “10 Companies to Watch” by – > 1 billion subscribers Frost and Sullivan – “Fast 50” by Deloitte – > 15 billion CDRs per day – TMF Ambassador and RA – Global presence in 18 leadership locations Market Presence Recognition 29
  • 29. Razorsight 2011 cVidya Overview Worldwide Leading Customers Prestigious Awards World Class Partners Driving Industry Standards
  • 31. New technologies propose new turns at the Revenue Intelligence stream FM&RA units need to keep track and be ahead of challenges Keep a head of products Launch to asses Risks Increase your department’s position in the company by offering prevention services to your customers Awareness to sales channels becomes essential Telecom = Bank , How will you prepare ? 32
  • 32. Thank You for Listening Come speak to us at the Booth #3 Tal.Eisner@cVidya.com www.cVidya.com | www.cVidyaCloud.com

Notes de l'éditeur

  1. Show a linear line that presents the progression of technology and Fraud with it
  2. Show a linear line that presents the progression of technology and Fraud with it