Trending

Heat Index
 

Posts Tagged ‘fraud management’

Most Recent
 
Read More
January 15, 2016

Are service providers taking fraud and revenue leakage more seriously today?

The most common causes of revenue loss among communication service providers (CSPs) globally are poor processes and procedures. This is one of the conclusions of new fraud and revenue leakage research, conducted for Neural Technologies. So far, so normal, but …

445
 
Read More
January 12, 2016

Global survey shows comms service providers losing 13.1% of revenues to leakage and fraud

Revenue losses and fraud may be higher on the agenda for communication service providers (CSPs) following independent research released by Neural Technologies. A new global survey of 113 CSPs has found that these losses have now reached 13.1% of gross revenues.

375
 
Read More
January 11, 2016

Telcos face US$300bn global loss from uncollected revenues and fraud in 2016

Neural Technologies has announced the results of its Telecoms Risk Management Global Survey 2016. Telecoms operators face an estimated global average loss of 13% or US$294 billion* resulting from uncollected revenue and fraud.

480
 
Read More
January 3, 2013

Embedded Mobile (M2M): Fraud and security management

The GSMA tells us to expect 500 million new connected devices in three years as the machine-to-machine (M2M) market booms. The growth in fraud could be equally rapid unless all the loopholes are closed.

70
 
Read More
August 21, 2012

Kenya's Safaricom deploys new fraud management system for its mobile payment service

Nairobi, Kenya and Petersfield, UK. August 21, 2012 — Kenya’s integrated communications service provider (CSP) Safaricom is partnering with a UK-based firm, Neural Technologies to implement a fraud control solution that will further safeguard its mobile network and M-PESA platform.

245
 
Read More
October 7, 2011

IBM to acquire Q1 Labs and build security intelligence

Armonk, New York, USA: IBM (NYSE: IBM) has agreed to acquire privately held Q1 Labs, a Waltham, Massachusetts-based provider of security intelligence software. The move aims to accelerate IBM’s efforts to secure its clients’ enterprises more intelligently by applying analytics

85
 
Read More
September 16, 2011

Whitepaper issues advice on preventing M2M fraud

The spread of M2M into more consumer and commercial arenas has increased the risk of fraud and so Subex has published a white paper on how to protect networks and connections.

115
 
Read More
August 1, 2011

Embedded Mobile and M2M: With Opportunity Comes Threat

Embedded Mobile (EM) encompasses a host of devices and services using wide-area mobile network technologies to provide communication between machines themselves (M2M) and people.

105

IoT LIFE LESSONS.

 
Read More
1285

FEATURED VIDEOS

 
IoT Now Quickfire Video interview with BICS on IoT security threats to global businesses
 
 
 
 
x

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close