SlideShare a Scribd company logo
tyntec 2015 Research | Secure Networks Key to A2P Monetization1
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Contents
2
Introduction
About the Research
Key Findings and Insights
A2P Growth
The Growth—Security Gap
Greatest Threats
SMS Firewall
A2P Monetization
Implications and Recommendations
tyntec SMS Firewall Solution
About tyntec
3
4
6
7
8
9
12
14
17
11
tyntec 2015 Research | Secure Networks Key to A2P Monetization3
Introduction
In tyntec’s latest whitepaper explore the key data and insights on the A2P SMS
opportunities for mobile network operators (MNOs). See the startling findings on how
unprepared MNOs are when it comes to securing their networks against unauthorized
traffic, what they consider as the greatest security threat, and what role SMS firewalls play
in A2P monetization.
tyntec 2015 Research | Secure Networks Key to A2P Monetization4
About the research
With original research sponsored by tyntec and conducted by mobilesquared using an
online survey of MNOs and interviews with the industry community, this 2015 report sheds
light on what mobile operators must do in order to generate revenues from the growing
potential in A2P messaging. All data and research in this whitepaper is by mobilesquared
unless stated otherwise.
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Key findings and insights
tyntec 2015 Research | Secure Networks Key to A2P Monetization
A2P Growth
The A2P SMS market is growing fast. Based on Ovum’s forecast, A2P traffic will grow to
2.21 trillion messages per day in 2017, representing 31.3% of total messaging traffic.
Juniper estimates that the A2P SMS industry will be worth USD60 billion by 2018.
6
Majority of mobile operators
experiencing year-on-year A2P
growth of between 6%-36%.
A greater percentage of mobile
operators have experienced A2P
messaging traffic growth in 2015
(56%) compared to 2014 (49%).
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Security Gap
Despite the growth of the A2P SMS market, MNOs are in protection mode. The research
reveals MNOs associate the rise of A2P SMS with increased spam and illegal messaging
attacks on subscribers via their networks.
7
Mobile operators slow to capitalise
on A2P opportunity, which is still
dominated by gray routes.
Less than 25% of mobile operators
have deployed next-generation
firewalls necessary to identify gray
routes.
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Greatest Threats
MNOs do not have the sufficient network security tools in place to manage increased
spam and as a result, are also losing out on monetization opportunities.
8
Gray routes account for two-thirds of A2P SMS
traffic, meaning only one-third of A2P traffic
can be monetized by mobile operators.
Mobile operators consider spamming the
greatest threat to their networks, followed by
spoofing, and virus distribution.
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Key Drivers of SMS Firewalls
By using a properly managed SMS firewall, MNOs can gain control over their A2P traffic,
and open up their secured networks to legitimate A2P use cases, providing them with a
termination fee for each message delivered to their subscribers.
9
The main driver for mobile operators
considering deploying an SMS firewall
is network security.
The primary criteria for mobile
operators selecting an SMS firewall
solution is the operational simplicity
and the firewall’s performance.
tyntec 2015 Research | Secure Networks Key to A2P Monetization10
Business Impact of SMS Firewalls
MNOs now seeing the
return of investing in SMS
firewall to ensure legitimate
A2P traffic is delivered to
their customers.
Two-thirds of mobile
operators using SMS
firewalls reported a huge
reduction in unauthorised
messaging traffic.
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Securing to Monetize
The revenue-generating potential of A2P SMS for mobile operators is immense. MNOs
have been searching for a way of getting in on the OTT communications act, but with next-
generation SMS firewall solution, they can access the even greater enterprise messaging
opportunity.
11
The most popular near-term monetization
strategy of MNOs is domestic and international
A2P SMS.
MNOs need to expand their OTT monetization
focus to include the broader enterprise A2P
SMS opportunity.
By closing gray routes and upgrading their SMS
firewalls, MNOs can achieve “clean” and
“legitimate” A2P messaging growth.
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Implications and Recommendations
tyntec 2015 Research | Secure Networks Key to A2P Monetization
The Challenge: Protect and Monetize Core Assets
It’s clear that the monetization potential of A2P SMS is vast, yet the majority of MNOs
have been slow to act on this opportunity. By deploying next-generation firewalls, MNOs
can secure their networks and generate revenues from legitimate A2P use cases.
13
tyntec 2015 Research | Secure Networks Key to A2P Monetization
The Solution: tyntec’s SMS Firewall
14
tyntec’s new SMS Firewall is a content filtering solution with configurable rules that
enables MNOs to control the incoming A2P traffic (SMS, portability and phone
verification lookups) and protect their networks from threats such as grey routes, spam,
flooding, faking, spoofing and others.
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Filter and identify legitimate and profitable
sources of A2P SMS, providing MNOs with all
information needed to negotiate commercial
agreements and, in case of spam or fraud, to
block the traffic.
Tap into the increasing demand
for clean portability information
to support SMS and voice
routing. Identify legitimate traffic
by assigning Global Titles,
enabling the operator to block
illegitimate traffic as well as
monetize legitimate traffic.
Tap into the increasing demand for
clean phone intelligence information
to support authentication and
customer engagement services.
Identify legitimate traffic by
assigning Global Titles, enabling the
operator to block illegitimate traffic
as well as monetize legitimate traffic.
Holistic A2P
Monetization
A2P SMS
Phone
intelligence
data
Portability
data
tyntec SMS Firewall: Holistic A2P Monetization
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Tailored solution: Purchase the firewall infrastructure and deploy it independently, or
have it managed by tyntec, or establish a revenue-sharing business model.
Real-time monitoring & reporting: Threat detection and alerts for unwanted traffic.
Policy management system: Powerful system for defining custom SMS filtering rules.
Customized traffic analysis: Historical traffic analysis for spotting trends and threats,
enables timely preventive measures and monetization planning.
Seamless network integration: TDM and IP-based SIGTRAN integration, supports any
network or architecture.
GSMA compliance: Scanning of all traffic for threats as defined in GSMA IR.70.
Easy-to-use web interface: SMS filtering policy creation made easy with web interface.
16
tyntec SMS Firewall: Key Features
tyntec 2015 Research | Secure Networks Key to A2P Monetization17
About tyntec
tyntec is a telecom-web convergence company that connects the immediacy and
convenience of telecom with the power of the Internet.
Partnering with operators around the world, tyntec enables enterprises and Internet
brands to power their applications, authentication, and mission-critical communications
with universal mobile services such as SMS, voice, and phone numbers in the cloud.
Founded in 2002, tyntec employs over 150 people in six offices around the globe, serving
more than 500 global businesses, Internet brands and telecom operators.
tyntec 2015 Research | Secure Networks Key to A2P Monetization
Our Contact Details
18
UK Offices:
tyntec Ltd.
11 Hope Street
Douglas IM1 1AQ
Isle of Man
tyntec GmbH
6 St Andrew Street
London
EC4A 3AE
Germany Offices:
tyntec GmbH
Hofmannstrasse 25-27
81379
Munich
tyntec GmbH
Semerteichstrasse 54-56
44141
Dortmund
Singapore Office:
tyntec Pte Ltd
51 Goldhill Plaza
#11-01/02
Singapore 308900
US Office:
tyntec Inc.
555 California Street
Suite 4925
San Francisco
For more information, please contact our local Sales Team:
Germany: +49 89 202 451 200
US: +1 415 527 0903
UK: +44 207 436 0283
Singapore: +65 6478 3020
sales@tyntec.com
www.tyntec.com

More Related Content

What's hot

LTE RF Optimization.pdf
 LTE RF Optimization.pdf LTE RF Optimization.pdf
LTE RF Optimization.pdf
RakhiJadav1
 
Artificial Intelligence in Telecom – Industry Adoption Analysis
Artificial Intelligence in Telecom – Industry Adoption AnalysisArtificial Intelligence in Telecom – Industry Adoption Analysis
Artificial Intelligence in Telecom – Industry Adoption Analysis
Netscribes
 
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
Data Driven Innovation
 
final_ppt.pptx
final_ppt.pptxfinal_ppt.pptx
final_ppt.pptx
souravchakraborty815770
 
wireless sensor networks based on iot
wireless sensor networks based on iotwireless sensor networks based on iot
wireless sensor networks based on iot
Eswari Cheedella
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review ppt
Tanujkumar101
 
MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol Introduction
Prem Sanil
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
Hossein Yavari
 
Introduction to MQ Telemetry Transport (MQTT)
Introduction to MQ Telemetry Transport (MQTT)Introduction to MQ Telemetry Transport (MQTT)
Introduction to MQ Telemetry Transport (MQTT)
Amarjeetsingh Thakur
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
Belal Ashraf
 
Soldier Health Monitoring and Position Tracking using LoRa Communications
Soldier Health Monitoring and Position Tracking using LoRa CommunicationsSoldier Health Monitoring and Position Tracking using LoRa Communications
Soldier Health Monitoring and Position Tracking using LoRa Communications
Varshita Puchakayala
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
Peter R. Egli
 
Mqtt(Message queue telemetry protocol) presentation
Mqtt(Message queue telemetry protocol) presentation Mqtt(Message queue telemetry protocol) presentation
Mqtt(Message queue telemetry protocol) presentation
Piyush Rathi
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
Hitesh Mohapatra
 
Cap interface
Cap interfaceCap interface
Cap interface
Atefe Shahrokhi
 
MQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolMQTT - The Internet of Things Protocol
MQTT - The Internet of Things Protocol
Ben Hardill
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
P1Security
 
What is-twamp
What is-twampWhat is-twamp
What is-twamp
Nir Cohen
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
Chetan Kumar S
 

What's hot (20)

LTE RF Optimization.pdf
 LTE RF Optimization.pdf LTE RF Optimization.pdf
LTE RF Optimization.pdf
 
Artificial Intelligence in Telecom – Industry Adoption Analysis
Artificial Intelligence in Telecom – Industry Adoption AnalysisArtificial Intelligence in Telecom – Industry Adoption Analysis
Artificial Intelligence in Telecom – Industry Adoption Analysis
 
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...
 
final_ppt.pptx
final_ppt.pptxfinal_ppt.pptx
final_ppt.pptx
 
wireless sensor networks based on iot
wireless sensor networks based on iotwireless sensor networks based on iot
wireless sensor networks based on iot
 
Home automation using IoT literature review ppt
Home automation using IoT literature review pptHome automation using IoT literature review ppt
Home automation using IoT literature review ppt
 
MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol Introduction
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 
Introduction to MQ Telemetry Transport (MQTT)
Introduction to MQ Telemetry Transport (MQTT)Introduction to MQ Telemetry Transport (MQTT)
Introduction to MQ Telemetry Transport (MQTT)
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
Soldier Health Monitoring and Position Tracking using LoRa Communications
Soldier Health Monitoring and Position Tracking using LoRa CommunicationsSoldier Health Monitoring and Position Tracking using LoRa Communications
Soldier Health Monitoring and Position Tracking using LoRa Communications
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
Mqtt(Message queue telemetry protocol) presentation
Mqtt(Message queue telemetry protocol) presentation Mqtt(Message queue telemetry protocol) presentation
Mqtt(Message queue telemetry protocol) presentation
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
Cap interface
Cap interfaceCap interface
Cap interface
 
MQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolMQTT - The Internet of Things Protocol
MQTT - The Internet of Things Protocol
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
 
What is-twamp
What is-twampWhat is-twamp
What is-twamp
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
 

Similar to Secure Networks Key to A2P Monetisation

Monetization of Portability and Verification
Monetization of Portability and VerificationMonetization of Portability and Verification
Monetization of Portability and Verification
Samantha Warren, MBA
 
Monetization of Portability and Verification
Monetization of Portability and VerificationMonetization of Portability and Verification
Monetization of Portability and Verification
tyntec
 
A2P Monetisation Guide for Mobile Operators
A2P Monetisation Guide for Mobile OperatorsA2P Monetisation Guide for Mobile Operators
A2P Monetisation Guide for Mobile Operators
tyntec
 
Sms firewall market
Sms firewall marketSms firewall market
Sms firewall market
marketsnmarkets39
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
SecurityGen1
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
SecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
SecurityGen1
 
5 Ways to Win over Wholesale SMS Fraud
5 Ways to Win over Wholesale SMS Fraud 5 Ways to Win over Wholesale SMS Fraud
5 Ways to Win over Wholesale SMS Fraud
Claire Cassar
 
TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...
TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...
TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...
Alan Quayle
 
business-m2m-2014-asia-pacific-ict-awards
business-m2m-2014-asia-pacific-ict-awardsbusiness-m2m-2014-asia-pacific-ict-awards
business-m2m-2014-asia-pacific-ict-awardsMichael Cihra
 
M2M summary for all
M2M summary for allM2M summary for all
M2M summary for all
Trust Consultancy
 
M2 m summary for all
M2 m summary for allM2 m summary for all
M2 m summary for allTarik KUCUK
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
Dan Mårtensson
 
Mobile Operator Guide 2013
Mobile Operator Guide 2013Mobile Operator Guide 2013
Mobile Operator Guide 2013Diarmuid Mallon
 
SAP_MobileGuide 2013
SAP_MobileGuide 2013SAP_MobileGuide 2013
SAP_MobileGuide 2013Jann Yip
 
tyntec Operator Services
tyntec Operator Servicestyntec Operator Services
tyntec Operator Services
tyntec
 
OTT_BypassFraud
OTT_BypassFraudOTT_BypassFraud
OTT_BypassFraudTom Wilson
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India? Ranjit Kumar
 
Over-the-top (OTT) TW FINAL v-xv
Over-the-top (OTT) TW FINAL v-xvOver-the-top (OTT) TW FINAL v-xv
Over-the-top (OTT) TW FINAL v-xvTom Wilson
 

Similar to Secure Networks Key to A2P Monetisation (20)

Monetization of Portability and Verification
Monetization of Portability and VerificationMonetization of Portability and Verification
Monetization of Portability and Verification
 
Monetization of Portability and Verification
Monetization of Portability and VerificationMonetization of Portability and Verification
Monetization of Portability and Verification
 
A2P Monetisation Guide for Mobile Operators
A2P Monetisation Guide for Mobile OperatorsA2P Monetisation Guide for Mobile Operators
A2P Monetisation Guide for Mobile Operators
 
Sms firewall market
Sms firewall marketSms firewall market
Sms firewall market
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
5 Ways to Win over Wholesale SMS Fraud
5 Ways to Win over Wholesale SMS Fraud 5 Ways to Win over Wholesale SMS Fraud
5 Ways to Win over Wholesale SMS Fraud
 
TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...
TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...
TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...
 
business-m2m-2014-asia-pacific-ict-awards
business-m2m-2014-asia-pacific-ict-awardsbusiness-m2m-2014-asia-pacific-ict-awards
business-m2m-2014-asia-pacific-ict-awards
 
M2M summary for all
M2M summary for allM2M summary for all
M2M summary for all
 
M2 m summary for all
M2 m summary for allM2 m summary for all
M2 m summary for all
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
 
Mobile Operator Guide 2013
Mobile Operator Guide 2013Mobile Operator Guide 2013
Mobile Operator Guide 2013
 
SAP_MobileGuide 2013
SAP_MobileGuide 2013SAP_MobileGuide 2013
SAP_MobileGuide 2013
 
tyntec Operator Services
tyntec Operator Servicestyntec Operator Services
tyntec Operator Services
 
OTT_BypassFraud
OTT_BypassFraudOTT_BypassFraud
OTT_BypassFraud
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?
 
Over-the-top (OTT) TW FINAL v-xv
Over-the-top (OTT) TW FINAL v-xvOver-the-top (OTT) TW FINAL v-xv
Over-the-top (OTT) TW FINAL v-xv
 

Secure Networks Key to A2P Monetisation

  • 1. tyntec 2015 Research | Secure Networks Key to A2P Monetization1
  • 2. tyntec 2015 Research | Secure Networks Key to A2P Monetization Contents 2 Introduction About the Research Key Findings and Insights A2P Growth The Growth—Security Gap Greatest Threats SMS Firewall A2P Monetization Implications and Recommendations tyntec SMS Firewall Solution About tyntec 3 4 6 7 8 9 12 14 17 11
  • 3. tyntec 2015 Research | Secure Networks Key to A2P Monetization3 Introduction In tyntec’s latest whitepaper explore the key data and insights on the A2P SMS opportunities for mobile network operators (MNOs). See the startling findings on how unprepared MNOs are when it comes to securing their networks against unauthorized traffic, what they consider as the greatest security threat, and what role SMS firewalls play in A2P monetization.
  • 4. tyntec 2015 Research | Secure Networks Key to A2P Monetization4 About the research With original research sponsored by tyntec and conducted by mobilesquared using an online survey of MNOs and interviews with the industry community, this 2015 report sheds light on what mobile operators must do in order to generate revenues from the growing potential in A2P messaging. All data and research in this whitepaper is by mobilesquared unless stated otherwise.
  • 5. tyntec 2015 Research | Secure Networks Key to A2P Monetization Key findings and insights
  • 6. tyntec 2015 Research | Secure Networks Key to A2P Monetization A2P Growth The A2P SMS market is growing fast. Based on Ovum’s forecast, A2P traffic will grow to 2.21 trillion messages per day in 2017, representing 31.3% of total messaging traffic. Juniper estimates that the A2P SMS industry will be worth USD60 billion by 2018. 6 Majority of mobile operators experiencing year-on-year A2P growth of between 6%-36%. A greater percentage of mobile operators have experienced A2P messaging traffic growth in 2015 (56%) compared to 2014 (49%).
  • 7. tyntec 2015 Research | Secure Networks Key to A2P Monetization Security Gap Despite the growth of the A2P SMS market, MNOs are in protection mode. The research reveals MNOs associate the rise of A2P SMS with increased spam and illegal messaging attacks on subscribers via their networks. 7 Mobile operators slow to capitalise on A2P opportunity, which is still dominated by gray routes. Less than 25% of mobile operators have deployed next-generation firewalls necessary to identify gray routes.
  • 8. tyntec 2015 Research | Secure Networks Key to A2P Monetization Greatest Threats MNOs do not have the sufficient network security tools in place to manage increased spam and as a result, are also losing out on monetization opportunities. 8 Gray routes account for two-thirds of A2P SMS traffic, meaning only one-third of A2P traffic can be monetized by mobile operators. Mobile operators consider spamming the greatest threat to their networks, followed by spoofing, and virus distribution.
  • 9. tyntec 2015 Research | Secure Networks Key to A2P Monetization Key Drivers of SMS Firewalls By using a properly managed SMS firewall, MNOs can gain control over their A2P traffic, and open up their secured networks to legitimate A2P use cases, providing them with a termination fee for each message delivered to their subscribers. 9 The main driver for mobile operators considering deploying an SMS firewall is network security. The primary criteria for mobile operators selecting an SMS firewall solution is the operational simplicity and the firewall’s performance.
  • 10. tyntec 2015 Research | Secure Networks Key to A2P Monetization10 Business Impact of SMS Firewalls MNOs now seeing the return of investing in SMS firewall to ensure legitimate A2P traffic is delivered to their customers. Two-thirds of mobile operators using SMS firewalls reported a huge reduction in unauthorised messaging traffic.
  • 11. tyntec 2015 Research | Secure Networks Key to A2P Monetization Securing to Monetize The revenue-generating potential of A2P SMS for mobile operators is immense. MNOs have been searching for a way of getting in on the OTT communications act, but with next- generation SMS firewall solution, they can access the even greater enterprise messaging opportunity. 11 The most popular near-term monetization strategy of MNOs is domestic and international A2P SMS. MNOs need to expand their OTT monetization focus to include the broader enterprise A2P SMS opportunity. By closing gray routes and upgrading their SMS firewalls, MNOs can achieve “clean” and “legitimate” A2P messaging growth.
  • 12. tyntec 2015 Research | Secure Networks Key to A2P Monetization Implications and Recommendations
  • 13. tyntec 2015 Research | Secure Networks Key to A2P Monetization The Challenge: Protect and Monetize Core Assets It’s clear that the monetization potential of A2P SMS is vast, yet the majority of MNOs have been slow to act on this opportunity. By deploying next-generation firewalls, MNOs can secure their networks and generate revenues from legitimate A2P use cases. 13
  • 14. tyntec 2015 Research | Secure Networks Key to A2P Monetization The Solution: tyntec’s SMS Firewall 14 tyntec’s new SMS Firewall is a content filtering solution with configurable rules that enables MNOs to control the incoming A2P traffic (SMS, portability and phone verification lookups) and protect their networks from threats such as grey routes, spam, flooding, faking, spoofing and others.
  • 15. tyntec 2015 Research | Secure Networks Key to A2P Monetization Filter and identify legitimate and profitable sources of A2P SMS, providing MNOs with all information needed to negotiate commercial agreements and, in case of spam or fraud, to block the traffic. Tap into the increasing demand for clean portability information to support SMS and voice routing. Identify legitimate traffic by assigning Global Titles, enabling the operator to block illegitimate traffic as well as monetize legitimate traffic. Tap into the increasing demand for clean phone intelligence information to support authentication and customer engagement services. Identify legitimate traffic by assigning Global Titles, enabling the operator to block illegitimate traffic as well as monetize legitimate traffic. Holistic A2P Monetization A2P SMS Phone intelligence data Portability data tyntec SMS Firewall: Holistic A2P Monetization
  • 16. tyntec 2015 Research | Secure Networks Key to A2P Monetization Tailored solution: Purchase the firewall infrastructure and deploy it independently, or have it managed by tyntec, or establish a revenue-sharing business model. Real-time monitoring & reporting: Threat detection and alerts for unwanted traffic. Policy management system: Powerful system for defining custom SMS filtering rules. Customized traffic analysis: Historical traffic analysis for spotting trends and threats, enables timely preventive measures and monetization planning. Seamless network integration: TDM and IP-based SIGTRAN integration, supports any network or architecture. GSMA compliance: Scanning of all traffic for threats as defined in GSMA IR.70. Easy-to-use web interface: SMS filtering policy creation made easy with web interface. 16 tyntec SMS Firewall: Key Features
  • 17. tyntec 2015 Research | Secure Networks Key to A2P Monetization17 About tyntec tyntec is a telecom-web convergence company that connects the immediacy and convenience of telecom with the power of the Internet. Partnering with operators around the world, tyntec enables enterprises and Internet brands to power their applications, authentication, and mission-critical communications with universal mobile services such as SMS, voice, and phone numbers in the cloud. Founded in 2002, tyntec employs over 150 people in six offices around the globe, serving more than 500 global businesses, Internet brands and telecom operators.
  • 18. tyntec 2015 Research | Secure Networks Key to A2P Monetization Our Contact Details 18 UK Offices: tyntec Ltd. 11 Hope Street Douglas IM1 1AQ Isle of Man tyntec GmbH 6 St Andrew Street London EC4A 3AE Germany Offices: tyntec GmbH Hofmannstrasse 25-27 81379 Munich tyntec GmbH Semerteichstrasse 54-56 44141 Dortmund Singapore Office: tyntec Pte Ltd 51 Goldhill Plaza #11-01/02 Singapore 308900 US Office: tyntec Inc. 555 California Street Suite 4925 San Francisco For more information, please contact our local Sales Team: Germany: +49 89 202 451 200 US: +1 415 527 0903 UK: +44 207 436 0283 Singapore: +65 6478 3020 sales@tyntec.com www.tyntec.com