SlideShare a Scribd company logo
1 of 15
Download to read offline
Securing People and Things a
Monetization Opportunity
September 2016
Moshe Elias
Dir. Product Marketing
2
2000 2003 2008 2010 2015 2020
Est. 18 Billion Connected
Devices vs. Est 7.35 Billon
People World Population
3G Mobile Broadband 4G LTE
Faster/Better
5G
Est 50 Billion connected
devices
More connected
devices than
connected people
Allot at a Glance
Regional Headquarters
Sales & Support Offices
R&D Centers
Public company (NASDAQ, TASE: ALLT)
$100.3M revenues in 2015
75% gross margin (profitable)
$116M in cash
20Y deployment experience
100+ countries
1000+ CSP customers
24x7 follow-the-sun support
Powering 5 of top 10 mobile CSPs
Serving 1B subscribers worldwide
#1 provider of SECaaS in Europe
Protecting >15M Endpoints
3
Allot Monetization & Security Framework
4
Different IoT types With different Needs
5
Smart Building Tracking and Logistics
Fleet
management Agriculture Metering
Health Care
Industry Smart Grid
Transportation
Safety
High Scale Solutions Critical Solutions
Low cost, Low Power, Low Bandwidth, Extreme availability and reliability
Connected Car has all types
Collision avoidance
Low Latency
Extreme Reliability
Remote Assistance
Sporadic Use
Real Time
Car Monitoring & Diagnostics
Engine and Telemetry
Low B/W
High Reliability
Infotainment
High B/W
6
New Charging Models
7
Sub System Need Charging Model Network Capability
Remote Assistance
Low usage
High Availability
Real Time
QoS based charging
Enforce and measure class of
service
Collision Avoidance
Extreme Availability
Low Latency
SLA based charging Enforce and measure SLA
Navigation and Infotainment High BW Application based charging Application aware
Car Monitoring and
Diagnostics
Low BW
Bulk charging / transaction
based
Device aware
?
Analytics is crucial for IoT
9
Telecoms.com Intelligence – IoT Outlook 2016
5%
51% 44%
How important do you think it is to understand the specific identity,
activity and requirements of each IoT device connecting to the
mobile network?
Not important: we don’t need to know
what the traffic is, we just provide
connectivity
Quite important: some device insight
will help us better optimize costs and
network resources
Very important: to harnes the full
potential of IoT and maximise profits, I
need to monetise information and offer it
to my enterprise customers
Analytics as a Service
Behavioral analysis and Anomaly
detect and alert
Security Analytics
QOS & SLA reports
Asset HeartBeat and Health
reporting
Other Alerting services
Mobile IoT
History Repeats itself
10
Security as an add on
Security as a Service
Security by Design
Security as a Service
Security by Design
Design for features and functionality first
Not an option
IP Core Network
Protecting the Service
• White list – IP, Port & protocol compliance
• DDOS detection and blocking
• Infected/Malfunction device quarantine
Monetizing Security Opportunities
Allot
Service Gateway
Protecting the Endpoint
• White list – IP, Port & protocol compliance
• Authentication enforcement
• Secure Web Gateway
IoT Analytics
• Identify device type
• Behavioral analysis
• Anomaly detection
• Capacity Planning
Allot ClearSee
Analytics
IoT Management
Cloud
RAN
11
Customer Success
Stories
12
Managing and Monitoring IoT Customers
13
CHALLENGE
Build a single portal for managing and controlling the
entire lifecycle of the industrial IoT customers running
on the same 3G mobile consumers network.
SOLUTION
“By keeping DDoS traffic
off the network and
managing CMTS
congestion precisely
where it occurs, we have
been able to delay
infrastructure expansion
by 2 years and to save
millions.”
BENEFITS
• Stop revenue leakage
• Visibility to IoT device
usageMOBILE OPERATOR
Asia Allot Analytics delivered IoT device usage statistics and
alerted upon abnormal behavior all of which were fully
integrated to the IoT portal and terminal display. Allot
Service Gateway, allowed validating device traffic and
access and preventing potential device misuse.
Maximize Revenue with Fraud Prevention, Analytics
14
CHALLENGE
Decline in fixed-line business due to growing
competition and churn as well as revenue leakage in
mobile business due to fraud.
Allot Smart Data Source provides granular visibility of usage
per subscriber, enabling targeted engagement and
pinpointing the causes of revenue leakage. Allot policy
control is used to eliminate charging fraud.
SOLUTION
“By keeping DDoS traffic
off the network and
managing CMTS
congestion precisely
where it occurs, we have
been able to delay
infrastructure expansion
by 2 years and to save
millions.”
BENEFITS
• Stop revenue leakage
• Accurate visibility of
customer usage
• Effective engagement
More than 10% of the revenues were saved by fraud prevention on the mobile business
CABLE & MOBILE
OPERATOR
Caribbean
Security as a Revenue Generating Service
15
CHALLENGE
Provide a simple, accessible and effective security services for
consumers and small businesses regardless of their device.
“By keeping DDoS traffic
off the network and
managing CMTS
congestion precisely
where it occurs, we have
been able to delay
infrastructure expansion
by 2 years and to save
millions.”
Name of person
Title of person
“By keeping DDoS traffic
off the network and
managing CMTS
congestion precisely
where it occurs, we have
been able to delay
infrastructure expansion
by 2 years and to save
millions.”
BENEFITS
• Service differentiation
• Customer brand
• Customer satisfaction
from useful services
• New revenue streams
from SECaaS
“Privacy and security can pose risks to our customers and our business, but we also see potential to
differentiate our brand not just by managing these risks but by offering products and services
designed to support customers in improving their privacy and security.”
Vodafone Sustainability Report (2014)
Allot WebSafe Family as a fully integrated service in the
Allot Service Gateway to deliver Security as a Service to
Consumers, SMBs & Enterprises.
SOLUTIONVODAFONE
Germany
MOBILE SP
THANK
Find out how Allot can help
YOUR business to become
a leading Digital Lifestyle Provider
Email info@allot.com
www.allot.com 16

More Related Content

What's hot

Rio Info 2015 - Painel Projetos Inovadores com IoT - Henrique postal
Rio Info 2015 - Painel Projetos Inovadores com IoT - Henrique postalRio Info 2015 - Painel Projetos Inovadores com IoT - Henrique postal
Rio Info 2015 - Painel Projetos Inovadores com IoT - Henrique postalRio Info
 
DWS16 - Connected things forum - Luc Julia, Samsung Electronics
DWS16 - Connected things forum - Luc Julia, Samsung ElectronicsDWS16 - Connected things forum - Luc Julia, Samsung Electronics
DWS16 - Connected things forum - Luc Julia, Samsung ElectronicsIDATE DigiWorld
 
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2EForgeRock
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyUbisecure
 
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’ForgeRock
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementBjorn Hjelm
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
 
Etisalat Digital Services
Etisalat Digital ServicesEtisalat Digital Services
Etisalat Digital ServicesGrafic.guru
 
Etisalat Digital Connect
Etisalat Digital ConnectEtisalat Digital Connect
Etisalat Digital ConnectGrafic.guru
 
What is IoT and how can it impact your business - by Piet Vandaele
What is IoT and how can it impact your business - by Piet VandaeleWhat is IoT and how can it impact your business - by Piet Vandaele
What is IoT and how can it impact your business - by Piet VandaeleACA IT-Solutions
 
apidays LIVE London 2021 - Embedded Finance and new API infrastructure by Rau...
apidays LIVE London 2021 - Embedded Finance and new API infrastructure by Rau...apidays LIVE London 2021 - Embedded Finance and new API infrastructure by Rau...
apidays LIVE London 2021 - Embedded Finance and new API infrastructure by Rau...apidays
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 
Telia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldTelia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldUbisecure
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESForgeRock
 
PCRF_Berlin2016_SG
PCRF_Berlin2016_SGPCRF_Berlin2016_SG
PCRF_Berlin2016_SGSanela Golos
 
IoT Acceleration Secrets
IoT Acceleration SecretsIoT Acceleration Secrets
IoT Acceleration SecretsEurotech
 
2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefitsForgeRock
 

What's hot (20)

Airlink Wireless Systems
Airlink Wireless SystemsAirlink Wireless Systems
Airlink Wireless Systems
 
Rio Info 2015 - Painel Projetos Inovadores com IoT - Henrique postal
Rio Info 2015 - Painel Projetos Inovadores com IoT - Henrique postalRio Info 2015 - Painel Projetos Inovadores com IoT - Henrique postal
Rio Info 2015 - Painel Projetos Inovadores com IoT - Henrique postal
 
DWS16 - Connected things forum - Luc Julia, Samsung Electronics
DWS16 - Connected things forum - Luc Julia, Samsung ElectronicsDWS16 - Connected things forum - Luc Julia, Samsung Electronics
DWS16 - Connected things forum - Luc Julia, Samsung Electronics
 
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
 
NSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access ManagementNSTIC Panel on Mobile-based Identity and Access Management
NSTIC Panel on Mobile-based Identity and Access Management
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
Etisalat Digital Services
Etisalat Digital ServicesEtisalat Digital Services
Etisalat Digital Services
 
Etisalat Digital Connect
Etisalat Digital ConnectEtisalat Digital Connect
Etisalat Digital Connect
 
What is IoT and how can it impact your business - by Piet Vandaele
What is IoT and how can it impact your business - by Piet VandaeleWhat is IoT and how can it impact your business - by Piet Vandaele
What is IoT and how can it impact your business - by Piet Vandaele
 
apidays LIVE London 2021 - Embedded Finance and new API infrastructure by Rau...
apidays LIVE London 2021 - Embedded Finance and new API infrastructure by Rau...apidays LIVE London 2021 - Embedded Finance and new API infrastructure by Rau...
apidays LIVE London 2021 - Embedded Finance and new API infrastructure by Rau...
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
Telia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldTelia - The New Norm of the Digital World
Telia - The New Norm of the Digital World
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
 
PCRF_Berlin2016_SG
PCRF_Berlin2016_SGPCRF_Berlin2016_SG
PCRF_Berlin2016_SG
 
IoT Acceleration Secrets
IoT Acceleration SecretsIoT Acceleration Secrets
IoT Acceleration Secrets
 
2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits2015 Identity Summit - OpenAM: Friends with benefits
2015 Identity Summit - OpenAM: Friends with benefits
 

Viewers also liked

Lte Lat Am 2011 Allot Presentation Making Mobile Broadband Financially Viable
Lte Lat Am 2011 Allot Presentation   Making Mobile Broadband Financially ViableLte Lat Am 2011 Allot Presentation   Making Mobile Broadband Financially Viable
Lte Lat Am 2011 Allot Presentation Making Mobile Broadband Financially ViableEyal Yaron
 
Digital Lifestyle & M2M
Digital Lifestyle & M2MDigital Lifestyle & M2M
Digital Lifestyle & M2MComarch
 
IoT_e-book from blog series by Marie Martin
IoT_e-book from blog series by Marie Martin IoT_e-book from blog series by Marie Martin
IoT_e-book from blog series by Marie Martin Marie Martin
 
Monetisation IoT through true life cases
Monetisation IoT through true life casesMonetisation IoT through true life cases
Monetisation IoT through true life casesdelaware BeLux
 
Andy thurai iot security
Andy thurai iot securityAndy thurai iot security
Andy thurai iot securityMassTLC
 
Smart connected applications
Smart connected applicationsSmart connected applications
Smart connected applicationsJizhong Chen
 
Cloud Ecosystems IoT Portfolio
Cloud Ecosystems IoT PortfolioCloud Ecosystems IoT Portfolio
Cloud Ecosystems IoT PortfolioAshok Kumar
 
IoT Platform Meetup - ThingWorx
IoT Platform Meetup - ThingWorxIoT Platform Meetup - ThingWorx
IoT Platform Meetup - ThingWorxFilip Kolář
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things eCornell
 
Subscribed 2015: The Explosion of Smart Connected Things
Subscribed 2015: The Explosion of Smart Connected ThingsSubscribed 2015: The Explosion of Smart Connected Things
Subscribed 2015: The Explosion of Smart Connected ThingsZuora, Inc.
 
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...Ali Saghaeian
 
Monetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer ExperienceMonetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer ExperienceZuora, Inc.
 
Improving FM service and profitability with InVMA and ThingWorx
Improving FM service and profitability with InVMA and ThingWorxImproving FM service and profitability with InVMA and ThingWorx
Improving FM service and profitability with InVMA and ThingWorxJon Hill
 

Viewers also liked (16)

Lte Lat Am 2011 Allot Presentation Making Mobile Broadband Financially Viable
Lte Lat Am 2011 Allot Presentation   Making Mobile Broadband Financially ViableLte Lat Am 2011 Allot Presentation   Making Mobile Broadband Financially Viable
Lte Lat Am 2011 Allot Presentation Making Mobile Broadband Financially Viable
 
Digital Lifestyle & M2M
Digital Lifestyle & M2MDigital Lifestyle & M2M
Digital Lifestyle & M2M
 
IoT_e-book from blog series by Marie Martin
IoT_e-book from blog series by Marie Martin IoT_e-book from blog series by Marie Martin
IoT_e-book from blog series by Marie Martin
 
Monetisation IoT through true life cases
Monetisation IoT through true life casesMonetisation IoT through true life cases
Monetisation IoT through true life cases
 
Commerce of Things
Commerce of ThingsCommerce of Things
Commerce of Things
 
Andy thurai iot security
Andy thurai iot securityAndy thurai iot security
Andy thurai iot security
 
Smart connected applications
Smart connected applicationsSmart connected applications
Smart connected applications
 
Cloud Ecosystems IoT Portfolio
Cloud Ecosystems IoT PortfolioCloud Ecosystems IoT Portfolio
Cloud Ecosystems IoT Portfolio
 
Retaam_ThingWorx
Retaam_ThingWorxRetaam_ThingWorx
Retaam_ThingWorx
 
IoT Platform Meetup - ThingWorx
IoT Platform Meetup - ThingWorxIoT Platform Meetup - ThingWorx
IoT Platform Meetup - ThingWorx
 
IoT13: Thingworx showcase
IoT13: Thingworx showcaseIoT13: Thingworx showcase
IoT13: Thingworx showcase
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
 
Subscribed 2015: The Explosion of Smart Connected Things
Subscribed 2015: The Explosion of Smart Connected ThingsSubscribed 2015: The Explosion of Smart Connected Things
Subscribed 2015: The Explosion of Smart Connected Things
 
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
Applications of Internet of Things (IoT), Big Data and Cloud Services in 4G-b...
 
Monetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer ExperienceMonetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer Experience
 
Improving FM service and profitability with InVMA and ThingWorx
Improving FM service and profitability with InVMA and ThingWorxImproving FM service and profitability with InVMA and ThingWorx
Improving FM service and profitability with InVMA and ThingWorx
 

Similar to Securing people and things a monetization opportunity

Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...polenumerique33
 
Milesight Internet of things product 2024.pdf
Milesight Internet of things product 2024.pdfMilesight Internet of things product 2024.pdf
Milesight Internet of things product 2024.pdfIwanHusaeni2
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIDan Mårtensson
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital EconomyWSO2
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed SecurityDarryl Santa
 
智慧市政大未來 主題一
智慧市政大未來 主題一智慧市政大未來 主題一
智慧市政大未來 主題一Mavis CHU
 
5G Network Managament for Inteligent Transport Systems
5G Network Managament for Inteligent Transport Systems5G Network Managament for Inteligent Transport Systems
5G Network Managament for Inteligent Transport Systemslebarka
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundationBernard Kufluk
 
NECA-2016-Yim-Short
NECA-2016-Yim-ShortNECA-2016-Yim-Short
NECA-2016-Yim-Shortphilip_yim
 
13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-fAndreas Mai
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCODomotys
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsAndreas Mai
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
20170207 THe Valley_Internet of things ongoing revolution
20170207 THe Valley_Internet of things ongoing revolution20170207 THe Valley_Internet of things ongoing revolution
20170207 THe Valley_Internet of things ongoing revolutionBernardo Campillo
 

Similar to Securing people and things a monetization opportunity (20)

Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
 
LTTC Presentation April 2014
LTTC Presentation April 2014LTTC Presentation April 2014
LTTC Presentation April 2014
 
02 lttc
02 lttc02 lttc
02 lttc
 
Milesight Internet of things product 2024.pdf
Milesight Internet of things product 2024.pdfMilesight Internet of things product 2024.pdf
Milesight Internet of things product 2024.pdf
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
[WSO2Con EU 2017] Keynote: Mobile Identity in the Digital Economy
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
智慧市政大未來 主題一
智慧市政大未來 主題一智慧市政大未來 主題一
智慧市政大未來 主題一
 
5G Network Managament for Inteligent Transport Systems
5G Network Managament for Inteligent Transport Systems5G Network Managament for Inteligent Transport Systems
5G Network Managament for Inteligent Transport Systems
 
otp-sms-two-factor-authentication
otp-sms-two-factor-authenticationotp-sms-two-factor-authentication
otp-sms-two-factor-authentication
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundation
 
NECA-2016-Yim-Short
NECA-2016-Yim-ShortNECA-2016-Yim-Short
NECA-2016-Yim-Short
 
13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco Systems
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
20170207 THe Valley_Internet of things ongoing revolution
20170207 THe Valley_Internet of things ongoing revolution20170207 THe Valley_Internet of things ongoing revolution
20170207 THe Valley_Internet of things ongoing revolution
 

More from Allot Communications

Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...Allot Communications
 
Allot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Communications
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicyAllot Communications
 
Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have? Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have? Allot Communications
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues Allot Communications
 
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network PerformanceCMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network PerformanceAllot Communications
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot Communications
 
Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare Allot Communications
 
Allot Optenet Parental Control: Solution Brief
Allot Optenet Parental Control: Solution BriefAllot Optenet Parental Control: Solution Brief
Allot Optenet Parental Control: Solution BriefAllot Communications
 
Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)Allot Communications
 

More from Allot Communications (11)

Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...
 
Allot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer Enagagement
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have? Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have?
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues
 
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network PerformanceCMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos Mitigation
 
Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare
 
Allot Optenet Parental Control: Solution Brief
Allot Optenet Parental Control: Solution BriefAllot Optenet Parental Control: Solution Brief
Allot Optenet Parental Control: Solution Brief
 
Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Securing people and things a monetization opportunity

  • 1. Securing People and Things a Monetization Opportunity September 2016 Moshe Elias Dir. Product Marketing
  • 2. 2 2000 2003 2008 2010 2015 2020 Est. 18 Billion Connected Devices vs. Est 7.35 Billon People World Population 3G Mobile Broadband 4G LTE Faster/Better 5G Est 50 Billion connected devices More connected devices than connected people
  • 3. Allot at a Glance Regional Headquarters Sales & Support Offices R&D Centers Public company (NASDAQ, TASE: ALLT) $100.3M revenues in 2015 75% gross margin (profitable) $116M in cash 20Y deployment experience 100+ countries 1000+ CSP customers 24x7 follow-the-sun support Powering 5 of top 10 mobile CSPs Serving 1B subscribers worldwide #1 provider of SECaaS in Europe Protecting >15M Endpoints 3
  • 4. Allot Monetization & Security Framework 4
  • 5. Different IoT types With different Needs 5 Smart Building Tracking and Logistics Fleet management Agriculture Metering Health Care Industry Smart Grid Transportation Safety High Scale Solutions Critical Solutions Low cost, Low Power, Low Bandwidth, Extreme availability and reliability
  • 6. Connected Car has all types Collision avoidance Low Latency Extreme Reliability Remote Assistance Sporadic Use Real Time Car Monitoring & Diagnostics Engine and Telemetry Low B/W High Reliability Infotainment High B/W 6
  • 7. New Charging Models 7 Sub System Need Charging Model Network Capability Remote Assistance Low usage High Availability Real Time QoS based charging Enforce and measure class of service Collision Avoidance Extreme Availability Low Latency SLA based charging Enforce and measure SLA Navigation and Infotainment High BW Application based charging Application aware Car Monitoring and Diagnostics Low BW Bulk charging / transaction based Device aware ?
  • 8. Analytics is crucial for IoT 9 Telecoms.com Intelligence – IoT Outlook 2016 5% 51% 44% How important do you think it is to understand the specific identity, activity and requirements of each IoT device connecting to the mobile network? Not important: we don’t need to know what the traffic is, we just provide connectivity Quite important: some device insight will help us better optimize costs and network resources Very important: to harnes the full potential of IoT and maximise profits, I need to monetise information and offer it to my enterprise customers Analytics as a Service Behavioral analysis and Anomaly detect and alert Security Analytics QOS & SLA reports Asset HeartBeat and Health reporting Other Alerting services
  • 9. Mobile IoT History Repeats itself 10 Security as an add on Security as a Service Security by Design Security as a Service Security by Design Design for features and functionality first Not an option
  • 10. IP Core Network Protecting the Service • White list – IP, Port & protocol compliance • DDOS detection and blocking • Infected/Malfunction device quarantine Monetizing Security Opportunities Allot Service Gateway Protecting the Endpoint • White list – IP, Port & protocol compliance • Authentication enforcement • Secure Web Gateway IoT Analytics • Identify device type • Behavioral analysis • Anomaly detection • Capacity Planning Allot ClearSee Analytics IoT Management Cloud RAN 11
  • 12. Managing and Monitoring IoT Customers 13 CHALLENGE Build a single portal for managing and controlling the entire lifecycle of the industrial IoT customers running on the same 3G mobile consumers network. SOLUTION “By keeping DDoS traffic off the network and managing CMTS congestion precisely where it occurs, we have been able to delay infrastructure expansion by 2 years and to save millions.” BENEFITS • Stop revenue leakage • Visibility to IoT device usageMOBILE OPERATOR Asia Allot Analytics delivered IoT device usage statistics and alerted upon abnormal behavior all of which were fully integrated to the IoT portal and terminal display. Allot Service Gateway, allowed validating device traffic and access and preventing potential device misuse.
  • 13. Maximize Revenue with Fraud Prevention, Analytics 14 CHALLENGE Decline in fixed-line business due to growing competition and churn as well as revenue leakage in mobile business due to fraud. Allot Smart Data Source provides granular visibility of usage per subscriber, enabling targeted engagement and pinpointing the causes of revenue leakage. Allot policy control is used to eliminate charging fraud. SOLUTION “By keeping DDoS traffic off the network and managing CMTS congestion precisely where it occurs, we have been able to delay infrastructure expansion by 2 years and to save millions.” BENEFITS • Stop revenue leakage • Accurate visibility of customer usage • Effective engagement More than 10% of the revenues were saved by fraud prevention on the mobile business CABLE & MOBILE OPERATOR Caribbean
  • 14. Security as a Revenue Generating Service 15 CHALLENGE Provide a simple, accessible and effective security services for consumers and small businesses regardless of their device. “By keeping DDoS traffic off the network and managing CMTS congestion precisely where it occurs, we have been able to delay infrastructure expansion by 2 years and to save millions.” Name of person Title of person “By keeping DDoS traffic off the network and managing CMTS congestion precisely where it occurs, we have been able to delay infrastructure expansion by 2 years and to save millions.” BENEFITS • Service differentiation • Customer brand • Customer satisfaction from useful services • New revenue streams from SECaaS “Privacy and security can pose risks to our customers and our business, but we also see potential to differentiate our brand not just by managing these risks but by offering products and services designed to support customers in improving their privacy and security.” Vodafone Sustainability Report (2014) Allot WebSafe Family as a fully integrated service in the Allot Service Gateway to deliver Security as a Service to Consumers, SMBs & Enterprises. SOLUTIONVODAFONE Germany MOBILE SP
  • 15. THANK Find out how Allot can help YOUR business to become a leading Digital Lifestyle Provider Email info@allot.com www.allot.com 16