mobile world congress barcelona 2008 · massive mobile growth worldwide means • first personal...
TRANSCRIPT
Mobile Usage ProtectionMobile World Congress Barcelona 2008
Commercial: In Confidence 2Confidential © AdaptiveMobile Security Ltd 2008
The issues we address
Protection Of: Subscribers, Networks, Businesses
Massive mobile growth worldwide means• First personal (or shared) communication• First on-line experience
- In emerging markets- In developed markets with adoption by new segments in (Children, Seniors)
Social, Regulatory and Commercial drivers to ensure it is safe• Harassment free• Protected from Fraud / Social engineering attacks
But security is not just “below the line cost”• Value generation – New lines of revenue• Promote customer acquisition & retention
Enterprises now starting to also quantify mobile risk factors
Commercial: In Confidence 3Confidential © AdaptiveMobile Security Ltd 2008
Harassment / Bullying
Inappropriate Content
1 in 3 11-16 year olds
55,000 Viruses per day
(Typical Operator)
1-2% spam / 80% Users (2.3 Trillion SMS in ’08)
~6% of traffic is pornography
Viruses
3.6 Million Adults lost money in phishing attacks
2nd highest destination for Children
Spam / Phishing
Threats encountered
Commercial: In Confidence 4Confidential © AdaptiveMobile Security Ltd 2008
The Value We Bring
Content Filtering Content Filtering
SegmentationAnalysis
SegmentationAnalysis
Voice SMS Web Email MMS IP Apps IMS
Anti Virus Anti Virus
Anti Spam Anti
SpamWhite / Black
List White / Black
List Time of DayTime of Day ImageAnalysisImage
AnalysisApplication
Controls Application
Controls
Advertising Management Advertising
Management
Handset AV Policy Handset
AV PolicyAge
Verification Age
VerificationMessage Retention Message Retention
Services
Treatment Controls
Revenue Improvement
Content DRM
Content DRM
Service Policy Control
Service Policy Control
Message Conversion Message
ConversionContent
Sponsorship Content
SponsorshipNotification
Alerts Notification
AlertsUsage
ReportingUsage
ReportingPrivacy
Controls Privacy
ControlsHandset
VRE Handset
VRE
Personalised Policies
Personalised Policies
Parental Portal Corporate Portal
Commercial: In Confidence 5Confidential © AdaptiveMobile Security Ltd 2008
Content Filtering Capabilities
Traffic Control Content Filtering ActionsContent
Categorisation
Text Inspection Malware
Spam Content Analysis
Block
Redirect
Modify
Notify
Report
Age
V
erifi
catio
n
• Illegal
• Adult
•Inappropriate
•Business & Entertainment
•Content partner tagging
Opt in/opt outFriends & FamilyPersonal Whitelist
Individual Blacklist Subscription controls
Traffic Analysis-Anti-flooding-Anti spoofing/faking-Suspicious traffic pattern detection
• Image Signatures• Image Analysis
Identity• Applications
OffensiveInappropriate Content Keyword detection
Viruses TrojansRogue Applications
Identity & Privacy ManagementContent & file signatures
Spam DetectionRBLSignature matchingAnti-phishing
CONTENT SECURITY
SMS
MMS
Mobile Web
P2P
Voice
IMS
GSM /CDMA
Converged
WiFi
WiMAX
PARENTAL CONTROLS / CORPORATE CONTROLS
Bea
rer
Con
vers
ion
Con
tent
In
serti
onM
essa
ge
Ret
entio
nB
ehav
iour
Ana
lysi
sR
eque
st
Tagg
ing
ImageAnalysis
P2P Application Controls
Commercial: In Confidence 6Confidential © AdaptiveMobile Security Ltd 2008
AdaptiveMobile User Self Care Consumer & Corporate
Enabling personalised control:Manages Permissions across Web, Voice, Messaging, AdvertisingAddresses: Anti-Bullying, Friends & Family Whitelists, Time of Day / Usage, Premium Rate & Category ControlsAchieving subscriber retention, acquisition & new revenuesMarket achieving $3-$5 pcm per handsetWhilst maintaining their Privacy
Commercial: In Confidence 7Confidential © AdaptiveMobile Security Ltd 2008
Driving new revenues
Handset virus Disinfection
MMS
Web
SMS to MMS
Network Protection
SubscriberProfiling
Cost Protection
Churn Protection
Advert insertion
MMS to Email
Revenue Growth
New revenue from existing customers New revenue sources
Profiling
Portal Optimisation
SMS
• Infected handsets• Rogue applications• Spam bots• DoS
Content manipulation
• Content preferences• Mobile content purchases• P2P network analysis
Parental Controls / Enterprise Controls
• MMS Interception• SMS Interception• Web redirection• Email Interception
Commercial: In Confidence 8Confidential © AdaptiveMobile Security Ltd 2008
Cisco Service Exchange Framework Intelligent Network Enablement & Control
AggregationRadio IP/MPLSCoreCell Site
Cisco Intelligent IP Transport
Signaling over IP
Access
Intelligent Networking
Net
wor
k La
yer
Ope
ratio
nal L
ayer
Secu
rity
Servi
ce A
ssur
ance
BW
Man
agem
ent
Traff
ic En
ginee
ring
Content Downloads FMC Voice Parental
ControlMobile TV
Service Exchange
Framework
Identity Policy Billing
Mobility
Self Service
Open Framework for Enabling “Any Play” Delivery
(Any service, to any device,
to any location)
Appl
icat
ion
Laye
rS
ervi
ce
Laye
r
Mobile Gaming
Open Framework for Personalized
“Any Play” Delivery (any service, to any
device, to any location)
Open Framework for Personalized
“Any Play” Delivery (any service, to any
device, to any location)
Service Exchange
Framework
Identity and Mobility
Management
Service Policy and Resource Management
Session and Media
Management
Normalized Network Service Interfaces
Network Element Service Control and Peering
Cis
co IP
Nex
t Gen
erat
ion
Net
wor
k
Commercial: In Confidence 9Confidential © AdaptiveMobile Security Ltd 2008
Cisco Service Exchange Framework: AdaptiveMobile PCF In Context
AggregationRadio IP/MPLSCoreCell Site
Cisco Intelligent IP Transport
Signaling over IP
Access
Intelligent Networking
Net
wor
k La
yer
Ope
ratio
nal L
ayer
Secu
rity
Servi
ce A
ssur
ance
BW
Man
agem
ent
Traff
ic En
ginee
ring
Content Downloads FMC VoiceMobile TV
Service Exchange
Framework
Identity Policy Billing
Mobility
Self Service
Open Framework for Enabling “Any Play” Delivery
(Any service, to any device,
to any location)
Appl
icat
ion
Laye
rS
ervi
ce
Laye
r
Mobile Gaming
AdaptiveMobile PCF Extensions to SEF
AdaptiveMobile PCF Extensions to SEF
Service Exchange
FrameworkService Security
Service Permissions &
PolicyContent Controls
Open Interfaces For Provisioning and Policy Mgmt
Policy Enforcement Adapters
Cis
co IP
Nex
t Gen
erat
ion
Net
wor
k
Parental Control
Commercial: In Confidence 10Confidential © AdaptiveMobile Security Ltd 2008
Parental Portal in Operator Network/Cisco Ecosystem
Insertion/ policy control points is determined by Operator requirements and Cisco components availableOther policy control points are also possible (MMS, SMS, SIP etc.)Parental Portal can be accessed cross-bearer
Cisco Service Control Engine
PSTN
Parent can configure per child permissions, policies, time of day settings etc. on
Parental Portal
(IP) Traffic flow via Cisco SCE and/or Cisco
CSG depending on operator requirements
and deployment
AdaptiveMobilePDP
AdaptiveMobileSubscriber Provisioning
Register
Cisco IP Transfer Point
Cisco GGSN Cisco Content Services Gateway
2.5/3G
IP Next Generation
NetworkADSL/WiMax
Internet
GatewaySIGTRAN/SS7
Gx+GTP’
Child
SCE
Parent
Bear-wide Child permissions set by the parent on Portal
Parent
AdaptiveMobilePCF
Parent can configure per child
permissions, policies, time of day settings
etc. on Parental Portal
Parental Portal
Cisco ASN GW
Cisco Service Exchange Framework
General users, employee and
Corporate Portal
Commercial: In Confidence 11Confidential © AdaptiveMobile Security Ltd 2008
Product overview
NetworkOperationsCentre
CSG/SCE
ITP
Commercial: In Confidence 12Confidential © AdaptiveMobile Security Ltd 2008
Further Information
Please contact AdaptiveMobile at www.adaptivemobile.com or email [email protected]
Contact your Cisco Account Manager or visit www.cisco.com/go/mobile
Are you facing regulatory pressures on content control?Want to know what spam is costing you?How many viruses you are carrying a day?Do your customers want to protect their children & employees?Looking to launch advertising?
Commercial: In Confidence 13Confidential © AdaptiveMobile Security Ltd 2008