Tuesday, February 28, 2012

AdaptiveMobile enhances spam and rogue app protection for operators, lowering reliance on subscriber reporting

MOBILE WORLD CONGRESS 2012, BARCELONA, SPAIN: AdaptiveMobile, the world leader in mobile security, announced the enhancement of its Network Protection Platform+ (NPP+) with improved spam and rogue app protection. Release 4.1 includes the ability to automatically update security signatures from the AdaptiveMobile Security Centre, allowing operators to proactively protect subscribers rather than relying on them to report problems.

“It is important that operators offer a comprehensive protection service to their customers if they are to maintain confidence and avoid dissatisfaction and fraud,” says Gareth Maclachlan, COO, AdaptiveMobile. “Whilst subscriber reporting is an effective method of highlighting some spam incidents, it needs to be complemented with a more centralised approach – particularly for the more persistent and damaging threats, those which may be international, or those which subscribers cannot detect or report themselves, those targeting M2M services, and where reliance on subscriber reporting may provide operators with a false sense of security.”

Release 4.1 of the AdaptiveMobile NPP+ collects information from a variety of NPP installations, including network honeypots and suspicious sources as well as data from global customers and operators across the world, augmented by subscriber reports from its own SpamGuard app. This is then analysed in real time and released as updated mobile security signatures which are automatically distributed to operators, delivering insight and protection to reduce churn from defrauded or frustrated subscribers, protecting revenue streams.

“SMS is still a valuable revenue stream for all operators today,” continues Maclachlan. “However, fraudulent activity, spam and rogue applications can erode trust in SMS as a legitimate marketing and payment mechanism, which in turn can affect operator revenues. Release 4.1 is aimed at addressing this problem and helping to filter out these threats before they reach the consumer handset. We are also championing the sharing of these signatures across the operator ecosystem so that all mobile telecommunications providers can benefit from the most up-to-date security information, maintaining trust in mobile.”

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.