Is it time to treat OTT providers like MVNOs?

We have witnessed the steady rise of OTT services over the past few years. With these OTT “providers” and the growing proliferation of smartphones, the way we engage has also changed. Applications such as WhatsApp, Skype, and the like have now become an organic part of the users’ vocabulary by filling in some niches that existing in the core offerings of CSPs.

Rather uniquely, these applications use the connectivity provided by the MVNOs but are eating into their revenues by providing fixed and mobile voice and messaging services. Given the leaning of the consumer towards OTT, research estimates that OTT services such as Skype and WhatsApp could hurt MVNO revenues by as much as 50% going forward. Mobile operator voice revenue is also expected to drop to $208 billion by 2024 from $381 billion in 2019.

The OTT impact

The proliferation of OTT applications works well for the end consumer but is clearly worrying for telecom providers. There are also countless OTT services that are designed in alternative formats that enable an exit from other classic communication formats such as SMS. While service providers have some income coming in from the data packages, the operators are losing revenue owing to the decreased uptake of their core services.

The OTT app-based performers are creating a great deal of stickiness as they are expanding their reach across multiple areas and attracting users to spend more time communicating, shopping, and consuming content. Given this, they are targeting the entire pie of the smart device and feature phone users.

That apart, the telcos and MVNOs pay a host of additional charges to the government and regulatory bodies. This includes elements such as spectrum usage, licensing fees, and other service taxes. The OTT players deliver the same gamut of services – messaging, video, and voice completely free of cost since they do not fall under the tax or licensing umbrella. As a major security concern, these OTT players are also largely free of government regulatory oversight and monitoring.

The rise of OTT providers and the uptake of their services by consumers also have an impact on network data congestion. The increased use of OTT services increases the data congestion putting an overall strain on the network. While telcos have to invest to enhance their existing infrastructure, they continue to lose revenue as consumers gravitate towards OTT from standard services.

This challenge becomes more complex as OTT players eat into the revenue and use the services of the telcos without being called upon to make any investments in their networks. Increasing connectivity and internet penetration and availability of cheaper devices and content-based ecosystems become catalysts for the growth of OTT.

MVNOs and the OTT threat

OTTs have formed a genuine threat by becoming de-facto MVNOs. In fact, they are jeopardizing their current business model. They are harming the MVNOs business even more as they service their customer’s consumers utilizing the MVNOs networks without any lease agreement or policies to regulate them.

A growing body of research is now pointing out that 43% of western Europe and 33% of the central Asia region consider OTTs a threat. A key factor influencing the steady rise of OTT and the cause of increasing pressure on MVNOS has been an easy regulatory framework that OTTs operate in.

Regulators have so far been technologically neutral towards OTT providers. Given the way OTT is cannibalizing traditional telecom services, it makes sense to bring OTTs under a similar regulatory, compliance, and governance framework as MVNOs.

This becomes all the more essential as OTT providers such as Facebook, WhatsApp, and Instagram outgrow major MVNOs such as Vodafone, Deutsche Telecom, and Verizon, and in regards to the number of subscriptions. These MVNOs have 2.11 billion subscribers compared to 2.45 billion for OTT users. While it can be alleged that this is not a fair comparison since these MVNOs have a limited footprint and these OTT providers have a global footprint, it is the MVNOs who spend billions on infrastructure costs and other operational and regulatory costs.

MVNOs until now have been working hard on protecting their revenues from grey routing and spam traffic. They have had to invest greatly to ensure secure and reliable connections and prevent unauthorized connections. They have to work towards ensuring network and data security and ensure compliance and governance to stay on the right side of the regulatory framework. OTT providers, while doing none of these are reaping more benefits than the MVNOs.

The rising proliferation of these OTT providers is a clear indication for the regulatory bodies to reassess their approach towards these providers. Just like how MVNOs operate within certain boundaries to ensure compliance and security, so must OTT providers. Doing so will level the playing field for MVNOs and give them a fair chance to remain competitive in a tough market while protecting the consumer and addressing the genuine security concerns of government bodies.

 

Who Can Take Over The “Business To Consumer” Communications Throne From SMS?

Is B2C SMS dead?

It’s a question that some companies and marketers are being forced to ask themselves while planning their marketing and communication strategies. They have depended on this powerful channel for years now. Their methods are tested and the approaches are ingrained into their communication strategies. Even the thought of making a drastic shift is daunting.

But the good news is that B2C SMS is still alive and relevant.

Whether it’s sending real-time updates about the delivery status, OTP, or announcing new deals and offers, businesses continue to use SMS to reach out to customers.

There are various reasons why SMS seems to work better than other messaging tools.

  • Customers don’t have to download a separate app to receive or send messages. SMS is a default feature in every handset.
  • You don’t need an internet connection to receive messages.
  • SMS has a 98% open rate, and the messages are read within the first 90 seconds -something that’s unimaginable with other communication tools such as emails and push notifications.

Even customers seem to prefer receiving SMS from companies. 75% of customers are comfortable receiving SMS from companies. However, they want it to be opt-in messages, i.e., they should have opted for receiving messages.

Although it’s clear that SMS is still relevant and is likely to stay in the future, it’s true that companies cannot rely on it alone. Customer preferences are evolving and so is the messaging that companies need to send out. This is why companies need to find other ways to communicate with customers.

Why Is B2C SMS’ Position In Danger?

In India, companies were able to send bulk SMS to customers at just 1 paisa! The conditions are no different across the developing and developed world. No wonder, SMS was so popular with organizations. However, the side effect of this was that customers were bombarded with irrelevant and spam messages. Most regulatory authorities have tried to bring some order to this chaos. For instance, in India, the TRAI has intervened and introduced DLT, a blockchain technology that prevents SMS misuse. TRAI also increased the SMS costs by 25% to 30%.

Similarly, countries like the US, Europe, and Canada have laid down rules to protect customers’ privacy. In the US, companies have to comply with the Telephone Consumer Protection Act (TCPA) and CAN-SPAM Act to ensure that customers are not bothered by spam messages. These laws have also made it mandatory for companies to seek consent from customers before sending them messages.

While these rules are particularly for companies that send bulk spam messages, there are chances that the customer might miss the relevant messages. Recently, Indian customers failed to receive important messages such as OTP when telecom operators were implementing the new TRAI rules.

To avoid such unplanned disruptions and to ensure compliance, as well as to accommodate new types of messages, companies are looking for alternatives to SMS.

Some of these alternatives include:

  • Instant messaging apps: Many companies have been using instant messaging apps like WhatsApp, Apple Business Chat, and Telegram to send messages to their customers. There are various benefits of using these apps. First, these apps are widely used by customers for daily communication. So, it’s unlikely that customers will miss the message. In fact, WhatsApp messages get 40% more responses than calls. Second, companies can send rich text messages with images, videos, and links to the customers. Most importantly, these messages are secure as they are end-to-end encrypted, and any unsolicited message can be blocked with just a single tap on the block option.

 

  • Social media messengers: Facebook has over 9 billion monthly active users worldwide, and overall there are 4.48 billion social media users. That’s why most companies find social media to be a lucrative option to communicate with users. Some companies also fully leverage options such as Facebook messengers to have personalized, one-to-one communication with customers. Social media messengers can be more engaging and interactive than SMS by sending useful resources, attachments and answering queries in real-time.

 

  • Web chatbots: Many companies are integrating chatbots with their website to communicate with customers in real-time. They can address customer queries and provide product information to customers. They can also be integrated with social media messengers to generate and convert leads into sales.

So, does that mean that SMS will be permanently replaced with the above alternatives?

Not really!

SMS Is Still The King Of B2C Communication

Although new alternatives are emerging and businesses are looking for new ways to communicate with customers, SMS remains the undisputed king. According to Fortune Business Insights, enterprise SMS is poised to become a $64.24 billion market by 2028. SMS may have limitations such as character limits, restrictions in message richness, and lack of scope for customer engagement. It’s also difficult to stop receiving spam messages. However, SMS continues to revamp and be more compliant with local and international regulations to stay relevant. For example, companies can adopt SMS 2.0, i.e., Rich Communication Services that are similar to instant messengers to send images, videos, links, and rich text to customers. They can be branded, so customers can determine if it’s genuine. Similarly, companies can send messages in a pre-defined template suggested by the regulatory authorities to customers to stay compliant and avoid getting listed as spam. These small changes will help SMS communication to thrive in the future too. There’s no doubt that the king still occupies the messaging throne.

 

A2P SMS – is your network protected from SMS frauds and revenue leakages?

A2P SMS or Application-to-Person SMS services are important tools for most organizations. Whether it is to send out notifications and alerts, appointment reminders, marketing campaigns, or customer relationship management. In short, A2P messaging is among the most effective ways to grab the customer’s attention. Industries such as banking, healthcare, e-commerce, and even entertainment are utilizing this cost-effective way to stay connected with their customers.

The massive reach of SMS messaging can’t be ignored. In fact, research from Gartner shows that SMS has the highest click-through rates, and SMS open rates trump email open rates. Owing to these numbers, the A2P SMS market is on an upward growth trajectory and is estimated to cross $86.5 bn by 2025.

While this number looks great, the Telecom industry faceslosses of $17bn per year< owing to the actions of illegitimate criminal enterprises. So, while mobile operators are looking at unlocking the revenue potential of A2P SMS messaging, the problem of revenue leakage and fraud via unsolicited routes casts a dark shadow on these otherwise sunny skies. In fact, according to a study, “Unsolicited routes are expected to cost the mobile network operators almost US$ 50 billion between 2018-2023”

But how does this revenue leakage happen?

A2P SMS taking the unsolicited route end up exploiting loopholes in the GSM framework and side-stepping the termination charges for the SMS. In such cases, the SMS service could be leveraged at lower than market value by denying mobile and tier-one messaging aggregators vital revenue. Obviously, the quality of the messages is also impacted here since these are routed through unregulated and poorly constructed mobile networks which are often located in inaccessible corners of the globe. As a rule, messages get delivered late or worse, not at all.

Mobile operators have to take strict measures to prevent revenue leakage and block unsolicited route traffic from whittling away their revenue streams. Along with this, consider the impact on the subscriber’s experience and the lack of trust that mobile operators face owing to the influx of unsolicited, fake, and spam messages originating from the unsolicited route.

As the prevention of fraud and revenue leaks assume paramount importance for mobile operators, SMS firewalls become a venerable tool to fight this battle.

SMS Firewall comes to the rescue

To grow customer satisfaction and revenue, mobile operators have to use the right tools and adopt a comprehensive strategy. They have to start with mapping out all the unidentified leakages such as the unsolicited routes, improperly charged routes as well as network abuse. They have to ensure that the tools they use eliminate unsolicited routes by ensuring that A2P traffic is not and cannot be merged with valid person-to-person (P2P) traffic and routes just to avoid bearing A2P charges.

Since the unsolicited routes disregard the rules of engagement between operators, they also impact the trust that has grown on SMS transmission channels. SMS firewalls are an effective strategy to block these unsolicited routes and ensure that enterprise traffic is diverted through the approved channels only.

A full-fledged SMS firewall with international and domestic traffic control also helps mobile operators prevent message flooding by blocking large amounts of messages to one or more destinations. The SMS firewall looks out for traffic surges, unwanted traffic spikes, and improper content and filters these out while simultaneously identifying and proactively blocking the sources and unsolicited routes.

Preventing fake SMS messaging and improving the security of the SMS by identifying manipulated addresses of the messages can also be ensured by using SMS firewalls. This is also the way to greater control as it helps mobile operators control the SMS traffic in their network. Operators can employ special rules for specific roaming partners, sources of incoming traffic, types of traffic, and types of sender ID.

A robust SMS firewall helps mobile operators improve their capacity to prevent network congestion that results from spamming and flooding. It helps in increasing end-user trust by eliminating concerns emerging from activities like SMS faking, SMS spoofing, SMS phishing, SMS viruses are all.

Obviously, mobile operators should have clarity on every single message terminating in their network. Many mobile operator networks (MON) lose revenue because of the A2P bypass, global title bypass, and illegal A2P routes. These can lead to significant losses in revenues. As it happens, this can also open up just the avenue hackers need to flood the network without paying any of the fees. With the SMS firewall, mobile operators achieve transparency on the messages terminating in their network and can also maximize profits by identifying otherwise untapped sources of revenue.

This is the age of SMS firewalls with built-in AI and ML intelligence. These smarter firewalls can stop fraudulent activity, revenue leakage, and build trust in the network. By leveraging a robust and comprehensive SMS firewall, mobile operators, therefore, can gain a transparent understanding of their monthly costs. They can leverage insights to convert Opex to Capex costs while ensuring that A2P SMS traffic is routed only through the approved channels.

Enterprises and industries look at A2P messaging to effectively engage with customers and prospects. This is a critical channel for customer engagement that impacts the customer experience. As such, mobile operators need to pull up their socks and make sure they have the right countermeasures in place to stop illegitimate A2P transmission and spam from zapping profits.

If this is a concern for you too, then connect with our experts to learn how to protect your network from SMS fraud and revenue leakage today.

 

 

The evolution of telecom fraud and the impact on revenues

In the last three decades, the telecommunication industry has evolved dramatically – from analog telephone lines to digital quad+ play mobile service providers. Today, the telecommunication sector is entering the 5G landscape promising unmatched connectivity and bandwidth.

 

Technology evolution has spiked the range of available opportunities as well as competition, and unfortunately, malpractices too. Cybercrimes are on the rise as vulnerabilities get exposed. Telecom frauds have become commonplace and need to be addressed on priority as estimates peg their cost at €29 billion per year.

Evolution of Telecom Frauds

The Telecom industry is seen as young, but if we look for the very first telecom fraud, it will take us two centuries back. The first telecom fraud was committed in the 1830s by two French brothers – Francois and Joseph Blanc. The brothers were bankers working at the stock exchange in Bordeaux – primitively trading in government bonds. Owing to the fragmented telecom sector back then, the Blanc brothers found a way of sending messages by “hacking” the telecom network, thus opening the gates to telecom frauds.

Since then, the telecom industry has obviously evolved. Numerous new technologies have been introduced for fraud detection in the telecom industry. But as is always the case, as telecom service providers have gone smart, similarly, telecom hackers too have become proficient.

Today, there are a series of common telecom frauds being reported worldwide. These impact the revenue potential of telecom service providers and hurt customers too.

Let’s understand some of the common telecom frauds the industry is facing:

Traffic Pumping Scheme

It is a revenue-sharing scheme designed by fraudsters who promise to increase traffic to a specific level at a high destination cost. The signature style of this telecom fraud type is to spike traffic to high-cost destinations. Fraudsters take advantage of telecom service provider’s lax security practices. These frauds often leave service providers with large monetary losses. These kinds of attacks often occur during holidays and weekends when networks aren’t monitored closely due to surges and reduced staff loads.

Vishing Calls

This is one of the most common telecom frauds, which is a combination of the word “Voice” and “Phishing.” It is similar to phishing email attacks – the difference is just that fraudsters make calls to the victims. During the vishing calls, fraudsters create a false scenario and trick victims to share their personal, security, or financial information. In some situations, fraudsters even compel victims to transfer money to them. These types of fraud are very hard to detect, and catching fraudsters is even harder.

One-ring-and-cut or Wangari

Wangari is a common scenario in the telecom domain. It is a telecom scam where hackers lure victims to call premium-rate numbers. In this method, fraudsters set a system of a large number of random telephone numbers. They call each phone number up to one ring and leave a missed call on the recipient’s phone.

Usually, when people see a missed call from an unknown number on their phone, they call back, considering it a genuine number, and get their entire call balance lost on calling the premium rate number. It is a very cunning and well-organized telecom fraud practiced around the globe.

International Revenue Sharing Fraud

International Revenue Sharing Fraud, or shortly referred to as IRSF, is one of the most damaging telecom fraud schemes to date. Under this fraud, money is transferred from one carrier to another based on the inter-carrier trust between telecom operators. IRSF telecom fraudsters are very smart; they wait for logs to expire before executing the next step in their money-laundering scheme.

According to the IRS, more than 1,029,601 Americans have received IRSF fraud calls, and approximately $29,100,604 had been lost on these calls in 2016 alone. On the global level, numerous awareness programs and events are organized to protect people from these scam calls, but this telecom fraud is still flourishing.

Call Forwarding Fraud

In this VoIP telecom fraud, criminals gain access to an enterprise PBX system, which they use to make expensive long-distance calls and pocket what they charge to the users. Generally, telecom service providers state that customers are liable to pay for fraudulent calls. But, in reality, it’s hard to make the customer pay for the fraud calls as they could simply disconnect network services and move to another service provider. And all the fraud call financial burden falls on the service provider’s shoulder.

How are telecom frauds impacting revenues?

The global loss due to fraudulent practices in 2019 was $28.3 billion, and telecom fraud has a big share in it. Some of the top fraud types have been payment fraud, IP PBX fraud, abuse of network or device, or configuration weaknesses, and IoT fraud. As it happens, with the explosion of smartphone technology, the number of telecom frauds has also seen a spike as new venues and vulnerabilities open up. In the app economy, a lot of customer validation happens through mobile phones and SMS networks now. In that scenario, Account Takeover frauds are now becoming very common with targeted consumer attacks.

Additionally, as per the Cyber-Telecom Crime Report 2019 published by Trend Micro and Europol, the evolution from switchboard operations to the circuit and packet-switched operators has added to the telecom fraud occurrences causing losses of $33 billion revenue loss each year. The report also reveals that traditional financial criminals are the ones turning their attention to telecom scams. The report has suggested that developing or failed nations are the main originators of telecom fraud that is perpetrated in developed nations like the USA or the UK.

In a nutshell, telecom frauds are unfortunately common as they have continued to evolve at pace with telecom technology. These myriad frauds have shown the potential to adversely impact the revenue of telecom service providers. Also, along with revenue loss, this scenario is also tarnishing the reputation of telecom companies.

Clearly, it is extremely important for telecom service providers to invest in fraud detection and security technologies. The good news is that by partnering with the right telecom solution provider, fraud can be easily detected and avoided.

 

The Changing Dynamics of Business Messaging in the Enterprise Landscape

Until a few years ago, email and SMS were the primary ways to send out business messaging to customers. However, the proliferation of smartphones and the internet have transformed the “business to consumer” communication landscape. From email and SMS, now we have social media, messaging applications and instant messaging all set to influence business messaging.

The digital impact on business messaging

The business messaging landscape is also witnessing rapid evolution as customers become more informed and digitally savvy. As the smartphone becomes an extension of the customer’s life, business messaging has become more refined, contextual, and sophisticated. That apart, along with the ubiquitous SMS, new mobile messaging technologies are becoming a part of the business messaging ecosystem.

Business messaging continues to rise in prominence and importance owing to the growing adoption of digital marketing solutions. With the era of notifications and alerts upon us, enterprises across the globe are looking to deliver quality information regarding their products and service offerings to their potential customers in a medium comfortable to both – the customers and the enterprise. This has been a major contributor to the incremental rise of A2P communication especially for enterprises as they vie to build customer loyalty, boost customer interaction, and build stronger customer relations.

Channels of business messaging have also proliferated because of the impact of the COVID-19 pandemic. As more businesses moved online, the need for effective and efficient communication and customer engagement services only increased.

Email marketing, once a very popular and preferred channel for business messaging has slipped down the popularity ladder. Customer inboxes are usually flooded with offer-related emails, making the discovery of relevant information harder consequently leading to low opening rates. Text messages and SMS’s, comparatively experience greater reachability. Gartner reports that “SMS open and response rates as high as 98% and 45%, respectively — in contrast to corresponding figures of 20% and 6% for email.”

This is further expected to contribute to and drive A2P SMS market growth

Enterprise A2P SMS services also continue to rise in prominence for business messaging as it is highly popular amongst startups and small enterprises. Lower costs associated with A2P SMS continue to be a major attraction along with increasing numbers of smartphone and internet users.

SMA retains its power

While SMS still continues to be a powerful business messaging channel, businesses are looking out for technology options that make SMS more engaging. Business messaging too is looking to access functionalities like embedded images, video buttons, animation, suggested replies, etc. readily available on consumer applications. RCS or Rich Communication Services (RCS) builds on this potential by helping businesses achieve truly engaging messaging experiences and bring about a messaging evolution.

Taking both SMS and RCS into account, the messaging industry is expected to grow from 1.55 trillion messages of A2P traffic in 2018 and to surpass the 2 trillion mark by 2023.

However, in the business messaging landscape, despite new developments, SMS technology is set to maintain its important position despite messaging apps continuing to vie for market share. This is especially so as email, though a preferred mode of business messaging, usually ends up in spam folders and has low read rates.

Instant messaging is still navigating regulatory waters as they can be available only as downloaded apps. Since these companies are usually outside of the regulatory control of local governments, enterprises are wary of depending on them and especially for critical functions.

While RCS looks like the most probable candidate, ensuring how to use it to best interact with the customer and get the best cost while doing so is going to be the next frontier to navigate.

Navigating the security landscape

The conversation about the changing dynamics of business messaging is also incomplete without speaking of security. Along with ensuring the quality of communication, maintaining consumer trust using strategies such as two-factor authentication and employing firewall solutions will gain momentum. The use of blockchain to further encrypt messages can bolster the security posture. However, the regulatory chasm still remains to be crossed. As such, it hardly comes as a surprise to see research predicting 3.5 trillion SMS business messages will be sent in 2023 – an increase from the estimated 2.5 trillion in 2019. The focus on A2P messaging will continue to be the preferred enterprise medium to communicate with the customers.

In Conclusion

Voice, premium, instant messaging, SMS, OTT, white route messages, and grey route messages, both, constitute a massive opportunity for telco players and service providers – either to identify opportunities or to evaluate gaps that cause revenue and customer trust to leak and dissipate. While they explore new and potential opportunities that drive profit, building and maintaining customer trust by proactively maintaining a great security posture becomes critical. Elements like Network protection, building trusted, carrier-grade, real-time communications across IP network borders to enhance security, performance, and reliability will contribute to customer retention and revenues. A new world of business messaging is already here.

 

The Growing Buzz About Rich Communications Services

Pete Cashmore, CEO and founder of Mashable once famously said that attention is the new currency. Every business is vying for the customer’s attention. In a world where the average consumer is glued to the smartphone, the mobile has become the new battleground for brands in this quest for customer connection.

Businesses reach out to customers through various channels such as social media platforms, Facebook messenger, and instant messengers such as WhatsApp. However, contrary to what some may believe, SMS communication is still alive and thriving. That said, if the aim is to connect and engage, businesses need to think beyond sending plain text SMS. They need to send rich texts to gain customer’s attention. Enter RCS!

Rich Communication Services (RCS) create messaging touchpoints that are more engaging and provide a rich experience to customers. RCS adds that value in Application to Peer (A2P) SMS.

No wonder brands are willing to spend $18.04 billion on RCS.

RCS enables businesses to send multimedia and experiment with different types of content such as hyperlinked texts, rich images, and even polls and quizzes through A2P SMS.

The results are evident too. According to mGage’s research, RCS achieved a 14 times higher engagement rate and a better response rate than other methods used previously.

While businesses are expected to benefit from RCS, how do mobile operators stand to benefit from it?

Let’s delve into the subject to know more.

How Can Mobile Network Operators Benefit From Rich Communication Services?
  1. Better customer experience

With the help of rich communication services, businesses can send high-resolution pictures and heavy files to their customer contacts, share locations and add emoticons and features to their messages to make them more interactive. Such messages will improve customer engagement by virtue of being more interesting and inviting. Businesses can also brand their messages to give them a distinct identity. These features enable mobile operators to strengthen their connection with the customer by being consistent across all the channels they use to communicate. This is a remarkable difference from the current fragmented experience offered to them. Most importantly, the transition from SMS to RCS is seamless. Studies show that customers are already overwhelmed by the number of channels being added to the ecosystem. They don’t want to download an additional messaging app to interact with businesses. However, RCS does not require the customer to download another app. They are automatically upgraded to RCS. So, they can leverage the benefits provided by apps like WhatsApp and Signal from the default messaging app available on their smartphone.

  1. New revenue-generating opportunities

RCS provides a unique opportunity for mobile operators to generate more revenue beyond their traditional revenue channels. Businesses are forever on the lookout for new digital channels to reach out to new and existing customers. Some channels are effective, while some do not offer the kind of ROI expected. For example, a banner ad generates an average of 0.1% CTR. As SMS is more personal and sent to the in-built messaging app, the CTR and open rates are much higher. Add to that the power and engagement of RCS and the brand campaigns promise to outperform by 207%. According to Gartner, the interoperability of SMS and its better reach to customers makes it an extremely viable marketing channel for businesses. They know that it’s a channel that customers will use regularly. In fact, operators are expected to generate $52.5 billion from RCS messaging by 2028.

  1. Improved customer retention

Some messaging platforms have come under the scanner due to data privacy concerns. SMS and RCS are still considered safer options as they are known to protect customer’s data by default and are permission-based. This helps businesses to communicate safely with their customers and retain them. Apart from helping businesses, RCS messaging can also be useful for mobile operators to retain their customers. Instead of sending plain text SMS to their customers, operators can send rich communication with capabilities to enable customers to respond to messages. They can use rich templates to create brand recall for customers. Most importantly, they can reduce customer churn by creating an engaging and consistent experience for customers across the entire communication ecosystem the customer uses.

Conclusion

RCS provides many benefits to both businesses and subscribers. The future of RCS messaging looks positive as carriers like AT&T, Verizon, and T-Mobile are planning to embrace RCS from 2022. Also, considering that SMS is still the most used form of communication in many countries and does not require an app to be downloaded, RCS messages have a scope to reach out to more customers than the new messaging platforms.

However, there are also a few shortcomings, such as both the network and texting apps must support the protocol. Otherwise, the customer might not be able to use RCS across all networks. Also, some regions such as Europe and France are still slow in adopting RCS. The other bottleneck in adoption is that only 8.9% of global mobile networks support RCS messaging.

Unless these challenges are resolved, businesses and operators cannot realize the full potential of RCS. However, operators can partner with trusted solution providers to optimize the usage of RCS messaging and gain a competitive advantage.

To know more, contact us.

 

What Can Telcos Do To Protect The Privacy Of Their Subscribers?

As enterprises and individuals both embrace digital transformation, telcos are also being pushed to innovate to meet market and subscriber demands. Value-added offerings that leverage the capabilities of technology solutions like 5G connectivity and A2P SMS for enterprises promise telcos the ability to generate revenue and thrive in a competitive market. For example, Ericsson predicts that telcos will generate additional revenue of $3.7 trillion by 2030 through various 5G-driven options.

However, as telcos get more innovative with their offerings, they have to be careful about opening the doors to new problems. One major concern in that context is the need to prioritize subscribers’ privacy.

Over the last few years, subscribers have become increasingly aware of their right to privacy. Studies have shown that 60% of subscribers are concerned about how their data is used. 47% of them believe that the apps they use gather their data through GPS, microphones, etc. There is a general uneasiness about privacy because of a lack of trust about the intent of businesses that have access to their data. It’s not just about the privacy of course. People are also worried about safety and security as cyber crimes have increased by 600% in 2020 alone.

As technologies get more sophisticated and operations more high-touch, telcos need to find ways to protect the privacy of their subscribers. They need to do this to regain the subscribers’ trust.

Here are some ways to safeguard their privacy.

How Can Telcos Protect The Privacy Of Their Subscribers?

In 2018, the General Data Protection Regulation (GDPR) was initiated across the EU to protect people’s privacy. Telcos were also covered under this regulation. This means that telcos were equally responsible for safeguarding the subscribers’ privacy and data.

To safeguard subscribers from data breaches or privacy threats, telcos are implementing solutions such as:

  1. Content filtering

A2P SMS has become a popular communication channel for enterprises to reach out to subscribers. However, subscribers have been receiving an overload of SMS. Many of these messages are spam. To ensure that subscribers receive only genuine messages, telcos have started using content filtering options to identify and block spam messages. These filters look for messages with specific keywords or certain types of content, which could be considered spam, and block them before sending them to subscribers. Many countries in large telecom markets have already initiated a process where the messages are scrubbed, standardized, and sent in a specific template to safeguard subscribers from spam messages.

  1. SMS firewall

Considering that SMSes are vulnerable to suspicious malware attacks and spams, telcos use SMS firewalls to block illegal SMS traffic. When a message comes to the telecom operator’s network, the firewall immediately scans them for its originator, source, and route. It analyzes the messages and classifies them. The messages are immediately blocked, and the sender is informed if found to be suspicious. Telcos can also set intelligent firewall rules to determine which messages are authorized and unauthorized and also allow or reject SMS traffic accordingly. An SMS firewall protects the subscribers’ privacy and protects the telcos from losing their reputation and revenue over spurious messages.

  1. Direct routing

Grey routes have always been a concern for telcos as the messages are sent through unauthorized networks. As there is little control over these unethical routes, telcos stand to lose an estimated $62 billion of their revenue. Also, considering that these SMSes are sent through unethical networks that are inherently subject to less management and oversight, they could pose a privacy threat for subscribers and expose them to vulnerabilities. The solution to this problem is direct routing. Telcos can directly connect with operators in different countries, so the messages are sent directly to the subscribers in that country. Telcos can also set up re-routing or test the routes to ensure that the messages are sent through reliable networks. Telcos can also identify and fix routes that are suspicious to safeguard the data and privacy of subscribers.

Conclusion

Although telcos use sophisticated tools to bring transparency in their solutions, they cannot combat privacy breaches alone. Safeguarding the subscribers’ privacy requires combined efforts from Governments and enterprises too. Governments have started implementing regulations such as GDPR. As for enterprises, they are also developing products that have privacy firmly integrated into all phases of development. Ericsson says that even telcos must implement privacy by design to ensure that security and privacy policies are followed.

Innovative solutions will become a mainstay in the future. Subscribers will widely use technologies like 5G and connected devices. By making privacy a default element, telcos, enterprises, and governments will be able to safeguard the subscribers from vulnerabilities and ensure that they receive the best service and experience. Telcos and enterprises must also work with a trustworthy telecom solutions provider to ensure that their solutions are safe.

 

Why enterprise digital transformation conversations must include a focus on the mobile

2020 made the enterprise universe fundamentally reassess ways of working. The push towards digital transformation, something that had been growing over the years, accelerated as the pandemic forced everyone to work from home. Organizations had to realign their IT budgets, modernize infrastructure, and identify digital channels. They turned to digital means to drive customer experience, accelerate revenues, improve operational excellence, and enable collaboration and innovation while ensuring business continuity.

Digital transformation has now become crucial to sustaining growth. However, while digital transformation depends on technology that can improve the capacity to chase new revenue streams or business models, technology alone does not guarantee digital transformation. Organizations have to reshape how they strategize and learn to utilize technology in newer ways. This isn’t always about adopting cutting-edge technologies. It’s equally about how to leverage the omnipresent technologies of the day, like the mobile phone.

Let’s look at the starring role for the mobile in enterprise digital transformation and the opportunity this creates for telcos and communication service providers.

Mobility and its role in Digital Transformation

Enterprises looking to leverage digital technologies to transform their organization have to employ mobile to drive company-wide transformation.

Research suggests that 82% of executives agree mobile technologies are the face of digital transformation. This can’t come as a surprise given the growing smartphone proliferation and deep adoption in the enterprise space. Today, 80% of executives believe that workers cannot do their jobs without their smartphones. 70% of access to enterprise systems is via mobile devices.

Digital transformation conversations are thus incomplete without adequate focus on mobile. When people regularly use enterprise software from a mobile device it indicates that the system has become the lifeblood of the business. The enterprise mobile app allows employees to connect to core processes from anywhere, at any time, and be productive, free of locational constraints.

The objective of digital transformation is to infuse a wave of efficiency across the length and breadth of the organization. By incorporating mobility as an integral component of digital transformation, organizations can unleash significant latent potential by empowering a new level of employee performance. They can gain the capacity to redistribute access and intelligence all through the ecosystem, drive productivity and collaboration, and improve customer experience.

Mobility is central to the enterprise digital transformation narrative because it assists enterprises to develop the capability to:

  • Improve customer experience and customer satisfaction, build rapport with overseas clients and connect with clients more efficiently across boundaries and time constraints
  • Increase productive time by providing “always-on” access to systems and processes
  • Improve the amount and quality of information captured because of multiple data touchpoints on the mobile application
  • Drive employee enablement at work irrespective of where work happens
  • Reach out and engage with customers on a channel of their choosing
  • Improve data and process portability and enable smooth content sharing to enhance collaboration and communication experiences
  • Increase time efficiencies and improve timely decision-making by providing access to vital data. This also increases cost efficiencies as storage and retrieval of data become synchronized along with complete access control of all the systems.
  • Reduce costs by eliminating paper-based workflows, enabling remote work, and helping employees do more work in less time.
  • Drive business process optimization and increase operational flexibility

Since the smartphone has cemented itself firmly into our lives, it’s no wonder that we are seeing similar trends in the enterprise. Given the power of mobility to enhance digital transformation initiatives, it makes abundant sense to adopt a mobile-first approach when embarking on the digital transformation journey.

The role of mobile operators and CSPs

The mobile is driving the ‘anytime, anywhere, and always available’ culture that these dynamic times demand. That’s why, we cannot discount the role of telcos, mobile operators, and CSPs in making this digitally-powered work environment a success.

Mobile operators and CSPs become important enablers of time and cost efficiencies especially as drivers of unified communication. Enabling retail quality routes, high clarity Voice using low-latency routes, and ensuring connections over IPX, multiple SIP protocol/codecs, or Managed IP become important enablers of connectivity to drive direct interconnections globally.

CSP’s and mobility carriers also must ensure that they have the right firewall solutions in place to protect themselves and block illegal traffic. They have to ensure that no A2P traffic reaches subscribers via the grey route to avoid monetary losses and unwelcome network congestions from spamming.

Enabling the right security protocols, system-level filtering, Intelligent SMS firewall rules, and guarantees of uptime with heartbeat redundancy become important consideration points to optimize the mobility experience.

In Conclusion

The role of mobile in the digital transformation narrative is only going to get stronger. Even companies like Microsoft have experienced ‘two years’ worth of digital transformation in two months”. McKinsey further notes that while the pace of the pre-COVID world was fast, the luxury of time has completely disappeared now. All along digital transformation emerges as the antidote to the crisis and an imperative for the new normal. Given the proliferation of smartphones and the app economy, enabling digital transformation without a focus on mobile is almost like wanting to bake a cake without an oven. As is apparent, telecom companies, mobile operators, and CSPs have a crucial supporting role there too.

 

The Value Of A Virtual Roaming Number – And How To Make It Work

As the world turns into a global village, connectivity has become important among businesses and people.

To help businesses and people stay connected irrespective of geographic locations, telecom companies have been offering attractive options to their users. One of them is virtual roaming numbers.

A virtual roaming number is a telephone number that is not limited to a specific phone device, area code, or line. Unlike traditional landlines that are physically connected to a location and designed to work over a single phone line or a mobile number that is typically tethered to a specific mobile service for coverage; a virtual roaming number is more flexible and devoid of physical constraint. So, even a company that is based in Asia can show its local presence in the US or UK by using a virtual number.

A virtual roaming number is flexible and saves costs on hardware and maintenance.

Considering that the virtual roaming number offers so many benefits to businesses and end-users; it makes a strong case for telecom companies to extend it as one of their services.

Here’s how telecom companies could benefit from the virtual roaming number.

Value Of Virtual Roaming Number For Telecom Companies
Opportunity to expand to new markets and expand penetration onto existing markets

The telecom industry is a fragmented industry that struggles to find ways to create revenue opportunities and new business models. Virtual numbers can help provide an attractive option to address that.

A virtual number is an online number. So, there are more opportunities for operators to expand and penetrate new and existing markets. In many ways, it may also be easier to get a license for operating a virtual number. Virtual number operators (VNO) can offer unique services and unique value propositions to a specific group of users in new markets to gain a competitive advantage. It can help them to acquire new subscribers for their service. For example, they can offer low-cost connectivity to people living in developing countries. A virtual network operator can also help in solving the teledensity issues in remote areas by investing in them. This can help them to gain more subscribers and penetrate deeper into existing markets where reach is less.

Attract more inbound roamers

According to a study, mobile operators earned$21 billion from roaming. Inbound roamers have captured the fancy of telecom operators for a long time. This solution enables them to offer competitive pricing and unique services to these users. It also enables them to capture loyalty if the user visits the place frequently for business or to meet their family or relatives. Virtual numbers are useful for frequent travelers as they can enjoy the benefits of a local number and make and receive calls effortlessly. As soon as an inbound roamer enters a place, they can obtain a prepaid local number roaming (PLNR) without changing their SIM. Once they activate the prepaid number, they can avail of all the local services until their stay. They can top up the virtual number easily and also use it for their future visits. Considering the value and convenience it offers to inbound roamers, operators must consider offering these services to gain more subscribers.

Minimal to zero investment in infrastructure

Virtual network operators do not have to duplicate infrastructure. Network Service Operators (NSO) who invest heavily in spectrum licenses can enter into a sharing model with virtual network operators. It creates a win-win situation for both. The VNO can minimize additional expenditure on infrastructure. If they are a new entrant, they can expand their services easily. The NSO, on the other hand, can earn a recurring income from the VNO and optimally monetize its resources. This helps them to minimize the losses incurred due to high operational costs.

Better service to users

In continuation with the point above, by sharing the infrastructure costs, the telecom operators can reduce the cost of service delivery. This benefit eventually gets passed on to their customers in the form of attractive pricing. Typically, a virtual roaming number works on an all-in-one model, i.e. it offers all types of services such as calling, messaging, VoIP, video conferencing, and data services. Considering that it blurs the lines between network and services, it will soon be able to offer better-bundled services to the users. It will give the power of choice to users.

The virtual roaming number plays well into the themes that are relevant to the future of the telecom industry by being more customer-centric. We have attractive and easy-to-deploy solutions for innovative and future-focused telecom operators who wish to offer . These solutions will help them acquire more users and stay a step ahead of the competition.

 

Some good news about security in all the hype around 5G

5G promises a future of technology-enabling innovation and a host of benefits. The technology underlying 5G marks a break with 4G in many ways, especially when demanding a fundamental reconceptualization of the communication networks. The previous mobile technology generations were built on a physical architecture while 5G, a completely virtual network, enables the convergence of networks and makes wireless communication a fundamental truth.

5G promises to support transformative applications, becoming a driver of a new world of intelligent factories, autonomous cars, and smart cities. We expect lightning-fast speed, increased capacity, and reduced latency. 5G is expected to be 100 times faster. Downloading a two-hour movie, for example, may take merely four seconds with 5G. Given its potential, some studies show that 5G can be expected to pump 12 trillion dollars into the global economy.

Just as 5G becomes the enabler of a totally connected world, it also raises concerns about enabling a larger surface area for cyberattacks. This is primarily because 5G networks connect more devices than previous technologies at a “fatter” bandwidth and with lower network latency. This means more endpoints to attack and an enabling network capacity that may make “brute force” attacks practically possible.

However, as with any new technology, an introduction of 5G requires revisiting cyber-security strategies. Building greater resilience by identifying and countering the risks specific to 5G can enable this technology to become a powerful force to generate revenues and drive profits.

The security challenge

Security is one of the major stumbling blocks to the adoption of 5G. Until now, navigating the security chasm was difficult because many standards that could govern its implementation and management hadn’t been fleshed out. Reliable estimates of the kind of new threats that could emerge were missing. While this could influence multiple aspects, its impact on security could be disastrous as it risks providing more elbow room for malicious elements to break down the defenses.

Clearly, keeping 5G networks secure and keeping them safe from malicious intent and activity for businesses and society alike will be essential for ensuring the safety of the end-users. With these concerns in mind, recent announcements of 5G specifications being updated and aligned with zero-trust tenets is good news.

Why zero-trust works in favour of 5G

A vital point to secure any network is to understand where vulnerabilities could arise. Usually, risks transition from one network to another at the point of interconnection. As such, it becomes essential that all the companies involved on each side of these transitions need to adopt a coordinated approach to ensure effective end-to-end security.

By aligning 5G specifications with zero-trust tenets, the telecom industry assumes a strong position to create a zero-trust architecture that everyone can “subscribe” to. The zero-trust security model becomes effective in the 5G scenario as it never makes any assumptions towards trustworthiness.

A zero-trust architecture facilitates secure network access to resources (data, devices, and services) and ensures that it is restricted to only the authorized and approved subjects ((users, devices, and services). This approach assumes an identity-centric approach based on the execution of policy-based authorization decisions in runtime in conjunction with traditional in-depth security principles. The right zero-trust architecture mitigates the risk of external attackers elbowing their way into the network or moving laterally in case of a security breach. The key areas where this zero-trust architecture needs implementing could be to:

  • Secure digital identities are the key factor that determine whether an access request should be accepted or not. A zero-trust architecture establishes protocols after assessing the environment, which includes virtualized deployments, multi-tenant environments, and the hardware ecosystem, to deliver secure identity lifecycle management.
  • Secure communication transport of user and signaling data across 3GPP interfaces. A zero-trust architecture ensures that all data is secured with cryptographic algorithms thereby delivering integrity protection and confidentiality
  • Manage the relationship between the host of logical and physical entities across the telecom network and create a capable policy framework that captures the access rules and requirements to determine eligibility requests. These policies enable the enforcement of micro-perimeters with fine-grained access control based on roles, credentials, and environmental attributes
  • Establish the right security posture of network assets and ensure compliance with security policies. Monitor and evaluate subjects, resources compliance, trustworthiness, and state to design access controls.

The journey towards zero-trust must be carefully calibrated and augmented with methodical decisions on when and how to implement the new security processes and deploy the new security technologies. Adopting the zero-trust principle improves the management of security risks to deliver a secure network and services.

However, the capability to implement a zero-trust architecture also depends heavily on the technologies, prioritizations, and policies considered. Successfully implementing zero trust can be a cornerstone of a holistic defense strategy to manage the risk of the infrastructure that has migrated to zero-trust and the infrastructure that hasn’t, both.

While this transition towards zero-trust is a major change in the telecom industry, 5G’s built-in compatibility with the zero-trust architecture will make it easier to define security practices and strategies applicable in different scenarios. As of now, the new functionalities and requirement specifications align with many zero-trust elements. This should help drive up the confidence of successful 5G implementations without worries over security concerns clouding the benefits. That is great news for the telecom sector and the world at large.

Top