Wednesday, March 11, 2009

The Perfect Storm

We have all heard and read about the dramatic increase in mobile data usage. For me it became real when I talked to an employee at a mobile operator in Europe. He described as a "perfect storm": the combination of flat rate tariffs + the deployment of new infrastructure (3G, HSDPA, HSUPA) + new "iPhone like" phones have created an explosion in mobile data traffic in his country: + 50% over the past 3 months! He worries that his network would reach maximum capacity within 6 months...

Not only is he running out of bandwidth, but he is also blind: 98% of the subscriber traffic bypasses his own portal and goes directly to the (mobile) Web; he can't see the traffic. The key questions which are keeping him awake at night: - are people using mobile phones or PCs with 3G cards? Which services are used? What is the typical usage pattern?

For him, the solution was to install a Qosmos ixMachine behind the GGSN. The traffic data is extracted in real-time from the network, structured into .CSV files and fed into a BI software (QlickView in this case) which generates detailed reports. This creates complete visibility on devices (phones/PCs), services and usage patterns. Armed with this detailed network intelligence, he is now able to adjust pricing schemes, develop new services, optimize network traffic and even envisage partnerships with selected Web players.

I suspect most mobile operators face similar storms - luckily network intelligence technology is now available to help them ;-)

Jerome

Monday, March 9, 2009

The Power of Metadata

Metadata is information about communication: who communicates with whom, how, when, and where. For example VoIP caller/called party, Email / Webmail sender / receiver / subject, IM contact list / status / sender / receiver, route update in routing protocol, etc.

With the exponential increase in IP communications, metadata has a great untapped potential for mapping communication patterns, especially for protection purposes as in the case of lawful intercept. It also solves the problem of ballooning storage requirements. In fact, the metadata approach may even be the ONLY way to handle lawful intercept in the future!

So the opportunity is to leverage metadata for intelligence gathering, for ex. to reconstruct links between people, to understand which virtual IDs the same person is using (starting from physical IP/IMSI) or to identify intentionally hidden information (“the Dark Web”).

However, IP communication metadata is not readily available on operator servers, or resides on third-party Web servers, outside the control of a given telco (think P2P,social networking, etc.). Therefore, metadata has to be extracted directly from the network.

So how can buyers of LI solutions leverage IP metadata?

  1. Use the rich set of information available with IP metadata to build completely new types of intelligence solutions - as a complement to content-focused solutions. This gives a better understanding of potential threats (the macro-view)
  2. Take advantage of more computer-based information processing 1.5 billion Internet users, thousands of Web applications… the number of analysts cannot increase at the same rate as the number of IP communications, the number of Web applications and the amount of content generated > need to think differently?!
The solution is to implement automatic detection of suspicious behavioral communication patterns and create real-time view of the threat situation based on continuous streaming of metadata and network information. There is also an opportunity to minimize storage and post-processing time by extracting significant information and structuring it as soon as each metadata is available

Long live metadata!

Jerome

Thursday, January 15, 2009

Network Intelligence: a key trend in IT networking

I took advantage of the Christmas break to catch up on some reading, like this article on Forbes.com that a friend sent me. It was interesting to see that the author Dan Woods cleverly identified a key trend in IT networking: networks aren't just highways!

As Dan puts it, "This week the JargonSpy looks at the gradual transformation of the network as transport, to the network as a source of information. As the network comes alive as a center of intelligence, the way that many applications do their jobs will change for the better."

It is great to see that Network Intelligence is becoming a discussion topic even in mainstream business media!

Wishing everyone a happy new year,

Jerome

Tuesday, November 25, 2008

A Network-based Approach to Enterprise Compliance

This time, I'd like to talk about a new, network-based approach to Compliance. All kinds of enterprises need to comply with regulations such as SOX, PCI DSS, HIPAA; at the same time, they absolutely want to avoid costly upgrades and maintain service.


The challenges are many: What information should be stored? What upgrades arerequired? Where can the information be found? Is it accessible and meaningful? Are different information sources compatible? Is the information complete? reliable? tamper-proof ?...usable?

If you've ever had to sort out several jigsaw puzzles that have been mixed together and scattered about your home, you quickly realize the impracticality of log-based solutions to such challenges. And this is where a network-based approach comes in.

Qosmos network intelligence technology queries an IP network in real-time as though it were a database. This enables you to see in real-time what actually happens, wherever it happens, and to record the information in a single data format (e.g. SMTP for emails), and with a single database entry for each session. And you can do all this from one point on your network: it doesn't matter what your existing IT system is, and there's no impact on existing management policies, systems or services. Furthermore, Qosmos filters and structures relevant data to optimize storage and speed up post-processing, and extracts information directly from the network, independently of servers, and even in cases where they do not have access to (third party) logs or databases (such as for Webmail or public IM).

Judging from some of my recent discussions, it is clear that Qosmos has an interesting value proposition: we can work in partnership with suppliers of Compliance solutions, to provide them with information extraction components on which they can build complete systems – with all the advantages of a network-based approach!

Jerome

Monday, November 24, 2008

Time for Change

You've certainly caught some of the buzz generated by the recent Obama - Verizon controversy.

It's clear that telecom operators’ databases contain sensitive customer information, ranging from subscriber phone numbers and addresses, to private bank details, call history and geo-localization data. And you don't need to be president-elect to understand that preventing the theft or misuse of this confidential information is of critical importance. Knowing who accesses what, where, when and why are the cardinal points of confidence in the information age.

Data protection represents, therefore, both a strategic and technical challenge for operators, who must implement a secure and actionable tracking system across the various access points to their subscriber databases: from internal customer relations and technical support teams, to outsourced customer care services, to malicious hackers.

At Qosmos, we like to say “Yes we can”. Qosmos Network Intelligence technology enables Data Protection and Data Theft Prevention solutions that monitor network traffic in real time, and extract complete and detailed access records for all intranet, web-based or legacy (e.g. TN3270) applications, whether standard or custom, and whatever network protocols are used. Which means fully traceable access, real-time reactivity, and rapid post-processing of information.

So that when government agencies and lawyers come knocking, you've not only got the answer - you know who else does...

Jerome

Thursday, November 6, 2008

Network Intelligence for Audience Measurement

Today I'd like to say a few words about information extraction for audience measurement. The diversity of IP-based media (Web, Mobile Web and IPTV, etc.) makes for fragmented audiences, for which traditional measurement approaches like user panels prove inadequate. Network Intelligence technology, on the other hand, can complement existing user-centric tools with network-centric data across a wide range of applications and devices, offering a unified vision of network usages and trends.

Network Intelligence technology does this by successfully extracting information like Website visited, Website itinerary, page content, duration, referent, mobile ID, IPTV viewer behavior, channel zapping, etc. which translates into faster reporting, more accurate information, and the ability to correlate user behavior across the Internet, IPTV, and mobile terminals. All while ensuring subscriber privacy through anonymous data collection. And this information generates new revenue possibilities. Market research providers can use this approach to gain competitive advantage, by providing valuable information to ISPs (who benefit from higher ARPU), while advertisers benefit from increased effectiveness by targeting ads to genuinely interested consumers.

In the end, users win out, through enhanced user experience, more adapted services, and the final choice to opt-in or not. If you'd like more information on how Network Intelligence can be used to leverage business intelligence, join our Business Intelligence Webinar:


http://www.telestrategies.com/ISS_WEBINARS/Deep_Packet_Inspection.htm

Jerome

Monday, October 27, 2008

The Challenges of Virtual Identity Management

At ISS World Europe a couple of weeks ago, Qosmos presented at a seminar focused on lawful interception and network intelligence gathering.

What comes out clear from the ISS conference is the need for efficient Virtual Identity Management. Put simply: in the context of legal intercept, how do you track a user who can be anywhere, use anything, connect by any means, and who uses multiple virtual IDs ?

Successful and effective Virtual Identity Management, means being able to recognize and extract a target identifier over a wide variety of applications. And this is by no means easy. To take the case of http: the same protocol is used by different applications, which means you must understand the logic of the applications above http. In such cases, the successful recognition and extraction of target identifiers requires the implementation of complex mechanisms specifically developed for these applications, and a maintenance and upgrade policy that enables you both to keep tabs on frequent changes in protocol structures and take on board new applications. And from a global perspective, this means keeping abreast of regional apps like QQ (China), Mail.ru (Russia) and India Times webmail!

These are some of the interesting challenges we work on at Qosmos.

P.S.: On my next post, I'll speak of my upcoming TeleStrategies webinar, where the focus will be on information extraction in the field of Business Intelligence.

Jerome

 
© 2009 Network Intelligence Technology. All Rights Reserved | Powered by Blogger
Design by psdvibe | Bloggerized By LawnyDesignz