Service providers CBCcom, PCCW Global, Sparkle and Tata Communications, together with technology vendors Clear Blockchain Technologies and Cataworx, have joined forces to create a Proof of Concept (PoC) designed to show how Telcos can introduce next-generation services such as IoT, VR and cloud in record speed, thanks to innovations in blockchain technology, artificial intelligence and intent-based customer interfaces. The PoC will be demonstrated between the 29th and 31st of October 2018 at the MEF18 global networking event (MEF18event.com) in Los Angeles, California.
New technologies, such as IoT, VR, autonomous cars and cloud, are driving user demand for higher capacity, agile bandwidth, lower latency and a guaranteed quality of service.
While certain carriers and mobile operators have already developed capabilities for delivering on-demand services on their own network and infrastructure, inter-carrier operations are currently still managed manually as the BSS and OSS systems are not geared to offer automation of inter-carrier operations. On the operational side, the reasons include lack of a common language, use of disparate information and data models and misalignment of processes. On the commercial side, reasons include limited support of usage-based performance metrics and billing and settlement involving multi-party, multi-dimensional products. The PoC demonstrates a solution to both challenges.
The Bandwidth-on-Demand PoC will demonstrate the power and viability of a synchronized and decentralized global supply chain for inter-carrier bandwidth-on-demand services. As a result, carriers can automatically discover, quote, deliver and settle multi-product, multi-party services, eliminating reliance on a centralized intermediating party.
Cataworx will demonstrate LSO Sonata inter-carrier quoting solutions and LSO Cantata intent interfaces, enabling customers to rapidly discover and order services that span across multiple carrier networks. Clear will demonstrate LSO Sonata blockchain-based billing and settlement enabling carriers to bill for guaranteed network capacity on-demand, thus unlocking new revenue streams based on existing network infrastructure. Service providers CBCcom, PCCW Global, Sparkle and Tata Communications represent a multi-carrier interconnected network environment.
The PoC uses MEF LSO Cantata and Sonata inter-carrier interfaces for automation of bandwidth-on-demand product discovery, service eligibility verification, quote, order and blockchain-based settlement of services that are delivered across automated, virtualized and interconnected networks in accordance with the MEF LSO framework. In the PoC, customers state their intent via the bot-based Cataworx Community Portal. Off-net quotes are then exchanged across a MEF LSO Sonata Interface Reference Point as product offerings are discovered across any number of carriers. Orders are encoded in smart contracts and services are automatically settled, including provisions for SLA, using private and shared blockchain interactions.
The commercial solution, provided by Clear, involves automated multiparty inter-carrier blockchain-based invoicing, payments, dispute resolution, SLA based remedies and settling. The process eliminates manual, labor intensive and time-consuming elements of settlement, invoicing and clearing, accelerates quoting and invoicing and enables synchronized inter-carrier usage-based billing. With the elimination of a centralized orchestrator, neighboring carriers can transact directly, flexibly and automatically without revealing any sensitive commercial or operational information to a third party. This creates an equal-level bandwidth-on-demand play-field enabling any carrier to participate in the next wave of service innovation, based on their footprint and carrier-relations assets, free of vendor lock-in.
Gal Hochberg, Co-founder and CEO of Clear Blockchain Technologies, said: “The telecommunications industry is producing one of the most exponential assets of the world today: bandwidth. With a growing demand for cutting-edge technologies such as cloud, VR, or self-driving cars, telecom companies have an opportunity to unlock new revenue-generating opportunities by offering data on demand for fixed and mobile subscribers. The Bandwidth-on-Demand PoC is the first step towards a guaranteed and secured new internet layer enabling new connectivity for people and organizations wherever they are.”
Richard Fung, CEO of China Broadband Communications (CBCcom), said: “These days, no company with an eye on global expansion can afford to ignore China. Demands for bandwidth is growing exponentially in China, e-commerce transactions, Smart Cities, IoT, AI, have all been a major driver of China’s digital economy. Our goal has always been to simplify the delivery of telecommunication services to help companies investing in China to do well. Likewise, China’s company going global, the Belt and Road initiative is also driving the demand for connectivity between China and rest of the world. I strongly believe, the successful roll out of this PoC will offer great benefits for global business, and redefine inter-carrier processes.”
Shahar Steiff, AVP, New Technology, PCCW Global, said: “Customers require reliable services that are based on managed connectivity, managed compute resources and managed storage resources, delivered with uncompromised security. Telecommunications carriers strive to automate the delivery of such services in order to reap the commercial benefits of measured and billable on-demand services that will yield additional revenues from existing infrastructure. This PoC demonstrates that such services can be realized today, and highlights the need of the industry to converge towards a unified modelling and operational approach, which are the prerequisites for such automation across multiple operator domains.”
Daniele Mancuso, Director Innovation & Engineering, Sparkle, said: “The ultimate goal of MEF3.0 is the creation of multiple ecosystems of interconnected Service Providers delivering their Customers with on-demand, certified, agile, assured, and orchestrated communication services. This PoC further raises the bar of the work that the Industry has done so far toward this direction, demonstrating how traditionally static and long-lasting processes such as Partners qualification, commercial iterations and settlements, can be now automated through real-time quoting portals and with the creation of decentralized circles of trust based on blockchain technology. We are delighted to participate to this highly innovative PoC confirming, once more, Sparkle as a technology & innovation driving force in the Industry.”
Matthew Ma, Vice President, Global Technology, Network and Operations Group, Tata Communications said: “Being involved in this latest proof-of-concept not only leverages our partner and technology ecosystem, it is also a step forward in demonstrating the potential value that blockchain can deliver by improving the ways in which we interoperate in the context of next generation services and ultimately the end-user experience.”
Brian Hedstrom, Co-Founder and CEO of Cataworx, said: “We are excited about bringing our software solutions to the telecom pre-sales operations space. We’ve spent the past year gaining a deep understanding of the pain points operators face with pre-sales and partner integrations. The consistent theme is a lack of automation where inefficient and error-prone manual processes are a bottleneck to delivering agile on-demand services. We have invested heavily in technologies such as collaboration, intent, natural language and AI to simplify the user experience. Cataworx is focused on driving down Telco operating expenditures and creating a revolutionary customer experience, moving more control into their customers hands. We remain committed to the success of the MEF LSO Framework and our team actively contributes to the Sonata and Cantata interface definitions.”
Pascal Menezes, CTO, MEF, said: “MEF18 Proof of Concept demonstrations, like this collaborative effort involving PCCW Global, Tata Communications, Sparkle, CBCcom, Clear, and Cataworx, are crucial to accelerating development and worldwide adoption of assured services, orchestrated across automated networks with MEF 3.0. We are delighted by the tremendous support of leading service and technology solutions providers who are participating in this year’s PoC Showcase. More than 50 companies will be involved in 20 demos. That’s double the number of participants in last year’s popular showcase.”
Engaged with major telecommunications organizations and carriers, Clear successfully completed a GLF-led PoC with PCCW Global and Colt for international wholesale IDD voice traffic, settling historical data for both companies in less than a minute. The second phase of the PoC integrated with the carriers’ production networks to settle data in near-real-time using automatic dispute resolution and settlement logic encoded in smart contracts, and was expanded to include additional carriers Telefonica, Telstra, and BT. Clear is launching additional PoCs in roaming and mobile messaging later this year.
What does cybersecurity look like for the financial sector in 2021?
By Neill Lawson-Smith, managing director at CIS
The landscape is changing incredibly fast, with cybercriminals using the most up-to-date technology to hack systems. Here are the six areas those in finance should be watching out for…
The finance and insurance sector is increasingly becoming a notable target for cyber attacks. Many of these breaches happening are believed to be due to inadequate security measures when teams or businesses are using cloud services.
The financial industry is also being affected by changes in processes with more fintech, virtual banks, and other digital disruptors impacting the market. The landscape is changing incredibly fast, with cybercriminals using the most up-to-date technology to hack systems, so it is therefore up to the financial sector to keep up to avoid security breaches.
What does this look like for the year ahead in the financial sector? Here are the Six areas those in finance should be watching out for:
- AI securityand cyber defence
Both Cybercriminals and cyber defence are commonly using Artificial Intelligence (AI). In cybersecurity, it is used to identify new threats, as well as assess the effectiveness of the responses to threats, enabling them to foresee and essentially block attacks before they happen. It is also used to spot behavioural patterns and can quickly identify possible infiltrations.
Hackers have also started to use AI to make it easier for them to get past security systems in place. This year, it is likely that AI will be increasingly used as a means of gaining personal details (i.e. credit card details) as well as optimising spam phishing campaigns.
- Mobile cybersecurity in banking
With the number of consumers using their mobile devices for banking and financial transactions increasing, especially since the COVID-19 pandemic has rendered society predominantly cashless, cybercriminals have been heavily targeting mobile systems. For example, mobile malware only targets mobile phone operating systems. The most common forms of mobile malware are virus and trojans, spyware and madware (mobile adware), phishing campaigns, and browser exploits.
This means it is now more important than ever to protect mobile devices to the same extent as traditional hardware.
The same protocols that are in place to ensure your staff PCs and laptops are secure now, need to also be applied to their mobile devices as well, such as:
- Ensuring the latest versions of the operating system and other applications are installed.
- Installing a firewall.
- Enabling mobile security software to protect against malware and viruses.
- Using password protected lock screens.
- Ensuring apps are only downloaded from official sites like Apple App store and Google Play.
- Multi-factor authentication
Multi-factor authentication adds an extra layer of security to all your business networks by ensuring every transaction or login is supported by at least two security measures for access. It is one of the easiest security measures to implement within your business and is becoming more common within the financial sector for many transactions. The traditional username and password are becoming increasingly easy for cybercriminals to acquire, whereas adding an extra identification method, that is not easily accessible to the hackers, ensures an extra layer of protection.
The most commonly used multi-factor authentication methods are:
- Passwords – They should be complex and comprise at least eight characters and be a combination of upper- and lower-case letters, numbers, and special characters.
- One-time use code – A randomly generated code sent via SMS or email which is used only once. With weaknesses in mobile networks and email accounts, these can however be intercepted by hackers.
- App generated codes – a code generated by an app on a mobile phone often created by scanning a QR code that contains a ‘key’. As the key is stored on the phone itself this is less likely to be intercepted by a third party.
- Physical authentication keys – this is a USB which the user inserts every time they login from a new computer. Unfortunately, they don’t work on all devices without adapters (such as iPhone, MacBook or Android).
- Biometrics – Using a fingerprint, voice, or an eye dent is an effective identifier. They are extremely difficult to hack but if they are, they cannot be used ever again for anything.
- Information – this could be something that only the user would know – either a password or a piece of information.
Most of these methods are free or relatively cheap to implement and don’t require anything other than a mobile phone for the user. The added security of multi-factor authentication means even if a hacker has acquired a username/password combination there is still an extra security barrier preventing access.
- Refined testing
As the finance industry is constantly changing, then so too are the security threats. Financial cybersecurity is an ongoing commitment, so installing new anti-virus software and implementing MFA, and stopping there is not going to keep you protected for long. It requires ensuring software and firewalls are up to date as well as ensuring access is regularly updated. In addition to this constant maintenance regular testing of the systems is essential. All systems have vulnerabilities, and as these change, cybercriminals learn to overcome them, and therefore software develops.
One thing to remember is that it is not possible to be over-cautious when it comes to cybersecurity. Regular penetration testing essentially identifies any weaknesses in your systems before the cyber criminals do. It is essential to schedule penetration testing or vulnerability scans at least once a quarter unless compliance dictates otherwise. They can be carried out using a vulnerability scanner.
- Hiring the right people
It is crucial to have the right team on hand to ensure your systems are up to date, regularly tested and maintained is essential.
Your IT team should have the following skills and knowledge:
- Knowledge and understanding of the company’s IT infrastructure
- Knowledge of cybersecurity best practices
- Understanding of company processes and data flows
- Up to date knowledge of cybersecurity solutions
- Plan a Defence, Prepare for Attack…
Although businesses can take many precautions, there are limitations on skills, investment and timescales in implementing a comprehensive cybersecurity infrastructure, it is essential that appropriate procedures, policies and processes are established to ensure that an appropriate response is carried out in the event of a detection – whether manual or ideally automated – so that whenever an attack occurs, the appropriate and proportionate response is carried out immediately to limit any further damage or intrusion.
Data protection: it’s time to reassess your security strategy
By Tony Pepper, CEO of Egress
It’s no secret that the Covid-19 pandemic has created a perfect storm of cybersecurity risk. External threats are heightened, but there’s also a higher level of internal risk too, exacerbated by home working. With most financial services organisations planning to continue with mass remote working for the foreseeable future, it’s important for security teams to review their strategy and assess whether it still works in this new landscape. When it comes to insider threat, there are three key areas that IT leaders should focus on: building a positive culture around security, understanding their organisation’s level of risk and protecting their people.
- Build a security-positive culture
Many organisations have unknowingly instilled a security-negative culture among their employees, where people are punished or shamed if they cause a security incident. While they might think that this would discourage employees from causing data breaches for fear of repercussions, this actually makes your organisation less secure. Our Outbound Email Security Report found that 62% of organisations rely on their people to report email data breach incidents – and if employees are too afraid to come forward, that means your business is at risk of developing a security blind spot.
A security negative culture won’t actually prevent data breaches caused by human error, something which organisations need to recognize as largely unavoidable without technological intervention; it just delays remediation, which makes every incident worse. By creating a security-positive culture, you can better engage and educate employees, as well as ensure you’re able to rapidly triage any incidents if they occur.
- Understand your risk
When mapping out your risk, you’ll likely find that the picture looks very different to how it did even a year ago. In the past, organisations have focused on their networks and their devices when it came to security strategy. While these are vital areas for consideration, what hasn’t been as well-addressed to date is the human aspect of risk, particularly human error. You need to look closely at the tools that your employees are using daily to facilitate digital communication with clients and colleagues, including when sending sensitive information.
Employees are specifically using email more than ever before – our recent research found that 94% of organisations are sending more emails due to Covid-19, with one-in-two IT leaders reporting an increase of more than 50%. With this expansion of email volumes comes an increase in the risk that an email containing sensitive data might be misdirected. Remote working has also heightened the threat – our research found that 35% of organisations’ serious email data breaches were caused by remote working. Why? The causes lie in their behavior and the environments in which they operate. Some individuals may feel they’re able to take more risks away from the “watchful eyes” of their Security team, and every employee is faced with a myriad of distractions that make them more likely to make a mistake.
It’s time for organisations to take stock of their risk by looking at where gaps in their security might exist – and provide safety nets for their employees that can automatically detect and mitigate inadvertent data breaches and risky behaviour.
- Protect your people
It goes without saying that not all data breaches are caused by malicious activity. An overwhelming amount of data breaches are caused by hardworking employees making honest mistakes, from sending an email to the wrong person to responding to a phishing attack. Unfortunately, human error is an unavoidable part of life, and mistakes will happen. In the past, many organisations have taken the approach that employee error can be ‘trained away’, embarking on comprehensive security training programs in the hope that security incidents might decrease.
Unfortunately, if that were the case, then employee activated data breaches would be a thing of the past! Organisations need to employ a multifaceted approach when it comes to avoiding accidental insider data breaches – education and training remain an important element, but ultimately businesses need to implement the right technology to provide a safety net for their people. Many organisations have legacy DLP solutions in place that cannot mitigate the risk as they fail to fully understand employees’ behaviour.
Often, these tools stand in the way of productivity, prompting users even when there isn’t a legitimate risk. When click fatigue sets in, these solutions become ineffective, with users ignoring prompts whenever they appear. Luckily, advances in machine learning mean that there’s technology available to prevent insider data breaches such as misdirected email, by deeply understanding the way that users behave and the context in which they share data, to ensure emails are sent to the right recipients with the right level of security.
The vast majority of organizations will never go back to every employee working full time within the office environment, instead post-pandemic we will see a myriad of different approaches – with some based in the office, while others work at home part or full-time, and as the world opens up again, their locations may change throughout the day. To mitigate risks from inadvertent errors to intentional data exfiltration, CISOs must address their security culture and protect their human layer with intelligent controls that mitigate employees’ behaviors and stop breaches before they happen.
Sumitomo Life Insurance Selects Talend to Build Company’s Data Infrastructure
Leading life insurer uses Talend in data lake environment for data analytics
Talend (NASDAQ: TLND), a global leader in data integration and data integrity, announced today that Sumitomo Life Insurance Company, one of the Japan’s leading life insurance companies, has selected Talend Data Fabric for its data analytics infrastructure.
Sumitomo Life aims to become the most trusted and supported company by its stakeholders, including its customers, and to grow sustainably and stably. Sumitomo Life’s vision is to offer advanced products to enable customers to live vigorously. To respond to that, the company is developing and delivering cutting-edge products that respond to its customers’ current and expected futures needs in areas focusing on nursing care, medical insurance and retirement planning.
“With the trust from our customers as the starting point of all our activities, Sumitomo Life is providing optimal life insurance services to every person through the sound management of the insurance business,” said Mr. Masakazu Ohta, General Manager in Charge of Information System Department at Sumitomo Life. “As a new approach, it was necessary to build a common foundation for big data management, and Talend is the driver. Talend’s superiority in cloud implementation, development productivity, features, and licensing model convinced us to be part of this journey together.”
To meet the needs of its customers and offer them innovative products and services, Sumitomo Life has decided to build a foundation for data analysis (Sumisei Data Platform) in the cloud for the promotion of new insurance products. The company evolved its legacy data environment to the new environment where they can store the data extracted from various systems both on-premises and effectively in the cloud.
In order to meet the needs of each individual customer and provide the best insurance for them, Sumitomo Life uses Talend Data Fabric as the hub of its data infrastructure. This manages data across the organization and integrates data into a data lake, which makes them able to utilize data across the company.
“We have been able to release projects with the continuous support of Talend, even amid the changing business environment in the Covid-19 crisis. We will continue to collaborate with Talend in order to actively promote company-wide data analysis projects,” added Mr. Ohta.
“The insurance market is one of the most competitive sectors. By facing tight regulations and complex customer needs, companies must be at the forefront of innovation to offer even more services and new products to its customers,” said Kenji Tsunoda, Country Manager Japan, at Talend. “Talend helped Sumitomo Life reinvent its data-driven infrastructure to provide a data management platform that enables the development of advanced products for its customers. We are delighted to support Sumitomo Life in the pursuit of their vision.”
UK might need negative rates if recovery disappoints – BoE’s Vlieghe
By David Milliken and William Schomberg LONDON (Reuters) – The Bank of England might need to cut interest rates below...
UK economy shows signs of stabilisation after new lockdown hit
By William Schomberg and David Milliken LONDON (Reuters) – Britain’s economy has stabilised after a new COVID-19 lockdown last month...
Dollar extends decline as risk appetite favors equities
By Stephen Culp NEW YORK (Reuters) – The dollar lost ground on Friday, extending Thursday’s decline as improved risk appetite...
Bitcoin hits $1 trillion market cap, soars to another record high
By Gertrude Chavez-Dreyfuss and Tom Wilson NEW YORK/LONDON (Reuters) – Bitcoin touched a market capitalization of $1 trillion as it...
Shares rise as cyclical stocks provide support; yields climb
By Saqib Iqbal Ahmed NEW YORK (Reuters) – A gauge of global equity markets snapped a 3-day losing streak to...
Battling Covid collateral damage, Renault says 2021 will be volatile
By Gilles Guillaume PARIS (Reuters) – Renault said on Friday it is still fighting the lingering effects of the COVID-19...
Portable Oxygen Concentrators Market to Register 7.8% CAGR Through 2026; Sales to Surge as Oxygen Therapy Becomes Crucial in Covid-19 Treatments
Portable oxygen concentrator manufacturers are largely concerned with the maintenance of inventories throughout the coronavirus crisis, with optimization of supply...
Cancer Supportive Care Products Market to Reach US$ 32 Bn by 2030; Sales Limited by Complications for Cancer Patients Through Covid-19 Infections
The cancer supportive care products market is anticipated to reach a valuation of US$ 32 billion by 2030. The industry is expected...
Bronchoscopes Sales to Rise 1.5x Between 2018 and 2028; Potential Covid-19 Diagnostic Applications to Generate Lucrative Growth Opportunities
Bronchoscope manufacturers remain focused on development initiatives to improve product functionality and accuracy for higher adoption amid healthcare facilities. The bronchoscopes...
US$ 1.1 Bn Hypoparathyroidism Treatment Market Still in Infancy
Mushrooming incidences of thyroid cancer have amplified the number of thoracic surgeries, thus stimulating growth of hypoparathyroidism treatment market. Future...