Read More
Press Inquiries
Please contact us for any press inquiries
Contact Us
X
Press Inquiries
Please contact us for any press inquiries
Contact Us
X
Sandvine leads the way for ETSI NFV MANO Implementations

In an industry - and possibly world - first, Sandvine has demonstrated the use of a portion of the actual SOL-002 protocol as defined by ETSI NFV.

Topics: Nfv, Etsi

Elina Edefalk
By Elina Edefalk
November 15, 2017
Read More
Subscriber Data is Beginning to Pay Off

We are so jaded by new, over-hyped "opportunities" that we sometimes don't recognize when new ideas do begin to work. The monetization of subscriber data is one area where providers are starting to get traction.

Topics: Application intelligence, Subscriber, Monetization

Read More
Global Internet Phenomena Spotlight: Subscription Television Piracy

Since our report on the “fully-loaded” Kodi ecosystem, we have been digging deeper into research types of video piracy, and today we released a new report on an emergent form of subscription television piracy that aims to replicate the live television experience offered by cable and satellite providers for approximately $10 USD a month.

Dan Deeth
By Dan Deeth
November 1, 2017
Read More
The Coming Wave of Network Automation

I wanted to share some thoughts on the just closed combination of Procera and Sandvine, and provide you with what we are going to be doing going forward. Below is content from a document that we are sharing on our Deal Update Page

Topics: Network intelligence, Sandvine, Automation

Cam Cullen - VP of Global Marketing
By Cam Cullen - VP of Global Marketing
September 22, 2017
Read More
New Ways to Stop IoT-based Attacks

The Mirai Botnet attacks in late 2016 gave us a real world view into the massive threat posed by the proliferation of unsecure IoT devices. Over the course of several attacks, hundreds of thousands of IoT devices were high-jacked to silence a popular Internet security website, take millions of Internet users offline by flooding DYN DNS servers, and to...

Topics: Iot, Security

Read More
Mayweather vs. McGregor: A Technical Knockout for TV Pirates

 

Dan Deeth
By Dan Deeth
August 27, 2017
Read More
An OTT Voice Bypass Fraud Update

The explosion of mobile VoIP applications has helped to introduce a new type of Interconnect Bypass fraud, which exploits SS7 interconnect agreements and is often referred to as OTT Voice Bypass fraud. OTT Voice Bypass fraud is on the rise thanks to the exploitation of an “In Calling” feature available on some VoIP apps. “In Calling” allows a subscriber...

Dan Deeth
By Dan Deeth
August 3, 2017
Read More
Change the Data Conversation

I would argue that very few people could take a random selection of Lego blocks, throw them across the table and in a matter of a couple hours, assemble the Millennium Falcon. For such a complex goal, you would need the right pieces, in the right amount, supported by a detailed set of instructions to get the outcome you want, even then, it may become an...

Topics: Big data, Analytics

Tony Parrell
By Tony Parrell
July 25, 2017
Read More
Making Moves in Service Provider Compliance

The regulatory environment is changing and so are the methods used by regulators and operators to validate, enforce, respond, and comply with requirements. Operators worldwide have been phenomenally successful in delivering access and encouraging technology adoption. So much so that broad, dependable, and secure telecommunication and Internet access have...

Topics: Virtualization, Service provider, Regulatory

Read More
Orchestrating the Network of Tomorrow - Today

 

Topics: Nfv performance, Nfv, Orchestration

Read More