securing people and things a monetization opportunity
TRANSCRIPT
Securing People and Things a Monetization Opportunity
September 2016
Moshe Elias
Dir. Product Marketing
2
2000 2003 2008 2010 2015 2020
Est. 18 Billion Connected Devices vs. Est 7.35 Billon People World Population
3G Mobile Broadband 4G LTEFaster/Better
5GEst 50 Billion connected
devices
More connected devices than
connected people
Allot at a Glance
Regional Headquarters
Sales & Support Offices
R&D Centers
Public company (NASDAQ, TASE: ALLT)
$100.3M revenues in 2015
75% gross margin (profitable)
$116M in cash
20Y deployment experience
100+ countries
1000+ CSP customers
24x7 follow-the-sun support
Powering 5 of top 10 mobile CSPs
Serving 1B subscribers worldwide
#1 provider of SECaaS in Europe
Protecting >15M Endpoints
3
Allot Monetization & Security Framework
4
Different IoT types With different Needs
5
Smart Building Tracking and Logistics
Fleet management Agriculture Metering
Health Care
Industry Smart Grid
Transportation Safety
High Scale Solutions Critical Solutions
Low cost, Low Power, Low Bandwidth, Extreme availability and reliability
Connected Car has all types
Collision avoidanceLow LatencyExtreme Reliability
Remote AssistanceSporadic Use Real Time
Car Monitoring & DiagnosticsEngine and TelemetryLow B/W High Reliability
InfotainmentHigh B/W
6
New Charging Models
7
Sub System Need Charging Model Network Capability
Remote AssistanceLow usage
High AvailabilityReal Time
QoS based chargingEnforce and measure class of
service
Collision AvoidanceExtreme Availability
Low LatencySLA based charging Enforce and measure SLA
Navigation and Infotainment High BW Application based charging Application aware
Car Monitoring and Diagnostics
Low BWBulk charging / transaction
basedDevice aware
?
Analytics is crucial for IoT
9Telecoms.com Intelligence – IoT Outlook 2016
5%
51% 44%
How important do you think it is to understand the specific identity, activity and requirements of each IoT device connecting to the mobile network?
Not important: we don’t need to know
what the traffic is, we just provide connectivity
Quite important: some device insight
will help us better optimize costs and network resources
Very important: to harnes the full
potential of IoT and maximise profits, I need to monetise information and offer it to my enterprise customers
Analytics as a Service
Behavioral analysis and Anomaly
detect and alert
Security Analytics
QOS & SLA reports
Asset HeartBeat and Health
reporting
Other Alerting services
Mobile IoT
History Repeats itself
10
Security as an add on
Security as a Service
Security by Design
Security as a Service
Security by Design
Design for features and functionality first
Not an option
IP Core Network
Protecting the Service• White list – IP, Port & protocol compliance• DDOS detection and blocking• Infected/Malfunction device quarantine
Monetizing Security Opportunities
AllotService Gateway
Protecting the Endpoint• White list – IP, Port & protocol compliance• Authentication enforcement• Secure Web Gateway
IoT Analytics• Identify device type• Behavioral analysis• Anomaly detection• Capacity Planning
Allot ClearSeeAnalytics
IoT ManagementCloud
RAN
11
Customer Success Stories
12
Managing and Monitoring IoT Customers
13
CHALLENGE
Build a single portal for managing and controlling the entire lifecycle of the industrial IoT customers running on the same 3G mobile consumers network.
SOLUTION
“By keeping DDoS traffic off the network and managing CMTS congestion precisely where it occurs, we have been able to delay infrastructure expansion by 2 years and to save millions.”
BENEFITS
• Stop revenue leakage
• Visibility to IoT device usageMOBILE OPERATOR
Asia Allot Analytics delivered IoT device usage statistics and alerted upon abnormal behavior all of which were fully integrated to the IoT portal and terminal display. Allot Service Gateway, allowed validating device traffic and access and preventing potential device misuse.
Maximize Revenue with Fraud Prevention, Analytics
14
CHALLENGE
Decline in fixed-line business due to growing competition and churn as well as revenue leakage in mobile business due to fraud.
Allot Smart Data Source provides granular visibility of usage per subscriber, enabling targeted engagement and pinpointing the causes of revenue leakage. Allot policy control is used to eliminate charging fraud.
SOLUTION
“By keeping DDoS traffic off the network and managing CMTS congestion precisely where it occurs, we have been able to delay infrastructure expansion by 2 years and to save millions.”
BENEFITS
• Stop revenue leakage
• Accurate visibility of customer usage
• Effective engagement
More than 10% of the revenues were saved by fraud prevention on the mobile business
CABLE & MOBILE OPERATOR
Caribbean
Security as a Revenue Generating Service
15
CHALLENGE
Provide a simple, accessible and effective security services for consumers and small businesses regardless of their device.
“By keeping DDoS traffic off the network and managing CMTS congestion precisely where it occurs, we have been able to delay infrastructure expansion by 2 years and to save millions.”
Name of personTitle of person
“By keeping DDoS traffic off the network and managing CMTS congestion precisely where it occurs, we have been able to delay infrastructure expansion by 2 years and to save millions.”
BENEFITS• Service differentiation
• Customer brand
• Customer satisfaction from useful services
• New revenue streams from SECaaS
“Privacy and security can pose risks to our customers and our business, but we also see potential to differentiate our brand not just by managing these risks but by offering products and services designed to support customers in improving their privacy and security.”
Vodafone Sustainability Report (2014)
Allot WebSafe Family as a fully integrated service in the Allot Service Gateway to deliver Security as a Service to Consumers, SMBs & Enterprises.
SOLUTIONVODAFONE
Germany
MOBILE SP
THANK
Find out how Allot can help YOUR business to become a leading Digital Lifestyle Provider
Email [email protected] 16