By Amy Oldham
June 10, 2013
You may have heard of The NeverEnding Story, an epic fantasy film based on the novel of the same name written by Michael Ende. Although the tale has nothing to do with telecommunications, its name is poignant to those of us in this industry...because fraud is a never-ending story.
Global telecom fraud costs companies and their customers billions of dollars annually. Recent trends show international revenue share fraud and premium rate service fraud incidents are still on the rise. And you can bet that as long as there is a way for fraudsters to monetize their efforts, they will continue to gain illegal access to your network. You must fight back!
There is help in the never-ending task of strategic, dedicated fraud management. Equinox has spent decades focusing on fraud, with the express purpose of protecting customers from the losses associated with the latest fraud schemes. Our efforts in combatting fraud are encapsulated in our automated fraud management system (FMS), Protector.
Protector is built upon a quarter century's worth of experience gained by working with a consortium of similarly-situated companies. In that time, Protector has earned a reputation as the most reliable and affordable fraud management system on the market by saving carriers hundreds of millions of dollars in fraud losses. It's no accident that the product's logo is a shield...
Our confidence in this product comes from our customers' success stories. Even though all our customers have unique strategies for using Protector, the common theme is the significant and repeated ROI gained by using this tool. You can read about just a few ways of the many ways that Protector has paid for itself many times over by visiting the case studies section of our website.
Protector provides real-time network monitoring to detect fraud. Protector reads call detail records (CDR) from virtually any switch platform, simultaneously evaluating calls from multiple switches and sources. Protector uses profiles that analyze network traffic and identify potential fraudulent usage. Of course, these profiles and their thresholds are configurable on a customer-by-customer basis to match the type of business and product offerings being monitored. Protector scores each record based on the thresholds, flagging usage violations for case analysts, generating alerts when it detects potential fraud, and even automatically disabling compromised billing entities at the switch, if desired.
To learn more about how Protector can provide rapid and sustained ROI for you...call the phone number or click the demo request button at the bottom of the page. Of course, we're also happy to connect you with other customers so you can learn firsthand why they became and remain Equinox customers.
About the Author: Amy Oldham is in Corporate Communications at Equinox Information Systems, where she creates and maintains the company's technical documentation as well as all other customer-facing publications. As part of her efforts on the Sales & Marketing team, Amy is responsible for the company's newsletter, email campaigns, press releases, and social media presence. When not writing, Amy enjoys swimming, running, and spending time with her family.