telecom

Best selling B2C and B2B security for Telecoms

”Whalebone convinced us for its technical quality, innovation and the user experience. The implementation went smoothly and therefore our customers enjoy a state of the art cyber security product.”

Peter Novak, Segment Marketing Manager at O2

telecom features

Whalebone benefits for Telco customers

Whalebone security for both mobile and broadband customers serves as a significant revenue stream with proven 50%+ opt-in adoption rate of the entire user base.

Product Marketing

Even before we start, Whalebone offers Telecom free consulting how to setup the Product, which adoption rates are to be expected, the business case, what channel to select and how to do the technical setup in most comfortable way. Throughout the product lifespan Whalebone does maximum to support the commercial results – onboarding features, digital touchpoints or business intelligence delivery.

Time-to-market

Whalebone product is the market leader in implementation time as it is designed for Telecom companies. In a fast changing environment like telco each month of not having product launched is an important chunk of revenue missed. The product launched in just 2 weeks so you don’t miss the window of opportunity.

Product options

Whether you want start simple of with full set of product features and options, Whalebone supports you to do so. We do Security for B2C and B2B, off-net protection, parental & content control, MSSP, enterprise security or infrastructure DNS & security. With Whalebone technology you can build up your VAS security portoflio road map.

Threat Detection

Telecoms can not afford distraction of the core internet service experience. End users can’t withstand false alarms, they distrurb and cause mistrust in any solution. Therefore we invest a lot into our threat and data intelligence to minimize false positives. Whalebone excels in the detection acuracy.

Book a Product or Technical consulting

Let us help you to design your business plan and answer any technical questions

Product Marketing

Even before we start, Whalebone offers Telecom free consulting how to setup the Product, which adoption rates are to be expected, the business case, what channel to select and how to do the technical setup in most comfortable way. Throughout the product lifespan Whalebone does maximum to support the commercial results – onboarding features, digital touchpoints or business intelligence delivery.

What consulting does Whalebone offer?

Whalebone provides consulting services based on experience from different markets and product approaches and can help with the overall product design to properly set the product goals and expectations (comparison of various opt-in, opt-out approaches, advisory in marketing & sales scripts, etc.)

How much revenue can be made with Whalebone?

Depending on the sales and onboarding strategy, you can expect 50-80%+ user adoption. Based on your current ARPU the end user price can vary between 0.5-3 USD/EUR per user per month. More de

How to achieve high adoption rates?

Most of the consumer surveys and analysis say that users want security. On the other hand users don’t want to do much for it or sacrifice any user comfort. When thinking about security, first start thinking about the easiness of the user experience. Everything from the sales procedure, onboarding, service initialisation and execution needs to be zero touch. Most of the users don’t want to know about the security at all, just want to get protected. Avoid any need of settings, installation, license code input, additional confirmations etc. All needs to be agreed and set up with ONE single OK.

What are the values for the user that shall be communicated?

Most of the Telecoms use the term “internet security” and similar for their product. This is understandable for the user and can be explained on simple examples like protection against suspicious links received via messenger or email, web and app banking security, stop of fraudulent device communication, device lost control. However, the most important value to be communicated is the fact that no sw/app installation on the device is required. The product runs on the network level.

How to show the value?

Make sure the user is being informed and educated about the security both personal and in general. Provide the user its own security report, statistics and optionally a user portal inegrated into your app or consumer web portal. Inform the user regularly about what is happening in the networks, provide security tips and statistics, even if the users are safe they like to get informed what is happening to others to avoid mistakes.

Time-to-market

Whalebone product is the market leader in implementation time as it is designed for Telecom companies. In a fast changing market like telco each month of not having product launched is an important chunk of revenue missed. The product can launched in just 2 weeks so you better don’t miss the window of opportunity.

How complicated is it to deploy the product?

The lead times for implementation vary from couple of hours to maximum three months, depending on the complexity of the product setup. Whalebone helps you to select the right implementation plan to make the most out of the product.

What is the secret of Whalebone short lead times?

From the very beginning Whalebone design and architecture is made for Telcos. The combination of on-premise and cloud components opens plenty of possibilities how to match the specific telco infrastructure and therefore fit into the existing environments.

Does Whalebone deliver hardware or software?

Whalebone taps into existing processes and masimizes the existing infrastructure. The Whalebone DNS resolver is supposed to be placed next to the current DNS resolvers. Whalebone delivers software to be installed on the recommended hardware (physical or virtual) equipped with a clean Linux.

Which departments shall be involved?

The implementation differs from the Product setup. However, the Network department is to be aligned as soon as possible, together with billing.

Product level options and addons

Whether you want start simple of with full set of product features and options, Whalebone supports you to do so. We do Security for B2C and B2B, off-net protection, parental & content control, MSSP, enterprise security or infrastructure DNS & security. With Whalebone technology you can build up your VAS security portoflio road map.

Which segment is the best for start?

In general, the best results can be achieved in the consumer and in the SMB/SOHO segments.

Which product option is the best for start?

The best results can be achieved with the Security that runs on the network level. Right after you can offer the users the option of individual settings and reporting since it increases the value and builds up the relationship. As a next step there are niche cases like off-net protection, content and parental control.

Does Whalebone protect both mobile and broadband customers?

Whalebone is a fully convergent solution that covers both mobile and home/broadband users. It is bandwith independent and works on the DNS level.

How is that possible that nothing gets installed into the user devices?

The product runs on the network level. It works with the fact that almost all malicious software and attacks need internet connection and therefore securing the internet connection is a very effective way how to address the potential threats. Over 90% of the attacks use domain requests therefore we tap into the DNS resolution process and put our security there.

How does the user interface and touchpoints look like?

All the user touchpoints are branded and according to the Telco design templates in order to stay aligned with the telco brand and app design.

Threat Detection

Telecoms can not afford distraction of the core internet service experience. End users can’t withstand false alarms, they distrurb and cause mistrust in any solution. Therefore we invest a lot into our threat and data intelligence to minimize false positives. Whalebone excels in the detection acuracy..

Where does Whalebone get the information about threats?

Whalebone combines vast number of sources from around the globe and combines that with extensice own research. Important part of the threat intelligence excellence is the reputation analysis which is done by set of logical principals, autocorrective measures, comparisons and learning procedure from live traffic. For specific types of zero-day attacks there is a neural network in use.

How can the detection rate be compared?

Unlike the enterprise environment in the consumer space the false positives are a great threat to the user experience. Therefore when comparing the detection rates we like to agree on the telco preferences – whether it wants to report more security incidents for the price of higher false positive rate or rather protect in a more reliable way for the price of lower number of threat incidents. The general experience says that the users value comfort and user experience over protection so we recommend to stay less aggresive in setting up the blocking policy.

Can Telco include its own threat intelligence?

Yes, Whalebone supports the option and additional sources can be added based on the telco requirements.

Is there an option the users set their own policy?

Depending on the product level there is a possibility for each individual user to set is own policy (i.e. block specific threats, set its own blacklists, whitelists etc.)

Does the user have the option to proceed to the malicious content?

There is an option to include a “proceed anyway” button to the blocking page so the user can decide to continue even if a threat is detected.

2

weeks basic implementation time

3

months full product implementation time

100

CSPs trust Whalebone

Whalebone is selected by the market leading brands

“Whalebone convinced us for its technical quality, innovation and the user experience. The implementation went smoothly and therefore our customers enjoy a state of the art cyber security product.”

Peter Novak, Segment Marketing Manager, O2 Czech Republic

“A1 Telekom Austria Group puts increasing importance on cyber security. Therefore we are delighted to work with Whalebone in a strategical partnership.”

Dr. Mario Mayerthaler, Head of Innovation, A1 Telekom Austria Group

news

10/10/2019

What is Whalebone Threat Intelligence and Whalebone Neural networks?

But I must explain to you how all this mistaken idea of denouncing pleasure and praising pain was born and I will give you a complete account of the system, and.

10/10/2019

What is Whalebone Threat Intelligence
and Whalebone Neural networks?

10/10/2019

What is Whalebone Threat Intelligence
and Whalebone Neural networks?

Schedule meeting

Book a Product or Technical consulting

Let us help you to design your business plan and answer any technical questions