6d. Best Mobile Security or Anti-Fraud Solution
This category is awarded for the best use of technology to safeguard or protect customers and protect service providers from fraud.
This applies to products and solutions deployed on the full range of the mobile (or cellular) networks and services. We are looking here for network based products and solutions that protect customers and/or networks against, fraud, malicious activity, eavesdropping or theft.
As the mobile services eco-system expands and diversifies at every increasing pace, so the potential dangers intensify for mobile customers and service providers alike. This award will be made to the best use of technology to safeguard customers, their account balances and personal data or to help network operators and service provider’s combat fraudulent access to networks or attempts to crash or make services fail.
Trustonic for Trustonic Secured Platform
Entry Deadlines & Key Dates
The Deadline for entries is Wednesday 23rd November 2016
The Shortlist will be published in late January 2017
Winners will be announced at the Mobile World Congress in Barcelona 27th February – 2nd March 2017
Below you will find information on eligibility, criteria, supporting materials as well as the questions that you will be asked on the entry form.
Please also refer to the Rules of Entry and frequently asked questions sections for additional information. To begin your entry, click the ‘Enter Here’ button, and complete the registration information. Once underway, you can save, return to and amend your entry at any time until you formally submit.
The judges will review and score your entry on the basis of the information that you provide in answer to the questions, so please be as accurate and succinct as possible.
Note on The Importance of Video as part of your entry: While you can also add supporting materials in the form of documents, pictures and presentations within the entry form, a short video (of maximum 3 minutes) linked to your submission will help our judges significantly, in terms of visualising the use case and understanding the innovation and partner, client or user benefits.
This award is open to all organisations that provide mobile products, devices, services, solutions, and applications to combat fraud and protect security utilising mobile connectivity.
The subject of the entry must support, deploy, utilise or be accessible via mobile technologies based on open industry standards. Entrants must also demonstrate “Live” implementation, specifically that the entry is operating and available during and up to Year end 2016. Trials or Beta System deployments are not considered to be eligible.
Below are some examples of organisations and entities that this category could be appropriate for, however due to the nature of this sector, it is by no means exhaustive. We very much welcome entries from partnerships or a combination of these entities.
- Securing personal and sensitive customer data
- Prevention of fraudulent access to customer’s accounts
- Prevention of stealing electronic identity and fraudulent use of customers account and services
- Self-provision of safeguarding measures such as screening and filtering of unwanted calls and messages.
- Report abuse and identify personal threats
- Protection of vulnerable groups from inappropriate content or dangers from using social network sites
- Protection of customer hardware and integrity of their equipment and devices
- Protection to customers from intrusion and hacking and illegal intercept
- Antivirus, firewalls and malware protection on mobile handsets, tablets and other devices
- Prevention of fraud against network operators and service providers
- Prevention of attacks on networks and services
The judges will be looking at how well entries meet the key criteria, as follows:
- Mobile Operators supplying security solutions to their customers
- Suppliers of technologies in the GSM 3G and LTE Mobile environment aimed at safeguarding customers and operators
- Manufacturers and Vendors
- Software developers and service providers
- Innovators in the mobile industry
- Entry must be available on the market during (and by end of) 2016
You can submit additional materials to support your entry through direct upload on the entry form. Please keep supporting information submitted to a maximum of:
- A link to one x 3 minute (maximum) video
- Up to three x 1 page documents (word, pdf, ppt) with further information, images, graphics etc.
- Up to three x web pages (which should be very specific to the entry) linked by URLs
Video: Please provide a URL link to your video on the entry form (e.g. via YouTube, Vimeo or other public, English language video platforms) and if required, please make sure you provide a password. Videos should ideally be in the English language or with English subtitles.
Other supporting information Documents can include data, extracts from analysts’ reports, testimonials or press articles, graphics etc. Please do make sure this supporting information is succinct and clear.
Web pages: If pointing judges to a website within your supporting materials or entry, please include a URL which is to very specific information relating to your entry, up to a maximum of three web pages, as judges will not have time to search websites looking for the pertinent information.
The on-line entry form includes an upload facility for you to provide the above links and documents. You will have the ability to upload three additional files to accompany your entry. These can be pdfs, jpegs, Word documents or PowerPoint, but please, as above, keep these relevant to your entry.
Preview of Entry Form Questions:
On the entry form, in addition to submitting contact and company information, you will be asked to answer the following questions, (Please note the maximum text length for your answers including spaces are shown in brackets below):
- What is the brand name of your entry to the Best Mobile Security or Anti-Fraud Solution? Please note the name given here will be used in all awards materials and publicity. (approx. 25 words)
- Is this a joint entry? If so, who are the partnering organisations? (approx. 25 words)
- Please describe the nature of the entry and the challenge it addresses? (approx. 100 words) i.e. how does it actually work, and what is the user proposition? Please describe it as accurately and simply as possible (approx. 100 words)
- Please confirm that the subject of the entry was deployed, or will be, in “live” service or implemented and available on the market for clients, customers, organisations or end users to buy or access during (to year end) 2016, and in which markets or countries? (approx. 100 words)
- Please confirm that your entry utilises, supports, deploys or is accessible through mobile (cellular) technologies based on industry standards? (approx. 100 words)
- If this product or service is a new release or update to an existing version, please explain the key differences and advances available in this release compared to the previous version. Please note that it is only the new release enhanced features or functions that the judges will consider (approx. 250 words)
- How and to what extent does your technology protect, enhance or safeguard customers or service providers of mobile services in the GSM family? (approx. 250 words)
- Give evidence of the market success or take up rate of your technology (approx. 250 words)
- Please describe what is unique, new or innovative about your security technology for safeguarding users and protecting network services? (approx. 250 words)
- Does your technology allow the user to personalise and customise their services to protect their preferred usage in services? This includes the ability to screen or filter unwanted calls and messages. Alternatively, how easy is it for a service provider to implement the solution if it is a network protection solution? (approx. 250 words)
- Please describe what steps have been taken to ensure the security, robustness and interoperability of your product or service. If relevant, please include secure software development processes, use of standard algorithms and protocols, and other measures such as independent security testing and evaluation. (approx. 250 words)
- In what ways will the end user or the service provider feel more secure after using your product and service and how do you believe this will increase use of mobile services? (approx. 250 words)
- Explain the business case for network operators or the value proposition to end users if the solution is related directly to customers (approx. 250 words)