https://store-images.s-microsoft.com/image/apps.55186.cfe0a68e-4b0b-42c2-a630-c8cd7bf43ef8.6fe85d89-231f-45e0-a38d-82a62942c208.5ef0450b-0168-47e2-a0fa-aa169f723f8c

RAID.Cloud for Roaming Fraud

Wedo Technologies

RAID.Cloud for Roaming Fraud

Wedo Technologies

Secure your roaming revenues by eliminating fraud with RAID.Cloud Roaming Fraud App

Roaming fraud is the best known fraud committed in the Visited Public Mobile Network by roamers and takes place when a subscriber moves from his home network to another operator network and uses the services with no intent to pay for it, making the home network responsible of its subscriber usage.

The RAID.Cloud Roaming Fraud App uses powerful data capture methods to gather all relevant data, no matter where it’s stored, the app is an already pre-configured Fraud Management Application, which allows you to audit and control the Inbound and Outbound network traffic through the analysis of TAP and NRTDE file.

This information is captured in near-real-time, NRTDE files are created with a maximum delay of 4 hours compared with the traffic generated in the network, data is then ingested by RAID.Cloud and analyzed by our detection engines and risk hotlists.

RAID.Cloud Roaming Fraud App, is an already pre-configured Fraud Management Application, which allows you to audit and control the Inbound and Outbound network traffic through the analysis of NRTRDE files in four distinct criteria:

High Usage Consumption
Identify and notify events with high volume of network traffic.

Risky Destination Countries
Identify and notify events where the volume of traffic generated is composed of numbers from an identified list of risky countries.

Traffic to known fraudsters
Identify and notify the events where at least an incidence of generated calling to a known fraudster number took place.

Risky Visited Countries
Identify and notify the events where the volume of traffic generated, is composed of numbers from an identified list of risky visited countries.

Once the traffic patterns are detected and the thresholds higher than the defined ones, the solution raises the proper alarms presenting an dashboard with the detected fraud types (cloning, service abuse, IRSF, Interconnect Bypass/SIMBOX Gateway) that allows you to drill down and analyze more detailed information about the fraud pattern.

Contact us and get your 60 days free trial.

https://store-images.s-microsoft.com/image/apps.19730.cfe0a68e-4b0b-42c2-a630-c8cd7bf43ef8.6fe85d89-231f-45e0-a38d-82a62942c208.0bc91799-b075-4aa6-9102-65152b5113ed
/staticstorage/9fa6ec0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.19730.cfe0a68e-4b0b-42c2-a630-c8cd7bf43ef8.6fe85d89-231f-45e0-a38d-82a62942c208.0bc91799-b075-4aa6-9102-65152b5113ed
/staticstorage/9fa6ec0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.44989.cfe0a68e-4b0b-42c2-a630-c8cd7bf43ef8.6fe85d89-231f-45e0-a38d-82a62942c208.3438176e-ef1a-4db3-90ff-39eaaf7091f9
/staticstorage/9fa6ec0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.63486.cfe0a68e-4b0b-42c2-a630-c8cd7bf43ef8.6fe85d89-231f-45e0-a38d-82a62942c208.b738ba31-8988-45ef-9062-6172e93d6c69
https://store-images.s-microsoft.com/image/apps.61766.cfe0a68e-4b0b-42c2-a630-c8cd7bf43ef8.6fe85d89-231f-45e0-a38d-82a62942c208.a82d2531-71a2-49fe-87e7-c9eb86aea0ee
https://store-images.s-microsoft.com/image/apps.48532.cfe0a68e-4b0b-42c2-a630-c8cd7bf43ef8.6fe85d89-231f-45e0-a38d-82a62942c208.7617736f-13cb-46da-b096-dacfe74a1fbd
https://store-images.s-microsoft.com/image/apps.24217.cfe0a68e-4b0b-42c2-a630-c8cd7bf43ef8.6fe85d89-231f-45e0-a38d-82a62942c208.7ab59900-f0bd-46ff-996a-5417f2cbc15b
https://store-images.s-microsoft.com/image/apps.64725.cfe0a68e-4b0b-42c2-a630-c8cd7bf43ef8.6fe85d89-231f-45e0-a38d-82a62942c208.518330df-1090-438d-9144-d48d44d2d8e2