Fraud & Identity Fraud & Identity



Fraud & Identity Industry News

TMCNet:  Zentera Systems to Speak at IoT Enterprise Implementations Summit at the 2017 Mobile World Congress Americas

[September 13, 2017]

Zentera Systems to Speak at IoT Enterprise Implementations Summit at the 2017 Mobile World Congress Americas

SAN JOSE, Calif., Sept. 13, 2017 /PRNewswire/ -- Zentera Systems, Inc., the leader in security and connectivity for workloads in hybrid computing environments, today announced that Jaushin Lee, the company's CEO, will be speaking at IoT Evolution's Enterprise Implementations Summit on Sep. 14, 2017, as part of the Mobile World Congress Americas (MWCA) program. MWCA 2017, at the Moscone Center in San Francisco, will draw 30,000 professional attendees from the mobile industry and adjacent industry sectors. Through a series of cases studies and IoT success stories, the IoT Evolution event will break down the complex components of IoT implementations.

Zentera Logo (PRNewsFoto/Zentera Systems, Inc.)

At 12:25 on Thursday, Sep. 14th, Lee will be discussing Embedding Security with CoIP® (Cloud over IP®) solutions, focusing on the challenges of safeguarding IoT services end-to-end. He will describe how CoIP, as an overlay architecture, allows cloud providers, telecom and enterprises to deploy IoT security rapidly, using but not disrupting the existing infrastructur.


"Jaushin continues to provide thought leadership to the IoT community about the importance of cloud security," said Mike Loftus, Zentera's VP of Strategy & Marketing. "This message is well-received, as evidenced by Zentera winning a Best of Show award from the recent IoT Evolution Expo, as well as being named a Gartner Cool Vendor in Cloud Security this year."

The CoIP Security Enclave protects IoT applications in several ways, including the Application Interlock feature. CoIP provides an isolated network, or enclave, to contain each IoT service end to end. Inside an enclave, next-generation technologies are provided to segment network flows and filter the edge IoT traffic. In addition to encryption and micro-segmentation capabilities, Application Interlock provides isolation for protecting IoT services.

About Zentera
Zentera, named a Cool Vendor in Cloud Security 2017 by Gartner, Inc., secures application workloads in hybrid environments by connecting them through a unified virtual overlay network, or enclave. The CoIP Security Enclave™ platform provides security and connectivity. It works with any infrastructure in any environment, does not interfere with existing environments or security, and can be up and running in less than a day. It provides defense-in-depth for enterprise applications in the cloud, moving to the cloud or on-premise. CoIP is deployed for worldwide operations by global corporations. The company has received numerous honors, including consecutive Red Herring Top 100 Awards, and is based in Silicon Valley. For more information, see www.zentera.net.

Media Contact
Mike Loftus, VP Strategy & Marketing
Zentera Systems, Inc.
+1 408-436-4810
mloftus@zentera.net

All trademarks cited here are the properties of their respective owners.

 

View original content with multimedia:http://www.prnewswire.com/news-releases/zentera-systems-to-speak-at-iot-enterprise-implementations-summit-at-the-2017-mobile-world-congress-americas-300519275.html

SOURCE Zentera Systems, Inc.


[ Back To Fraud & Identity's Homepage ]




Industry Insights

(MobileID) Proactive Fraud Prevention

Interconnect-related fraud such as International Revenue Share Fraud (IRSF) and PBX hacking fraud continue to be a billion dollar problem to the telecom industry.

(Defender Shield) Defense solutions for the modern SMS ecosystem

SMS is a ubiquitous communication method for person-to-person (P2P) text messaging, which has been in use globally for nearly 20 years.

(Defender Shield) Preventing Grey Routes and the Multi-billion dollar Threat

The convenience of mobile messaging has brought communication efficiency to billions of consumers worldwide. As is often the case with widely accepted technologies; however, convenience can provide a vulnerable gateway to fraudulent activity.

Product Documents

Asset Protect

While unlimited or high-volume voice and SMS plans offer great value to subscribers, sometimes fraudsters exploit these plans to avoid paying termination and interconnect fees.

Defender Shield

In a world with ever-increasing Application-to-Person (A2P) messaging needs and competition, improving customer satisfaction and eliminating revenue leakage is key for protecting SMS profits.

MobileID

Accurate and cost-efficient routing of voice calls and SMS is critical. Unfortunately, gathering reliable routing data on ported numbers and keeping up with constant changes in number plans is expensive and time-consuming.

Fraud Solutions

Communications fraud is a $20B annual global problem and growing. Companies are looking for peace of mind so that their business and their customers are protected from the onslaught of technology crime that is damaging their reputations and their balance sheets.