Xintec
Address
5-6 Castle Demesne House, Ivy Terrace, Tralee, County Kerry, Ireland – V92 Y4DC
Get In Touch
info@xintec.com
Ph: +353 (0) 1 2930260

iGenuity™

The Platform

iGenuity is our next generation platform combining the best in fraud management and revenue assurance capabilities to eliminate fraud and revenue leakage from customer networks.

The platform is designed for flexibility and speed of implementation, to maximise the return on investment (ROI). Built to ‘scale as you grow’ iGenuity enables customers to independently select FM and RA modules which best suit their needs.

As well as incorporating the latest in analytics, Machine Learning and AI techniques, iGenuity is supported by our expert team of specialists. Even more convenient, the platform is modular, making it easy to install, configure and maintain. IGenuity can be deployed on-site, in the Cloud, or as a Managed Service.

How It Works

Our CEO, Rob Durran, explains why fraud management and revenue assurance solutions are critical to ensuring best in class network operations.

Fraud Management

For Fraud Management, the system is designed to simplify and automate the fraud detection process. iGenuity enables Fraud Analysts to easily and quickly access real-time information on how end customers are using services on their network, or on roaming partner networks. Any suspicious or potentially fraudulent activity can be instantly identified and brought under control so that financial losses are averted.

Fraud Challenges and Solutions

PBX Hacking

The Challenge

Hackers target PBX networks in ways that can impact the company. Using the PBX, they might place high cost calls, leaving the company to pay the bills. Hackers might steal data or simply render the network unusable.

Our Solution

One of the challenges related to PBX is the diversity of behaviours. They may be operated by small or large companies, those operating for limited hours or 24/7; they may focus on local markets or international; and depending on the nature of the business, the call length and frequency change. The solution learns all these elements of behaviour for each PBX and tracks this behaviour for changes that are indicative of fraud. The behaviour continually evolves with the PBX, but the solution is clever enough to avoid polluting the behaviour with fraudulent call patterns. If desired, fixed thresholds can also be set using the high usage framework. Thresholds can be set for classes of PBX or individual PBX.

Revenue Share Fraud

The Challenge

Fraud Managers recognise the complexity of this fraud type, and know they are ill-equipped to tackle it effectively. Why? Because traditional fraud systems are “rules-based”, and alarms are only generated after the attack has occurred. At Xintec we offer a unique advantage over other fraud detection techniques in that iGenuity actually generates alerts either before or during the early stages of a fraud attack. This is a very key differentiator, as we can now “move the dial” from reactive to predictive fraud detection, saving telcos up to 98% of potential financial losses in a single IRSF case.

How do we solve this problem?

At Xintec we offer a unique advantage over other fraud detection techniques in that iGenuity actually generates alerts either before or during the early stages of a fraud attack. This is a very key differentiator, as we can now “move the dial” from reactive to predictive fraud detection, saving telcos up to 98% of potential financial losses in a single IRSF case.

Roaming Fraud

The Challenge

Roaming fraud is a special case where the victim’s cell phone or stolen SIM cards are used to make highly expensive calls. The key to preventing this is for the telecom operator to detect the fraud very quickly and block the outgoing calls from taking place. However, fraud detection time often takes longer than the exchange of data.

How do we solve this problem?

Roaming fraud is a special case where the victim’s cell phone or stolen SIM cards are used to make highly expensive calls. The key to preventing this is for the telecom operator to detect the fraud very quickly and block the outgoing calls from taking place. However, fraud detection time often takes longer than the exchange of data. The Roaming solution monitors TAP, NRTRDE and (where appropriate) CAMEL CDRs for full outbound roaming visibility. The solution protects against IRSF, Roaming SIM Box (if configured), IMSI spoofing and excessive usage. The solution learns the subscribers individual behaviour and any previous false alerts. This subscriber’s normal behaviour is combined with known risk factors (fraudulent number ranges, multiple concurrent calls and previous fraud cases) to produce high quality alarms with very few false alarms.

SIM box Detection

The Challenge

Fraudsters bypass the mobile network interconnection to direct incoming calls to on-network calls made by a range of SIM cards. This means that on-network calls are generated instead of interconnecting to mobile terminating calls. The revenue lost is the difference between the interconnect termination price and the retail price of mobile on-network calls.

How do we solve this problem?

Our SIM Box detector is a versatile tool for detecting SIM Boxes in CSP networks. Equipped with a powerful rules-based SIM Box profile, it is able to analyze a large number of call records and report suspicious behaviour. Our solution also includes a comprehensive set of built in functions for calculating statistical values and a configuration interface to combine these functions to define SIM Box profiles including; - High volumes of call, (more than 95%) mobile to mobile only with many distinct B numbers - Less than 1% international calls, less than 4% incoming calls and less than 5 distinct locations

Internet of Things

The Challenge

The rapidly growing IoT market is allowing CSP’s to secure steady cash flow with minimal added network infrastructure costs. But this expansion has exposed the telecommunication service providers to new fraud threats. Embedded SIMs if left unattended for long periods, are susceptible to possible tampering. The large number of terminals makes them prone to DoS attacks, or being used to launch such attacks.

How do we solve this problem?

The rapidly growing IoT market is allowing CSP’s to secure steady cash flow with minimal added network infrastructure costs. But this expansion has exposed the telecommunication service providers to new fraud threats. Embedded SIMs if left unattended for long periods, are susceptible to possible tampering. The large number of terminals makes them prone to DoS attacks, or being used to launch such attacks. XINTEC’s iGenuity Fraud Management solution mitigates these risks. The solution has two modules: IoT Known Behaviour module and IoT Unknown Behaviour module. Both these modules are built on XINTEC’s industry proven analytics core and can instantly provide security against IoT threats.

Subscription Fraud

The Challenge

With the proliferation of services, content as well as new devices available to the consumer, consumers are also demanding quicker application responses, and different application mediums, whilst CSP’s need to offer superior capability to differentiate in a very competitive marketplace.

How do we solve this problem?

Our Point-of-Sale (PoS) or Fraud Credit Check (FCC) accepts customer orders for telecommunications product and services, performs a series of checks and provides a decision to the service providers CRM as to whether the application should be accepted, declined or referred. IGenuity can be deployed in-line with the Point-of-Sale process or off-line, assigning a score and deposit to an accepted application. Referred applications are presented to an analyst for manual review. The analyst will either accept or decline the order, assigning an appropriate score and deposit value. FCC is comprised of two groups: Credit Vetting and Fraud Check. The CRM initiates the Credit Vetting and Fraud Check, which completes synchronously as a single step.

Spamming Fraud

The Challenge

Malicious spam text messages (also known as phishing texts or “smishing” – SMS phishing) are tools criminals use to trick users into giving them personal or financial information. As well as often being for the purposes of distributing malware, spam can slow down company networks and overwhelm the email servers of smaller businesses.

How do we solve this problem?

Malicious spam text messages (also known as phishing texts or “smishing” – SMS phishing) are tools criminals use to trick users into giving them personal or financial information. As well as often being for the purposes of distributing malware, spam can slow down company networks and overwhelm the email servers of smaller businesses. The iGenuity SMS spam solution is designed to detect whether SMS messages are spam or not. This is done using both simple and complex algorithms for classification and analysis utilising machine learning techniques that are available to our data scientists.

Mobile Money

The Challenge

Mobile Payments provides a mechanism for conducting financial transactions using a mobile device as an alternative to using cash, cheques or credit cards. The mobile device is linked to a bank account, card account (credit, debit or prepaid) or stored value (e.g., prepaid wallets, online stored value, stored value cards) from which money is deposit or withdrawn. Mobile Money services are extremely attractive to fraudsters and those seeking vehicles for money laundering.

How do we solve this problem?

The iGenuity fraud management solution encompasses monitoring and investigation of subscribers, agents, bank accounts, merchants and geographic regions to identify potential money laundering, commission manipulation, account theft or technical frauds.

Revenue Assurance

For Revenue Assurance, the solution provides a set of collection, reconciliation, and reporting features, accessible through a smart and intuitive GUI. The system works by analysing and reconciling event detail records (eDRs) from various network sources (GSM, GPRS, Prepaid, Roaming, Interconnect, Billing, Mediation, etc.) to identify, monitor and correlate the root causes of revenue leakage.

The software is typically deployed in predefined stages, as a range of easy-to-install modules requiring only light-touch integration. The system provides the following capabilities:

Revenue Assurance Challenges and Solutions

Usage Assurance

The Challenge

RA managers have a responsibility to ensure that their subscribers are billed for all the services they consume; and in turn the operator has a responsibility to its subscribers to assure they are only billed for the services they consume.

How do we solve this problem?

Usage Assurance is the principle of comparing two sets of data from different points of the switch to bill chain. Typically, CDRs from a switch are compared with rated CDRs to assure completeness and correctness of the charged units. Our Usage Assurance provides an easily configured Framework to achieve this goal. The framework offers full alerting, reporting and root cause analysis features. A key element of the Framework provides a secondary analysis for auto-handling of typical false alarms such as account changes and time boundary issues.

Platform Assurance

The Challenge

The services a subscriber is eligible to use does not always match with services provisioned for that subscriber in the network. These discrepancies can lead to poor customer experience and lost revenue.

How do we solve this problem?

Our Platform Assurance Framework supports simple configuration of CRM to network element comparisons. The module supports a fully automated working practice, whereby discrepancies are communicated via structured Excel files to the appropriate department. As well as performing the reconciliation, the Platform Assurance Framework tracks discrepancies to ensure they are addressed.

Partner Assurance

The Challenge

Interconnect partners exchange invoices for the cost of terminating on or routing calls through their network. Payments for these invoices should only be made if they can be verified to be broadly correct. And if they appear to be incorrectly, it is necessary to enact a dispute process to identify the source of the discrepancies.

How do we solve this problem?

Our Partner Assurance module is able to verify invoices against recorded interconnect calls and perform ad-hoc root cause analysis if differences are found. When linked with the Xintec Robotic Process Automation module, the process can be almost entirely automated – only requiring human intervention to review the discrepancy analysis should the need arise.

Balance Movement

The Challenge

The opening and closing balance of a financial system must reconcile to assure revenue is reported correctly. This process is particularly challenging for Mobile-Money Financial Systems and Prepaid systems that process multi-millions of debits and credits per day. The challenge is further compounded in Prepaid systems with the multitude of dedicated accounts (aka wallets).

How do we solve this problem?

We offer a Balance Movement module that can be configured to monitor the opening and closing balance of any financial system. The module reconciles the daily opening and closing balances by applying all credit and debit transactions. The output of the module is a summary report that allows the user to drill-down on any discrepancies to identify the main contributors to an error. The solution also allows for automatic adjustments of time boundary discrepancies that typically plague other solutions.

Rating Assurance

The Challenge

Retail Rating is complex, often allowing a single subscriber to enrol for multiple, overlapping offers and rate plans. Independent monitoring of the application of these offers and plans is considered crucial by many operators.

How do we solve this problem?

We offer a full-featured rating/re-rating engine that supports all the features typically found in modern offers and plans (offer hierarchy, shared plans, linked balances, etc). When the output of the Xintec rating is combined with the Usage Audit, the user gains full visibility into rating accuracy and stability.

Financial Forecasting

The Challenge

Predicting the future is difficult, but essential in forecasting revenues and understanding traffic anomalies.

How do we solve this problem?

We offer a Forecasting module that acts in one or both of two modes: Forecasting and Anomaly detection. Forecasting is about predicting something (usually revenue) several steps into the future; Anomaly Detection is a about predicting what will happen next and then comparing what happened with the prediction. Our module supports a range of traditional and Machine Learning forecasting methods allowing the right method to be selected for the right task. Proprietary methods are easily added by the customer, which can be deployed in champion or challenge mode. Anomaly detection can be used stand alone or as an option with Forecasting to assure more stable predictions that smooth out unexpected historic data points.

IFRS Reporting

The Challenge

Mobile Payments provides a mechanism for conducting financial transactions using a mobile device as an alternative to using cash, cheques or credit cards. The mobile device is linked to a bank account, card account (credit, debit or prepaid) or stored value (e.g., prepaid wallets, online stored value, stored value cards) from which money is deposit or withdrawn. Mobile Money services are extremely attractive to fraudsters and those seeking vehicles for money laundering.

How do we solve this problem?

The iGenuity fraud management solution encompasses monitoring and investigation of subscribers, agents, bank accounts, merchants and geographic regions to identify potential money laundering, commission manipulation, account theft or technical frauds.

Invoice Assurance

The Challenge

Validating third-party invoices (e.g. broadband) can be a time-consuming activity, especially when the relationship is relative new or when invoices haven’t been fully validated in the past. It is not unusual for there to be large discrepancies between the partners invoices and the services active for an operator’s subscribers.

How do we solve this problem?

We provide an invoice simulation and reconciliation module that validates third party invoices and identifies individual discrepancies in a way that can be used directly in communication with the partner. Invoices are simulated using the operator’s CRM information and then compared with the partner invoices. Discrepancies are classified (e.g. invoice for terminated subscription, invoice for cancelled order, incorrect invoice amount, invalid line speed, etc) and recorded in Excel format.

Usage Assurance

Partner Assurance

Balance Movement

Provisioning Integrity

Rating Assurance

Financial Forecasting

IFRS Reporting

Invoice Assurance

Is Managed Service a solution for your business needs?

Our Managed Services offering provides monitoring and management of Revenue Assurance and Fraud Management (RAFM) systems combined with direct access to skilled domain experts; underpinned by a detailed Service Level Agreement.

As a Managed Services provider, Xintec is responsible for delivering, implementing and maintaining a top-level service for our customers, be it a mobile network operator, MVNO or fixed-line or other service provider.

Business Reporting on Demand to meet performance objectives

Resource reallocation to core business activity

Best-in-class technical solutions combined with professional expertise

Management overhead reduced to a minimum to run the service

Performance based Service Level Agreements to ensure accountability

Average Leakage
0%

Partner Assurance

The Challenge

Mobile Payments provides a mechanism for conducting financial transactions using a mobile device as an alternative to using cash, cheques or credit cards. The mobile device is linked to a bank account, card account (credit, debit or prepaid) or stored value (e.g., prepaid wallets, online stored value, stored value cards) from which money is deposit or withdrawn. Mobile Money services are extremely attractive to fraudsters and those seeking vehicles for money laundering.

How do we solve this problem?

The iGenuity fraud management solution encompasses monitoring and investigation of subscribers, agents, bank accounts, merchants and geographic regions to identify potential money laundering, commission manipulation, account theft or technical frauds.

Main steps

Average Leakage
0%

Usage Assurance

The Challenge

Mobile Payments provides a mechanism for conducting financial transactions using a mobile device as an alternative to using cash, cheques or credit cards. The mobile device is linked to a bank account, card account (credit, debit or prepaid) or stored value (e.g., prepaid wallets, online stored value, stored value cards) from which money is deposit or withdrawn. Mobile Money services are extremely attractive to fraudsters and those seeking vehicles for money laundering.

How do we solve this problem?

The iGenuity fraud management solution encompasses monitoring and investigation of subscribers, agents, bank accounts, merchants and geographic regions to identify potential money laundering, commission manipulation, account theft or technical frauds.

Main steps

Average Leakage
0%

Partner Assurance

The Challenge

Mobile Payments provides a mechanism for conducting financial transactions using a mobile device as an alternative to using cash, cheques or credit cards. The mobile device is linked to a bank account, card account (credit, debit or prepaid) or stored value (e.g., prepaid wallets, online stored value, stored value cards) from which money is deposit or withdrawn. Mobile Money services are extremely attractive to fraudsters and those seeking vehicles for money laundering.

How do we solve this problem?

The iGenuity fraud management solution encompasses monitoring and investigation of subscribers, agents, bank accounts, merchants and geographic regions to identify potential money laundering, commission manipulation, account theft or technical frauds.

Main steps

Average Leakage
0%

Usage Assurance

The Challenge

Mobile Payments provides a mechanism for conducting financial transactions using a mobile device as an alternative to using cash, cheques or credit cards. The mobile device is linked to a bank account, card account (credit, debit or prepaid) or stored value (e.g., prepaid wallets, online stored value, stored value cards) from which money is deposit or withdrawn. Mobile Money services are extremely attractive to fraudsters and those seeking vehicles for money laundering.

How do we solve this problem?

The iGenuity fraud management solution encompasses monitoring and investigation of subscribers, agents, bank accounts, merchants and geographic regions to identify potential money laundering, commission manipulation, account theft or technical frauds.

Main steps

Will iGenuity fit your business?

PBX Hacking

The Challenge

Hackers target PBX networks in ways that can impact the company. Using the PBX, they might place high cost calls, leaving the company to pay the bills. Hackers might steal data or simply render the network unusable.

Our Solution

One of the challenges related to PBX is the diversity of behaviours. They may be operated by small or large companies, those operating for limited hours or 24/7; they may focus on local markets or international; and depending on the nature of the business, the call length and frequency change. The solution learns all these elements of behaviour for each PBX and tracks this behaviour for changes that are indicative of fraud. The behaviour continually evolves with the PBX, but the solution is clever enough to avoid polluting the behaviour with fraudulent call patterns. If desired, fixed thresholds can also be set using the high usage framework. Thresholds can be set for classes of PBX or individual PBX.

Revenue Share Fraud

The Challenge

Fraud Managers recognise the complexity of this fraud type, and know they are ill-equipped to tackle it effectively. Why? Because traditional fraud systems are “rules-based”, and alarms are only generated after the attack has occurred. At Xintec we offer a unique advantage over other fraud detection techniques in that iGenuity actually generates alerts either before or during the early stages of a fraud attack. This is a very key differentiator, as we can now “move the dial” from reactive to predictive fraud detection, saving telcos up to 98% of potential financial losses in a single IRSF case.

How do we solve this problem?

At Xintec we offer a unique advantage over other fraud detection techniques in that iGenuity actually generates alerts either before or during the early stages of a fraud attack. This is a very key differentiator, as we can now “move the dial” from reactive to predictive fraud detection, saving telcos up to 98% of potential financial losses in a single IRSF case.

Roaming Fraud

The Challenge

Roaming fraud is a special case where the victim’s cell phone or stolen SIM cards are used to make highly expensive calls. The key to preventing this is for the telecom operator to detect the fraud very quickly and block the outgoing calls from taking place. However, fraud detection time often takes longer than the exchange of data.

How do we solve this problem?

Roaming fraud is a special case where the victim’s cell phone or stolen SIM cards are used to make highly expensive calls. The key to preventing this is for the telecom operator to detect the fraud very quickly and block the outgoing calls from taking place. However, fraud detection time often takes longer than the exchange of data. The Roaming solution monitors TAP, NRTRDE and (where appropriate) CAMEL CDRs for full outbound roaming visibility. The solution protects against IRSF, Roaming SIM Box (if configured), IMSI spoofing and excessive usage. The solution learns the subscribers individual behaviour and any previous false alerts. This subscriber’s normal behaviour is combined with known risk factors (fraudulent number ranges, multiple concurrent calls and previous fraud cases) to produce high quality alarms with very few false alarms.

SIM box Detection

The Challenge

Fraudsters bypass the mobile network interconnection to direct incoming calls to on-network calls made by a range of SIM cards. This means that on-network calls are generated instead of interconnecting to mobile terminating calls. The revenue lost is the difference between the interconnect termination price and the retail price of mobile on-network calls.

How do we solve this problem?

Our SIM Box detector is a versatile tool for detecting SIM Boxes in CSP networks. Equipped with a powerful rules-based SIM Box profile, it is able to analyze a large number of call records and report suspicious behaviour. Our solution also includes a comprehensive set of built in functions for calculating statistical values and a configuration interface to combine these functions to define SIM Box profiles including; - High volumes of call, (more than 95%) mobile to mobile only with many distinct B numbers - Less than 1% international calls, less than 4% incoming calls and less than 5 distinct locations

Internet of Things

The Challenge

The rapidly growing IoT market is allowing CSP’s to secure steady cash flow with minimal added network infrastructure costs. But this expansion has exposed the telecommunication service providers to new fraud threats. Embedded SIMs if left unattended for long periods, are susceptible to possible tampering. The large number of terminals makes them prone to DoS attacks, or being used to launch such attacks.

How do we solve this problem?

The rapidly growing IoT market is allowing CSP’s to secure steady cash flow with minimal added network infrastructure costs. But this expansion has exposed the telecommunication service providers to new fraud threats. Embedded SIMs if left unattended for long periods, are susceptible to possible tampering. The large number of terminals makes them prone to DoS attacks, or being used to launch such attacks. XINTEC’s iGenuity Fraud Management solution mitigates these risks. The solution has two modules: IoT Known Behaviour module and IoT Unknown Behaviour module. Both these modules are built on XINTEC’s industry proven analytics core and can instantly provide security against IoT threats.

Subscription Fraud

The Challenge

With the proliferation of services, content as well as new devices available to the consumer, consumers are also demanding quicker application responses, and different application mediums, whilst CSP’s need to offer superior capability to differentiate in a very competitive marketplace.

How do we solve this problem?

Our Point-of-Sale (PoS) or Fraud Credit Check (FCC) accepts customer orders for telecommunications product and services, performs a series of checks and provides a decision to the service providers CRM as to whether the application should be accepted, declined or referred. IGenuity can be deployed in-line with the Point-of-Sale process or off-line, assigning a score and deposit to an accepted application. Referred applications are presented to an analyst for manual review. The analyst will either accept or decline the order, assigning an appropriate score and deposit value. FCC is comprised of two groups: Credit Vetting and Fraud Check. The CRM initiates the Credit Vetting and Fraud Check, which completes synchronously as a single step.

Spamming Fraud

The Challenge

Malicious spam text messages (also known as phishing texts or “smishing” – SMS phishing) are tools criminals use to trick users into giving them personal or financial information. As well as often being for the purposes of distributing malware, spam can slow down company networks and overwhelm the email servers of smaller businesses.

How do we solve this problem?

Malicious spam text messages (also known as phishing texts or “smishing” – SMS phishing) are tools criminals use to trick users into giving them personal or financial information. As well as often being for the purposes of distributing malware, spam can slow down company networks and overwhelm the email servers of smaller businesses. The iGenuity SMS spam solution is designed to detect whether SMS messages are spam or not. This is done using both simple and complex algorithms for classification and analysis utilising machine learning techniques that are available to our data scientists.

Mobile Money

The Challenge

Mobile Payments provides a mechanism for conducting financial transactions using a mobile device as an alternative to using cash, cheques or credit cards. The mobile device is linked to a bank account, card account (credit, debit or prepaid) or stored value (e.g., prepaid wallets, online stored value, stored value cards) from which money is deposit or withdrawn. Mobile Money services are extremely attractive to fraudsters and those seeking vehicles for money laundering.

How do we solve this problem?

The iGenuity fraud management solution encompasses monitoring and investigation of subscribers, agents, bank accounts, merchants and geographic regions to identify potential money laundering, commission manipulation, account theft or technical frauds.

Usage Assurance

The Challenge

RA managers have a responsibility to ensure that their subscribers are billed for all the services they consume; and in turn the operator has a responsibility to its subscribers to assure they are only billed for the services they consume.

How do we solve this problem?

Usage Assurance is the principle of comparing two sets of data from different points of the switch to bill chain. Typically, CDRs from a switch are compared with rated CDRs to assure completeness and correctness of the charged units. Our Usage Assurance provides an easily configured Framework to achieve this goal. The framework offers full alerting, reporting and root cause analysis features. A key element of the Framework provides a secondary analysis for auto-handling of typical false alarms such as account changes and time boundary issues.

Partner Assurance

The Challenge

Interconnect partners exchange invoices for the cost of terminating on or routing calls through their network. Payments for these invoices should only be made if they can be verified to be broadly correct. And if they appear to be incorrectly, it is necessary to enact a dispute process to identify the source of the discrepancies.

How do we solve this problem?

Our Partner Assurance module is able to verify invoices against recorded interconnect calls and perform ad-hoc root cause analysis if differences are found. When linked with the Xintec Robotic Process Automation module, the process can be almost entirely automated – only requiring human intervention to review the discrepancy analysis should the need arise.

Balance Movement

The Challenge

The opening and closing balance of a financial system must reconcile to assure revenue is reported correctly. This process is particularly challenging for Mobile-Money Financial Systems and Prepaid systems that process multi-millions of debits and credits per day. The challenge is further compounded in Prepaid systems with the multitude of dedicated accounts (aka wallets).

How do we solve this problem?

We offer a Balance Movement module that can be configured to monitor the opening and closing balance of any financial system. The module reconciles the daily opening and closing balances by applying all credit and debit transactions. The output of the module is a summary report that allows the user to drill-down on any discrepancies to identify the main contributors to an error. The solution also allows for automatic adjustments of time boundary discrepancies that typically plague other solutions.

Platform Assurance

The Challenge

The services a subscriber is eligible to use does not always match with services provisioned for that subscriber in the network. These discrepancies can lead to poor customer experience and lost revenue.

How do we solve this problem?

Our Platform Assurance Framework supports simple configuration of CRM to network element comparisons. The module supports a fully automated working practice, whereby discrepancies are communicated via structured Excel files to the appropriate department. As well as performing the reconciliation, the Platform Assurance Framework tracks discrepancies to ensure they are addressed.

Rating Assurance

The Challenge

Retail Rating is complex, often allowing a single subscriber to enrol for multiple, overlapping offers and rate plans. Independent monitoring of the application of these offers and plans is considered crucial by many operators.

How do we solve this problem?

We offer a full-featured rating/re-rating engine that supports all the features typically found in modern offers and plans (offer hierarchy, shared plans, linked balances, etc). When the output of the Xintec rating is combined with the Usage Audit, the user gains full visibility into rating accuracy and stability.

Financial Forecasting

The Challenge

Predicting the future is difficult, but essential in forecasting revenues and understanding traffic anomalies.

How do we solve this problem?

We offer a Forecasting module that acts in one or both of two modes: Forecasting and Anomaly detection. Forecasting is about predicting something (usually revenue) several steps into the future; Anomaly Detection is a about predicting what will happen next and then comparing what happened with the prediction. Our module supports a range of traditional and Machine Learning forecasting methods allowing the right method to be selected for the right task. Proprietary methods are easily added by the customer, which can be deployed in champion or challenge mode. Anomaly detection can be used stand alone or as an option with Forecasting to assure more stable predictions that smooth out unexpected historic data points.

IFRS Reporting

The Challenge

Mobile Payments provides a mechanism for conducting financial transactions using a mobile device as an alternative to using cash, cheques or credit cards. The mobile device is linked to a bank account, card account (credit, debit or prepaid) or stored value (e.g., prepaid wallets, online stored value, stored value cards) from which money is deposit or withdrawn. Mobile Money services are extremely attractive to fraudsters and those seeking vehicles for money laundering.

How do we solve this problem?

The iGenuity fraud management solution encompasses monitoring and investigation of subscribers, agents, bank accounts, merchants and geographic regions to identify potential money laundering, commission manipulation, account theft or technical frauds.

Invoice Assurance

The Challenge

Validating third-party invoices (e.g. broadband) can be a time-consuming activity, especially when the relationship is relative new or when invoices haven’t been fully validated in the past. It is not unusual for there to be large discrepancies between the partners invoices and the services active for an operator’s subscribers.

How do we solve this problem?

We provide an invoice simulation and reconciliation module that validates third party invoices and identifies individual discrepancies in a way that can be used directly in communication with the partner. Invoices are simulated using the operator’s CRM information and then compared with the partner invoices. Discrepancies are classified (e.g. invoice for terminated subscription, invoice for cancelled order, incorrect invoice amount, invalid line speed, etc) and recorded in Excel format.