Whitepapers

From data-driven insights to best practices around telecom operations, we have got everything covered here.
Resources Center
Casestudy-02
Combating Handset Fraud
Fraud Management

The whitepaper focuses on the sale of handsets/devices, fraud associated with handset sales, and the must-have capabilities in an anti-fraud solution.

Whitepaper-01
Automated contract management – Enhancing profitability and trust
Network Asset Management

This white paper describes how an AI-based contract lifecycle management (CLM) approach can help CSPs mitigate risk, monitor performance, and optimize costs.

Casestudy-01
The 3 strategic pillars to service-based network analytics
Capacity Management

In the white paper, we discuss how domain-driven data science can provide CSPs with more accurate network planning and optimization decisions

Casestudy-01
Leveraging Machine Learning for Scam Detection
Fraud Management

Traditional vs Machine Learning methods of Scam Detection

Whitepaper-01
Usage Data Integrity & Revenue Assurance
Business Assurance

The role of usage data integrity as a key element within an end-to-end revenue assurance framework

Whitepaper-01
Preventing Telecommunication Fraud in Machine-to-machine Communications
Fraud Management

Understand the fraud threats in the M2M market and recommended counter measures

POV_cover-02
Bypass Fraud- Are You Getting It Right?
Fraud Management

Need for integrated hybrid approach to fight Bypass Fraud

Newsletter-01
Leveraging Analytics to Address Five Anomalies to Improve Your Business Performance
Analytics Center of Trust

Learn how anomaly analytics can be extremely useful in improving the bottom line of telecom operators

Whitepaper-02
Interconnect Billing Challenges and Countermeasures
Partner Settlement

Know the generic challenges that telecom operators face as they move to the next gen IP based networks

Whitepaper-01
Preventing Mobile Money Frauds With Appropriate Countermeasures
Fraud Management

Explore and understand the fraud threats in Mobile Money Services

Whitepaper-02
Invoice Verification Through Structured Test Data
Revenue Assurance

An efficient strategy for invoice verifi­cation without the cost and complexity of running a full shadow billing process

POV_cover-02
Combating the Menace of Bypass Fraud
Fraud Management

Different ways to combating Bypass fraud

Get started with Subex
Request Demo Contact Us
Request a demo