FWA (Fixed Wireless Access) as broadband alternative: on the whole few clearly dedicated offers and limited success

Published: 2017-10-19

We expect for the future more LTE data-only price plans with stationary routers for the home (or office), but not necessarily with a clear FWA marketing. So we just expect various data-only price plans with an increasingly large range of various devices to cover various usage scenarios: very small and mobile USB sticks, larger and more performing but still portable routers (so called "pocket&...

Click to read complete overview

Tight competition and regulation limit MVNOs' presence and growth in the Middle East

Published: 2017-10-17

This article explores the presence and development of mobile virtual network operators (MVNOs) in the Middle East between 2014 up to September 2017. In this article, the Middle East region covers the following 16 countries: Bahrain, Egypt, Iran, Iraq, Israel, Jordan, Kuwait, Lebanon, Oman, Palestine, Qatar, Saudi Arabia, Syria, Turkey, United Arab Emirates (UAE) and Yemen. Generally, we observed t...

Click to read complete overview

Encryption and synchronisation options for carrier Ethernet services

Published: 2017-10-11

Overall we expect somewhat more potential for encryption than for synchronisation services. In effect synchronisation does seem for the foreseeable future to be limited mainly to mobile networks; and MNOs tend to realise these aspects themselves. On the other hand, encryption, and basically everything related to security, has a broader appeal in general. Besides, even if much revenue should not be...

Click to read complete overview

DDoS protection: carriers explore network-agnostic anti-DDoS service to tap a wider market

Published: 2017-10-06

DDoS attacks have been increasing, particularly application layer attacks that may not be volumetric in nature but dangerous all the same as these tend to be more difficult to identify than layer 3 or 4 attacks. There is also an increasing trend towards multi-vector attacks – a more sophisticated type of attack that employs tools targeting both layer 3 and 4 networks as well as the applicati...

Click to read complete overview

  • About Us

  • News Room

  • TS&T

  • Partner Events

  • Contact Us

  • Inquire Now

  • SEEQ SIGN IN