Skip to content

Industry News & Thought Leadership

Getting Started with Your Network Authentication Business

Posted by Andi Cook on July 31, 2025 at 4:00 AM

As we discussed in our last blog, the time for Network Authentication is now.

MNOs are the only source for trusted network authentication signals for mobile users, and this data is extremely valuable to enterprises trying to protect their consumers from fraud while not negatively impacting the consumer experience.

So, you’re ready to start monetizing your network data.  Now what?

Looking Beyond CAMARA

GSMA Open Gateway is a global framework of common network APIs that simplifies access to mobile operator networks. The Open Gateway northbound service APIs are defined within the CAMARA project.

CAMARA is an open-source project within the Linux Foundation that defines, develops, and tests telco APIs. It works in close collaboration with the GSMA Operator Platform Group to align API requirements and publish API definitions. 

While this is fantastic, we believe that currently only eight (8) of the “mature” CAMARA APIs are truly stable and know that just having APIs or an open gateway doesn’t deliver a network authentication business.

Beyond the APIs

There are three key elements for a successful network authentication business.

  1. API & Monetization Platform  

The API Platform must allow carriers to manage pricing and access, not just process API calls. Access to the network information must be secure and not expose any PII (personally identifiable information), and the consumption of the information must be vetted and approved.

  1. Network Integration

The API Platform must be securely and precisely integrated into a Carrier API platform and/or network elements, and unnecessary load must not be placed on the network. Only a handful of people worldwide know how to connect to an MNO network.  Our team has decades of experience doing just that, and with a low-code/no-code implementation, you can rest easy knowing that your network team won’t be overtaxed. 

  1. Business Operations

Beyond a platform and integration, there are many other elements. Privacy. Security. Scalability. Data Consumption. Contracts. Aggregators. Pricing. Optimization. Maintenance. 24/7 Operation & Support. Each of these entails complexities, which must be carefully considered and addressed.

A Step Above

While other platforms exist in the market, none include all three elements for success or have the depth of experience in their personnel as we do at Shush.

Shush’s Sherlock platform supports all eight of the mature CAMARA APIs for authentication and fraud which we believe are stable, plus 39 others, including being the first platform to support silent authentication via TS.43 EAP-AKA.

Unlocking the code to TS.43, Sherlock is the first platform to establish a new, necessary standard for API Authentication, allowing WIFI coverage for silent authentication. This is a vast improvement and a significant change for the entire industry.

In addition to this monumental breakthrough, Shush delivers MNOs a “business-in-a-box” by providing and managing all components necessary for a successful and profitable network authentication business.

Shush will work with you to deploy the Sherlock platform without additional equipment and at no cost to you

Our seasoned telecom professionals will work with your existing network and leverage standard protocols to pull the proper network signals for this service, all in compliance with global data regulations. 

We use our 9-point privacy plan to align with you on all aspects of privacy. Our demand partner agreement templates care for the complexities of API transactions and the data exchanged (these are more involved than SMS agreements). We will review and approve use cases for each demand partner to ensure protected access to data for sanctioned use. 

Based on market trends and platform insights, we will provide ongoing recommendations for pricing optimization. We provide continuous maintenance and support for the platform and API traffic, both northbound to demand partners and southbound to your network.  Finally, with a revenue share model, we manage all the operations and send you a monthly check. 

Sounds too good to be true, but it's not!

Ready to get started? Fill out our contact form, email info@shush.pw, or message us on LinkedIn. We look forward to working with you!

Tags: Network Authentication, APIs, Thought Leadership

Age Verify: Ensuring Responsible Access for Everyone

Posted by Shush Marketing on July 21, 2025 at 1:39 PM

Over the past decade, the UK has established itself as a leader in online safety and data protection.  The GDPR (General Data Protection Regulation) is arguably the most comprehensive and influential privacy law focused on online data, with both EU and UK specific regulations, and served as a model for many other data privacy laws worldwide.

As of July 25, 2025, Ofcom, the UK's communications regulator, will commence active enforcement of critical provisions within the Online Safety Act (OSA) with the primary focus being the safeguarding of children. This initiative represents a crucial stride towards holding online platforms responsible for the content disseminated through their services, thereby fostering a more secure online landscape, particularly for younger users.

New regulations require online platforms to implement stricter age verification for content harmful to minors and filter out material promoting self-harm, eating disorders, and suicide. A new code of practice, detailing over 40 safety measures, will also be enforced to protect children.

Stricter age verification practices mean self-declaration of the question, “Are you over 18?” will no longer suffice. Online platforms will need to use trusted data sources for age confirmation without negatively impacting the user journey. 

Enter Age Verify via the Shush Sherlock platform.  

Age Verify uses a consumer’s mobile number to confirm the age of the user against subscriber data from the mobile network operator. 

No personal data is exposed nor stored. No documents required. No friction. Just simple, seamless, silent verification via backend APIs, all in alignment with GDPR, PAS 1296, and the new Children’s Codes. 

According to PricewaterhouseCoopers, the rules affect tens of thousands of businesses of all sizes worldwide, not just those based in the UK1. They provide insights to the regulator’s view and guidance on what companies should do next.

If you are not thinking about using trusted mobile network operator data to solve for the new OSA provisions, it’s time.

References:

1https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/tech-regulatory-policy-developments/uk-online-safety-act.html

2https://www.gov.uk/government/publications/online-safety-act-explainer/online-safety-act-explainer

3https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/roadmap-to-regulation

4https://www.latham.london/2025/06/uk-online-safety-act-summer-2025-deadlines/

Tags: Network Authentication, Industry News and Insights

The Ever-Changing Fraud Landscape, Part 2

Posted by Andi Cook on July 17, 2025 at 5:30 AM

The Value of Network Authentication for Enterprises

As we stated in our last blog post, the fraud landscape is constantly evolving with the increasing sophistication of criminals. This presents ongoing challenges for enterprises to protect their business and customers from nefarious actors.

Tides of Change

Around the world, there is a notable shift happening in how security and authentication are approached. Two-factor authentication has been a leading option to protect accounts for many years. It provides an extra layer of security by requiring users to provide two different forms of identification. This is often a password and a code (OTP or one-time password) sent to a user’s mobile device or email (shudder again!).

While effective for a long time, the tides are changing, and a wave of innovation in authentication is developing to keep pace with evolving threats. This is driven by the need to combat increasingly sophisticated fraud and deliver a more seamless user experience. In some areas of the world, financial institutions are encouraged to eliminate weak authentication methods, including SMS and email one-time passwords.

Security & Authentication

Network authentication via telco APIs becomes increasingly valuable as security and authentication methods change. It provides a more secure means of authentication by verifying user identity through their mobile network. This helps protect accounts from unauthorized access and evolving fraud techniques, safeguarding brands and their reputations in today’s digital world.

Network authentication is a foundational element of mobile operations, acting as a crucial barrier to verifying the identity of users and devices and preventing unauthorized access to a carrier network. Preventing unauthorized access reduces the attack surface and makes it more difficult for cybercriminals to exploit vulnerabilities.

In the interest of fraud prevention, most global regulations allow carriers to expose access to specific network elements for authentication to 3rd party enterprise applications, often with a simple update to privacy language and without explicit user consent. 

The key here is that access to the information must be secure and not expose any PII (personally identifiable information).

Value Beyond Security

Strengthening authentication practices is crucial for brands to ensure robust security and fraud prevention, and demonstrating a strong commitment to user data protection. It's not just about keeping the bad guys out and stopping fraud; it's also about showing customers you care about their data. When people know you're serious about protecting their info, they're more likely to trust you and feel good about sharing things online.

Let’s also discuss account access. Logins should be smooth and easy. Network authentication helps make that happen, providing seamless verification without requiring users to enter PINs or OTPs. Seriously, who has time for clunky logins and OTPs these days when everyone expects things to work instantly? Reducing friction is key to keeping people happy.

So what are you waiting for?

Still on the fence about Network authentication? It's a must-have for any brand wanting to keep things safe—think assets, customer info, the whole shebang. It's your primary defense against fraud; honestly, it makes your customers feel they can trust you. That trust? It builds loyalty. It's a win-win for your brand's good name and keeping people happy.

To learn more about how you can access this powerful data for your fraud prevention practices, fill out our contact form, email info@shush.pw, or message us on LinkedIn

Tags: Network Authentication, APIs, Thought Leadership

The Ever-Changing Fraud Landscape, Part 1

Posted by Andi Cook on July 10, 2025 at 5:00 AM

The Value of Network Authentication for MNOs

Fraud & Cybercrime is the third largest global economy after the US and China. This is mind-blowing!

As we are all painfully aware, the fraud landscape is constantly evolving with increasing sophistication from criminals. This presents ongoing challenges for enterprises to protect their businesses and their customers from nefarious actors. On the flip side, it also opens the door to an opportunity for Mobile Network Operators to help. 

Global Shift

Global SMS revenues are declining, and SMS OTP volumes continue to drop year-over-year, being cannibalized by over-the-top providers (like WhatsApp), authenticator apps, and even email (shudder!). At the same time, fraud continues to rise, and enterprises are looking for more secure authentication methods that address increasingly sophisticated fraud without negatively impacting the customer experience. 

Meanwhile, a shift towards digital identity represents a significant business opportunity for MNOs to re-establish themselves as players within the digital ecosystem.

Where to Start

MNOs are uniquely positioned to provide better fraud prevention alternatives to enterprises, while adding a new revenue stream, but often lack the time, money, people, or market knowledge to deliver a robust network authorization solution.

Additionally, MNOs are unsure where to start with Network APIs. First, let’s define them.

Network APIs allow applications to send requests to network services via predefined endpoints within the network infrastructure to retrieve or manage the requested data, offering seamless integration between different services and applications.

There are only two types of Network APIs.  NaaS APIs used for enhanced communication services like edge computing, network slicing and Network Authentication APIs used for fraud prevention. 

Network Authentication is a Carrier service that passes network signals to Enterprise applications so they can assess whether a user still has control over their device. These unique and differentiated network signals include Silent Authentication, SIM Swap, Roaming, Port-Out, Device Status, and Account Status indicators. Enterprises that receive these real-time values then independently assess the risk of letting a user into a digital account. Major US Banks have been using Network Authentication services for years at scale to thwart mobile fraud.

The Time is Now for Network Authentication APIs

Market studies show that the value of network APIs will reach US$34 billion by 2030, with nearly half being attributed to Subscriber Identity (Network Auth) APIs. Network API monetization forecast 2024

In the short term, network authentication APIs capture 97% of the current $12B+ API market opportunity.

Current API market opportunity $12.6B

The market exists today for Network Auth APIs, while other API markets are still under construction. NaaS APIs (like QoD) are in the nascent stages of commercial availability and market adoption. 

Network API family maturity

Of course, there is value in NaaS APIs, but the time is now for Network Authentication. 

Are you unsure how to get started?  We’d be happy to help. Fill out our contact form, email info@shush.pw, or message us on LinkedIn

Tags: Network Authentication, APIs, Thought Leadership

CPAAS Acceleration Alliance interview with Shush CEO, Eddie DeCurtis, re Sherlock TS.43 support announcement

Posted by Shush Marketing on April 23, 2025 at 8:30 AM

After our press release yesterday publicizing that Shush Sherlock now supports GSMA TS.43 standard, our CEO, Eddie DeCurtis, sat down with Rob Kurver from CPAAS Acceleration Alliance to talk about this monumental step for silent, simple, seamless authentication.

Eddie talks about what it is, why it matters, and how MNOs can begin monetizing authentication and increase relevance in the identity verification space.

Read the full interview here.

CPaaS Acceleration Alliance - Accelerating Growth and Adoption of  Communications PlatformsGSMA logo.JPG

Tags: Industry News and Insights, Shush news

Shush Inc.’s Sherlock Platform now supports TS.43-compliant Silent Authentication via EAP-AKA

Posted by Shush Marketing on April 22, 2025 at 8:11 AM

Setting a New Benchmark: Sherlock Unlocks Ubiquitous, Silent Authentication for the Mobile Ecosystem.


"Network Authentication via TS.43 Rel.11 Entitlement Server
has the potential to be a game-changer for the mobile industry,
offering unmatched security and flexibility.” 


— Henry Calvert, GSMA Head of Network

DALLAS, TEXAS, APRIL 22, 2025 – Shush Inc. is thrilled to announce that its flagship platform, Sherlock, now supports Silent Authentication using EAP-AKA, adhering to the GSMA’s TS.43 Release 11 standard for Network Authentication. This breakthrough enables seamless and secure device authentication with ubiquitous performance across Wi-Fi, cellular networks, Apps, and browsers, setting a new benchmark for Mobile Network Operators (MNOs) and third-party applications.

The TS.43 Release 11 standard outlines the technical framework for Network Authentication, but MNOs have questioned how to monetize this capability. Shush provides a clear answer by enabling carriers to integrate to Sherlock’s Authentication Server, which supports EAP-AKA for third-party apps. This allows MNOs to offer secure, scalable, and ubiquitous authentication services for any mobile use case, creating new revenue streams while enhancing user trust and experience.

"Network Authentication via TS.43 Rel.11 Entitlement Server has the potential to be a game-changer for the mobile industry, offering unmatched security and flexibility,” said Henry Calvert, Head of Network at GSMA. “Shush’s Sherlock platform demonstrates how carriers can practically implement and monetize their authentication services using this standard, driving value for operators and confidence for customers.”

How Sherlock Works  
Sherlock leverages the EAP-AKA protocol and the integrated Sherlock Authentication Server to authenticate devices silently, without user intervention.  When a device connects via Wi-Fi or cellular, regardless of source - whether on App or through a browser - it communicates with the carrier’s TS.43-compliant Authentication Server through the SIM card on the user’s device. The server verifies the device’s identity using the SIM card’s cryptographic credentials, ensuring robust security.  By eliminating the need for off-device authentication methods like SMS-OTP or the current best-in-class IP-based matching, this process delivers a frictionless experience across all environments.

“Sherlock redefines device authentication by making it simple, seamless, silent, and universally accessible,” said Eddie DeCurtis, CEO and Co-Founder of Shush. “Our platform empowers carriers to unlock the full potential of TS.43, turning authentication into a strategic, fully monetized asset.”

“Implementing EAP-AKA within Sherlock was a technical leap forward,” added Wesam Qaqish, CTO of Shush. “Our solution ensures carriers and third-party Apps can rely on a single, future-proof authentication standard that works everywhere.”

About Shush Inc.
Shush Inc. is a trailblazer in Network Authentication solutions, dedicated to transforming convenience and reliability in the industry. With a strong focus on innovation, Shush Inc. delivers seamlessly integrated, cutting-edge authentication solutions tailored for Mobile Network Operators to meet the dynamic needs of modern enterprises, ensuring security and efficiency in every connection.

Daryl Carlough
Shush Inc.
+1 6173204863
email us here
Visit us on social media:
X
LinkedIn

 

Tags: Press Release

Open Letter to Telecommunications Industry

Posted by Eddie DeCurtis on April 17, 2025 at 12:56 PM

 

Dear Colleagues in the Telecommunications Industry,

The telecommunications landscape continues evolving after the “launch” of RCS and the continued interest in Network APIs. We must recognize and capitalize on the rapidly expanding opportunities before us as industry leaders. According to recent research from S&P Global, the market for network authentication is currently valued at $12.6 billion in 2024. This presents a significant window for mobile network operators (MNOs) to enhance their revenue streams, particularly by leveraging Anti-Fraud APIs, which account for the lion's share of this opportunity—97% of revenue in the S&P Global Market Intelligence Report.

However, the current state of Network API readiness shows that we are not moving fast enough. Only 5% of MNOs worldwide have partially deployed network APIs. While the other 95% would like to deploy Network APIs to the market, MNOs are being led to believe they need to prioritize 5G network infrastructure investments, thus delaying ROI for years. Much of this delay can be attributed to pressure applied by the OEM to purchase additional network components that are unnecessary for deploying Anti-Fraud Network APIs.

The GSMA has been leading the standardization of APIs and bringing the MNOs and industry together, but these efforts are insufficient to address MNOs' hesitation. This lack of action, at no fault of the MNOs, is causing an imbalance of supply and demand as brands, financial institutions, and enterprise developers are clamoring for Network APIs to secure their mobile-first brand experiences.

At Shush, our concern is that without some dramatic change, Network APIs will follow the slow and lackluster growth of RCS over the last few years.

Those who do not learn from the past are doomed to repeat it. The industry can look back at the missteps in the much-delayed adoption of RCS. The delayed adoption of RCS offers a valuable lesson for the telecom industry. RCS was poised to revolutionize messaging but was held back by slow carrier rollouts, inconsistent global support, and a fragmented approach to implementation. These missteps allowed over-the-top (OTT) messaging platforms like WhatsApp and Facebook Messenger to dominate the market. MNO suffered from this by purchasing new equipment to support P2P/A2P RCS with no business case.

At Shush, we know that MNOs already have the infrastructure required to start monetizing Network APIs if the correct APIs are prioritized. Two types of Network APIs are available today - Anti-Fraud APIs (which we call Network Authentication APIs) and NaaS (Network-as-a-Service) APIs like MEC, Network Slicing, QoS, and QoD.  The following three points need to be considered by all MNOs planning next steps with Network Authentication APIs.

  • Revenue Opportunities. S&P Global Market Intelligence has published a study that shows 97% of current Revenues from Network APIs come from Anti-Fraud APIs, while only 3% are from NaaS APIs.
  • Purchase Additional Network Equipment.  Exposing Anti-Fraud APIs to the market requires no new Network Elements, while NaaS APIs require several new, expensive Network Elements. Industry estimates suggest that Mobile Network Carriers must invest an additional $40 billion in new equipment and software to implement Network-as-a-Service (NaaS) solutions.
  • Time to Market.  Carriers can start exposing Anti-Fraud APIs quickly since no additional network elements are needed, while Carriers will have to wait 18 months to 2 years before delivering NaaS APIs if not already installed.

Shush is bullish on Network APIs as we focus only on Anti-Fraud APIs for Mobile Network Operators, which are directly linked to revenue and require no additional network investment.  

Furthermore, Shush brings the other three elements an MNO needs to be successful in the space: (1) a Monetization Platform, (2) Integration services from your network to the Monetization Platform, and (3) Business Operations that care for Privacy, limits liability, pricing guidance for the APIs, and contractual experience to connect to the Demand ecosystem. These three elements make up the core foundation of a Network Authentication business - not just another OEM box. At Shush, we are dedicated to building a successful Network Authentication business for each of our MNO clients. 

The time to act is now. By embracing the next generation of network authentication solutions, we can lead the charge toward a more secure, efficient, and profitable future.

I welcome the opportunity to discuss this in greater detail and explore how Shush Inc. can partner with your organization to drive this innovation forward.

Sincerely,
Eddie DeCurtis
Co-Founder & CEO, Shush Inc.

 

Supporting Data from S&P Global Market Intelligence

 

Tags: Thought Leadership

Shush Closes Oversubscribed $3 Million Seed Round, Poised for Global Growth

Posted by Shush Marketing on April 17, 2025 at 12:55 PM

Funding to Propel Innovation and Expand Global Footprint in Network Authentication


"The successful close of this seed round highlights our strong
business model, unique value, and investor confidence. Funding
enables rapid scaling, growth, and innovation in Network
Authentication.”

— Daryl Carlough, Co-Founder & CFO

DALLAS, TX, UNITED STATES, December 19, 2024 /EINPresswire.com/ -- Shush Inc., a leader in Network Authentication solutions, is proud to announce the completion of its $3 million oversubscribed seed round. Amid growing global demand for secure and scalable authentication, this funding marks a pivotal moment in the company’s journey toward transformative growth. The milestone underscores Shush’s dedication to innovation and the strong backing of a diverse group of investors aligned with its vision for the future of authentication.

Building on the momentum of its pre-seed funding success, Shush Inc. has shattered expectations by securing an impressive $3 million through a Simple Agreement for Future Equity (SAFE). The seed round was oversubscribed, indicating strong investor confidence in Shush Inc.'s vision and capabilities. Shush’s strong 2025 sales pipeline includes over 50 MNOs across five continents. This robust global interest underscores the growing demand for scalable Network Authentication solutions and positions Shush for significant market impact in the coming year. "This seed round marks a significant milestone for Shush Inc., especially in a climate where startups have faced unprecedented challenges in securing funding over the past few years," said Eddie DeCurtis, Co-Founder & CEO of Shush Inc. "Successfully closing this round is a testament to the strength of our vision, the dedication of our team, and the growing market demand for innovative solutions in the Network Authentication space. With this additional funding, we are well-positioned to accelerate our growth trajectory, expand our reach, and further solidify our position as leaders in this critical and rapidly evolving sector."

Daryl Carlough, Co-Founder & CFO of Shush Inc., emphasized the strategic significance of the seed round and its role in the company’s long-term vision. “The successful closure of this oversubscribed seed round is a testament to the strength of our business model, the unique value we bring to MNOs, and the confidence our investors have in our ability to execute,” said Carlough. “This funding positions us to scale rapidly, expand our global reach, and drive innovation in the Network Authentication space. With a strong sales pipeline and a clear path to delivering results, we’re ready to take Shush to the next level and redefine how network attributes unlock new revenue streams for MNOs.”

Shush Inc. continues to lead the adoption of the Network Authentication industry by offering Sherlock to global MNOs. Sherlock uniquely utilizes current network infrastructure to unlock the revenue of Network Authentication Attributes. “No other solution in the industry has been architected to leverage any cloud or core network infrastructure implemented by MNOs,” says Wesam Qaqish, Chief Technology Officer of Shush.

Shush Inc. is setting new standards in the Network Authentication industry with a focus on providing a holistic business approach for our Carrier Partners. “Shush comes to Carrier Partners with a ‘Business-in-a-Box’ that provides the right technical platform, the right integration capabilities, and the right business capabilities to enable them to quickly enter this burgeoning market. ,” said Jon Morrow, Chief Product Officer at Shush Inc.

With the completion of its seed round, Shush Inc. is well-positioned for rapid growth and continued industry leadership We invite MNOs and industry leaders to meet with us at Mobile World Congress 2025 to explore how Shush can transform network authentication and drive new revenue opportunities.

Shush Inc. invites organizations to collaborate and explore cutting-edge solutions that redefine network authentication and security.

About Shush Inc.:
Shush Inc. is a leading provider of Network Authentication solutions, committed to redefining convenience and reliability in the industry. With a focus on Mobile Identity and a dedication to innovation, Shush Inc. offers seamlessly integrated solutions designed to meet the evolving needs of modern enterprises.

Daryl Carlough
Shush Inc.
+1 6173204863
email us here
Visit us on social media:
X
LinkedIn

 

Tags: Press Release

Shush Inc.  Attains Six GSMA CAMARA Fraud Prevention Certifications

Posted by Shush Marketing on March 3, 2025 at 2:26 AM

FOR IMMEDIATE RELEASE

Shush Inc.  Attains Six GSMA CAMARA Fraud Prevention Certifications

Setting a New Standard in Mobile Security with Industry-Leading Fraud Prevention Solutions

BARCELONA SPAIN MARCH 3rd 2025 – Shush Inc., a leader in Network Authentication solutions, proudly announces that it has achieved six GSMA CAMARA API certifications for fraud prevention. Setting a new industry benchmark in mobile authentication and security, the company has been certified for the following APIs:

  • Number Verification
  • Device Reachability Status
  • Device Roaming Status
  • SIM Swap
  • Device Location Verification, and
  • Device Location Retrieval

GSMA Open Gateway and CAMARA, global initiatives focused on API standardization and interoperability for mobile network services, are key enablers for enterprises seeking secure and seamless authentication solutions. Shush Inc.’s achievement underscores its commitment to innovation, security, and reliability in the rapidly evolving digital landscape.

Beyond GSMA Open Gateway CAMARA certifications, Shush Inc. further distinguishes itself by offering an additional 37 API signals, expanding authentication capabilities, and reinforcing its position as a trailblazer in network security and fraud prevention. These advanced API signals enhance verification processes and provide enterprises unparalleled authentication reliability, ensuring optimal security in mobile interactions. Shush Inc. can onboard a mobile network operator within 90 days of signing, leveraging GSMA Open Gateway CAMARA certifications to streamline integration.

“This achievement solidifies Shush Inc.’s role as a pioneer and leader in network authentication,” said Eddie DeCurtis, Co-Founder & CEO at Shush Inc. “By obtaining six GSMA Open Gateway CAMARA certifications for fraud prevention APIs and offering an extensive suite of API signals, we are empowering Mobile Network Operators and enterprises with the most advanced and secure authentication solutions available today.”

“We congratulate Shush Inc. on achieving six GSMA CAMARA API certifications to improve fraud prevention,” said Henry Calvert, Head of Network at GSMA. “This milestone demonstrates their commitment to advancing authentication and security standards in the mobile ecosystem. By leveraging the GSMA Open Gateway initiative and CAMARA APIs, Shush Inc. is helping drive interoperability and trust for Mobile Network Operators, enterprises and consumers worldwide.”

About Shush Inc.

Shush Inc. is a trailblazer in Network Authentication solutions, dedicated to transforming convenience and reliability in the industry. With a strong focus on innovation, Shush Inc. delivers seamlessly integrated, cutting-edge authentication solutions tailored for Mobile Network Operators to meet the dynamic needs of modern enterprises, ensuring security and efficiency in every connection.

For media inquiries, please contact:
Daryl Carlough
Shush Inc.
+1 617-320-4863
info@shush.pw
https://shush.pw/

 

 

Tags: Press Release

Shush Inc. Achieves SOC 2 Compliance, Demonstrating Commitment to Security and Privacy

Posted by Shush Marketing on January 25, 2025 at 9:59 AM

DALLAS, TX, UNITED STATES, January 20, 2025 /EINPresswire.com/ -- Shush Inc., a leading innovator in secure communications technology, proudly announces the successful completion of its first System and Organization Controls (SOC) 2 examination. Conducted by AssuranceLab CPAs LLC, the report confirms that Shush Inc. has implemented effective controls to meet the security, availability, processing integrity, confidentiality, and privacy criteria established by the American Institute of CPAs (AICPA).

“We are thrilled to announce that Shush Inc. has achieved SOC 2 compliance,” said Eddie DeCurtis, CEO of Shush Inc. “This milestone is a testament to our unwavering commitment to providing our clients with a platform that ensures the highest levels of security and trust. As the demand for secure communication grows, this certification reinforces our dedication to safeguarding sensitive information.”
The SOC 2 examination assures current and prospective clients that Shush Inc.'s internal controls over its secure communications platform are effective. Achieving this compliance demonstrates the company’s ability to mitigate risks and adhere to best practices in handling data securely and responsibly.

"Achieving SOC 2 compliance is a major milestone, said Daryl Carlough, CFO of Shush Inc. It underscores our commitment and positions us as a trusted partner for secure communication solutions.”
— Daryl Carlough, Co-Founder & CFO
Daryl Carlough, Shush CFO and Co-Founder, black and white
Daryl Carlough, Shush CFO and Co-Founder, 

“Achieving SOC 2 compliance is a significant step for Shush Inc.,” added Daryl Carlough, CFO of Shush Inc. “It underscores our commitment to operational excellence and positions us as a trusted partner for businesses seeking secure communication solutions. This achievement reflects the robust systems we’ve built and highlights our dedication to maintaining the highest standards in protecting our clients' data.”

“As the technological backbone of Shush Inc., we’ve invested heavily in creating a secure and scalable platform to meet our clients' needs,” said Wesam Qaqish, CTO of Shush Inc. “SOC 2 compliance validates our efforts and highlights our commitment to delivering innovative solutions that prioritize security and reliability at every level.”

Shush Inc. achieved compliance with the following trust services criteria:
● Security: Protection against unauthorized access, ensuring systems are secure from potential threats.
● Availability: Assurance that the system is operational and accessible as agreed.
● Processing Integrity: Validation that system processes are accurate, complete, and authorized.
● Confidentiality: Commitment to safeguarding information designated as confidential.
● Privacy: Adherence to principles governing the use and protection of personal information.

A SOC 2 report provides valuable information for clients to assess and address the risks associated with partnering with a service organization. For current and prospective clients interested in obtaining a copy of Shush Inc.’s SOC 2 report, please email us.

About Shush Inc.
Shush Inc. is a trailblazer in Network Authentication solutions and is dedicated to transforming convenience and reliability in the industry. With a strong focus on innovation, Shush Inc. delivers seamlessly integrated, cutting-edge authentication solutions tailored for the Mobile Network Operators to meet the dynamic needs of modern enterprises, ensuring security and efficiency in every connection.

Daryl Carlough
Shush Inc.
+1 6173204863

Tags: Press Release