Skip to content

Shush Blog

Shush Closes Oversubscribed $3 Million Seed Round, Poised for Global Growth

Posted by David Galante on December 19, 2024 at 8:00 AM

Funding to Propel Innovation and Expand Global Footprint in Network Authentication


"The successful close of this seed round highlights our strong
business model, unique value, and investor confidence. Funding
enables rapid scaling, growth, and innovation in Network
Authentication.”

— Daryl Carlough, Co-Founder & CFO

DALLAS, TX, UNITED STATES, December 19, 2024 /EINPresswire.com/ -- Shush Inc., a leader in Network Authentication solutions, is proud to announce the completion of its $3 million oversubscribed seed round. Amid growing global demand for secure and scalable authentication, this funding marks a pivotal moment in the company’s journey toward transformative growth. The milestone underscores Shush’s dedication to innovation and the strong backing of a diverse group of investors aligned with its vision for the future of authentication.

Building on the momentum of its pre-seed funding success, Shush Inc. has shattered expectations by securing an impressive $3 million through a Simple Agreement for Future Equity (SAFE). The seed round was oversubscribed, indicating strong investor confidence in Shush Inc.'s vision and capabilities. Shush’s strong 2025 sales pipeline includes over 50 MNOs across five continents. This robust global interest underscores the growing demand for scalable Network Authentication solutions and positions Shush for significant market impact in the coming year. "This seed round marks a significant milestone for Shush Inc., especially in a climate where startups have faced unprecedented challenges in securing funding over the past few years," said Eddie DeCurtis, Co-Founder & CEO of Shush Inc. "Successfully closing this round is a testament to the strength of our vision, the dedication of our team, and the growing market demand for innovative solutions in the Network Authentication space. With this additional funding, we are well-positioned to accelerate our growth trajectory, expand our reach, and further solidify our position as leaders in this critical and rapidly evolving sector."

Daryl Carlough, Co-Founder & CFO of Shush Inc., emphasized the strategic significance of the seed round and its role in the company’s long-term vision. “The successful closure of this oversubscribed seed round is a testament to the strength of our business model, the unique value we bring to MNOs, and the confidence our investors have in our ability to execute,” said Carlough. “This funding positions us to scale rapidly, expand our global reach, and drive innovation in the Network Authentication space. With a strong sales pipeline and a clear path to delivering results, we’re ready to take Shush to the next level and redefine how network attributes unlock new revenue streams for MNOs.”

Shush Inc. continues to lead the adoption of the Network Authentication industry by offering Sherlock to global MNOs. Sherlock uniquely utilizes current network infrastructure to unlock the revenue of Network Authentication Attributes. “No other solution in the industry has been architected to leverage any cloud or core network infrastructure implemented by MNOs,” says Wesam Qaqish, Chief Technology Officer of Shush.

Shush Inc. is setting new standards in the Network Authentication industry with a focus on providing a holistic business approach for our Carrier Partners. “Shush comes to Carrier Partners with a ‘Business-in-a-Box’ that provides the right technical platform, the right integration capabilities, and the right business capabilities to enable them to quickly enter this burgeoning market. ,” said Jon Morrow, Chief Product Officer at Shush Inc.

With the completion of its seed round, Shush Inc. is well-positioned for rapid growth and continued industry leadership We invite MNOs and industry leaders to meet with us at Mobile World Congress 2025 to explore how Shush can transform network authentication and drive new revenue opportunities.

Shush Inc. invites organizations to collaborate and explore cutting-edge solutions that redefine network authentication and security.

About Shush Inc.:
Shush Inc. is a leading provider of Network Authentication solutions, committed to redefining convenience and reliability in the industry. With a focus on Mobile Identity and a dedication to innovation, Shush Inc. offers seamlessly integrated solutions designed to meet the evolving needs of modern enterprises.

Daryl Carlough
Shush Inc.
+1 6173204863
email us here
Visit us on social media:
X
LinkedIn

 

Tags: Press Release

Open Letter to Telecommunications Industry

Posted by Eddie DeCurtis on December 3, 2024 at 7:45 AM

 

Dear Colleagues in the Telecommunications Industry,

The telecommunications landscape continues evolving after the “launch” of RCS and the continued interest in Network APIs. We must recognize and capitalize on the rapidly expanding opportunities before us as industry leaders. According to recent research from S&P Global, the market for network authentication is currently valued at $12.6 billion in 2024. This presents a significant window for mobile network operators (MNOs) to enhance their revenue streams, particularly by leveraging Anti-Fraud APIs, which account for the lion's share of this opportunity—97% of revenue in the S&P Global Market Intelligence Report.

However, the current state of Network API readiness shows that we are not moving fast enough. Only 5% of MNOs worldwide have partially deployed network APIs. While the other 95% would like to deploy Network APIs to the market, MNOs are being led to believe they need to prioritize 5G network infrastructure investments, thus delaying ROI for years. Much of this delay can be attributed to pressure applied by the OEM to purchase additional network components that are unnecessary for deploying Anti-Fraud Network APIs.

The GSMA has been leading the standardization of APIs and bringing the MNOs and industry together, but these efforts are insufficient to address MNOs' hesitation. This lack of action, at no fault of the MNOs, is causing an imbalance of supply and demand as brands, financial institutions, and enterprise developers are clamoring for Network APIs to secure their mobile-first brand experiences.

At Shush, our concern is that without some dramatic change, Network APIs will follow the slow and lackluster growth of RCS over the last few years.

Those who do not learn from the past are doomed to repeat it. The industry can look back at the missteps in the much-delayed adoption of RCS. The delayed adoption of RCS offers a valuable lesson for the telecom industry. RCS was poised to revolutionize messaging but was held back by slow carrier rollouts, inconsistent global support, and a fragmented approach to implementation. These missteps allowed over-the-top (OTT) messaging platforms like WhatsApp and Facebook Messenger to dominate the market. MNO suffered from this by purchasing new equipment to support P2P/A2P RCS with no business case.

At Shush, we know that MNOs already have the infrastructure required to start monetizing Network APIs if the correct APIs are prioritized. Two types of Network APIs are available today - Anti-Fraud APIs (which we call Network Authentication APIs) and NaaS (Network-as-a-Service) APIs like MEC, Network Slicing, QoS, and QoD.  The following three points need to be considered by all MNOs planning next steps with Network Authentication APIs.

  • Revenue Opportunities. S&P Global Market Intelligence has published a study that shows 97% of current Revenues from Network APIs come from Anti-Fraud APIs, while only 3% are from NaaS APIs.
  • Purchase Additional Network Equipment.  Exposing Anti-Fraud APIs to the market requires no new Network Elements, while NaaS APIs require several new, expensive Network Elements. Industry estimates suggest that Mobile Network Carriers must invest an additional $40 billion in new equipment and software to implement Network-as-a-Service (NaaS) solutions.
  • Time to Market.  Carriers can start exposing Anti-Fraud APIs quickly since no additional network elements are needed, while Carriers will have to wait 18 months to 2 years before delivering NaaS APIs if not already installed.

Shush is bullish on Network APIs as we focus only on Anti-Fraud APIs for Mobile Network Operators, which are directly linked to revenue and require no additional network investment.  

Furthermore, Shush brings the other three elements an MNO needs to be successful in the space: (1) a Monetization Platform, (2) Integration services from your network to the Monetization Platform, and (3) Business Operations that care for Privacy, limits liability, pricing guidance for the APIs, and contractual experience to connect to the Demand ecosystem. These three elements make up the core foundation of a Network Authentication business - not just another OEM box. At Shush, we are dedicated to building a successful Network Authentication business for each of our MNO clients. 

The time to act is now. By embracing the next generation of network authentication solutions, we can lead the charge toward a more secure, efficient, and profitable future.

I welcome the opportunity to discuss this in greater detail and explore how Shush Inc. can partner with your organization to drive this innovation forward.

Sincerely,
Eddie DeCurtis
Co-Founder & CEO, Shush Inc.

 

Supporting Data from S&P Global Market Intelligence

 

Tags: Blog Post

Competitive Carriers Association (CCA) and ClearSky Technologies Launch Network API Authentication Hub for Member Carriers

Posted by David Galante on November 12, 2024 at 1:46 PM

Washington, DC, - ClearSky Technologies, a leading provider of mobile data services and solutions, and Competitive Carriers Association (CCA), representing nearly 60 regional and rural communications providers, are pleased to announce the launch of Silent Network Authentication Platform (SNAP). This innovative solution is set to enhance the security and efficiency of authentication for CCA members, enabling a more seamless and reliable network experience for millions of wireless users across the United States.

In cooperation with its technology partner, Shush Inc, ClearSky has successfully deployed its Network Authentication solution in a US data center, offering a robust, scalable solution for carriers looking to improve the wireless user authentication process in mobile applications. SNAP operates as a cloud service for the exclusive use of CPaaS providers and enterprise customers, such as banks and insurance companies, who are committed to decreasing mobile fraud.

“We’re glad to partner with ClearSky, a long-time CCA member, on this service which can help carriers meet the increasing demand for secure network solutions,” said Tim Donovan, President and CEO of CCA. “CCA is committed to staying at the forefront of mobile security for the benefit of our members and the customers they serve.”

“ClearSky's SNAP technology is designed to provide a superior authentication solution that is easy to implement and highly secure,” said Ron Willett, Vice President and General Manager at ClearSky Technologies. “We are thrilled to partner with CCA to offer this platform to CCA members. In so doing, CCA members will deliver this best-in-class security solution to their subscribers on par with Tier1 Mobile Network Operators (MNOs) in the US.”

ClearSky, in partnership with Shush Inc, continues to add value to the CCA community in multiple ways. “The Shush/ClearSky platform is fully operational thus ensuring fast and efficient carrier implementations. “said Eddie DeCurtis, CEO of Shush Inc. “This approach ensures that carriers can deploy network authentication APIs within 90 days of contract using existing infrastructure. This go-to-market partnership accelerates revenue to participating carriers due to the high demand of network attributes.”

Henry Calvert, Head of Networks from GSMA, said: “We congratulate the CCA, ClearSky and Shush for their successful launch of Network API Authentication Hub and SNAP. This achievement will further accelerate the industry adoption of CAMARA APIs and the best practices set forth by the GSMA Open Gateway framework. This provides the Mobile Network Operator community with a simplified approach to launching fully compliant CAMARA network APIs, exposing network capabilities and context in a simple and flexible way for enterprise developers to increase reliability and security of their products.”

###

 About Competitive Carriers Association (CCA)

Competitive Carriers Association (CCA) is the leading association for competitive communications service providers and stakeholders across the United States. Members range from small, rural carriers serving fewer than 5,000 customers to regional and nationwide providers serving millions, as well as vendors and suppliers delivering products and services throughout the communications ecosystem.

About ClearSky Technologies

ClearSky Technologies has been providing cutting-edge wireless technology solutions to mobile network operators for more than two decades. Their specialized portfolio includes Silent Network Authentication Platform (SNAP) which provides seamless, secure authentication for mobile users, Total Traffic Manager (TTM™) solution for data traffic and policy management, and iCODE®, their leading A2P messaging service. All of ClearSky’s solutions are offered “as a service” and require little or no capital investment. Headquartered in Orlando, Florida, ClearSky serves over 100 mobile network operators globally, along with many other channel partners, network operators, and wireless providers. ClearSky addresses complex telecommunications issues with comprehensive, cost-effective solutions, combining cloud-based components with local infrastructure to ensure efficiency and reliability. Their commitment to innovation and ethical business practices has made them a trusted and integral partner in the industry. For media inquiries, please contact: info@csky.com

About Shush Inc.:
Shush Inc. is a leading provider of Network Authentication solutions, dedicated to redefining convenience and reliability in the industry. With a focus on innovative authentication processes, Shush Inc. empowers Mobile Network Operators with robust Network Authentication solutions tailored to meet their unique needs. For media inquiries, please contact: 
media@shush.pw

Tags: Network Authentication, Press Release

What’s Next: The Future of Network Authentication and Mobile Identity — An Exclusive Interview with Eddie, CEO of Shush

Posted by Shush Marketing on September 23, 2024 at 4:58 PM

Find the original post on Medium  by  Jason Malki

I had the pleasure of interviewing Eddie, a seasoned executive with over 30 years of experience driving growth and innovation in the technology and telecommunications industries. He is currently the Co-Founder and CEO of Shush, which is revolutionizing network authentication. Shush partners with mobile network operators (MNOs) around the world to reduce mobile fraud. Sherlock is Shush’s cloud-based solution, which unlocks additional revenue for MNOs by facilitating network authentication transactions.

Prior to Shush, Eddie served as Regional CEO — Americas for Sekura.id, where he led the company’s expansion in the Americas and Asia regions. Eddie has a proven track record of success in sales, business development, and strategic planning. He has held senior leadership positions at Mavenir, LivePerson, and Tyntec, where he consistently delivered results and exceeded expectations. Throughout his career, Eddie has demonstrated a deep understanding of the market, a passion for technology, and a commitment to building strong relationships with customers and partners.

What motivated you to launch your startup?

When I was the Regional CEO at Sekura, I was responsible for the Americas and Asia, and I was speaking to mobile network operators all over the world. They were all saying the same thing: “We want to do network authentication. We have no idea how to do network authentication. We have no money to buy a platform to do network authentication, and we don’t know where to start….” So, I took this feedback to my Group CEO and was told that we, Sekura, only buy network data from mobile network operators after they launch the service. To which I said, “What are you buying if they have nothing to sell?”

At that point, I realized there was a problem in an industry that, according to McKinsey, has a $300B TAM. Also, A2P SMS OTP is currently a $19B business, and network authentication is projected to be 10 times that. After speaking to some mentors and realizing that network authentication services don’t have a demand problem (banks, fintechs), but rather a supply problem, I understood the opportunity. There are currently 1,000+ mobile network operators globally, and fewer than 100 have launched the service. In reality, that number is closer to 27.

At this point, I called my co-founder, and we launched the company.

What excites you about what you’re building?

Great question. I guess what really excites me about what we are building at Shush is that it’s a solution that is wanted, needed, and no one else saw this huge missing piece in the network authentication ecosystem.

What has been your biggest challenge in growing your startup?

Besides raising capital? Finding the right team members to take my vision from a thought to reality. You can always find smart people, but they need to fit the culture and drive, etc.

What are your future plans for your startup?

Build the leading mobile network authentication solution for mobile network operators. If we do that, then we have succeeded.

If you had to share “words of wisdom” with a founder who’s about to start their own startup, what would they be?

Talk to everyone, run your idea by them, and don’t worry about them “stealing your idea.” Get as much feedback as you can, and if your idea passes the smell test, then do it with as much passion as you can muster.

How can our readers follow you on social media?

Sure, on linked in www.linkedin.com/edecurtis on twitter/x @edecurtis and you can follow Shush on both LinkedIn / Shush-inc and on Twitter/X @ShushSherlock

Tags: Blog Post

Shush Inc signs GSMA Open Gateway MOU to become Channel Partner and Accelerate Innovation in Network Authentication

Posted by David Galante on August 28, 2024 at 9:57 AM

Pioneering Network Security with GSMA Open Gateway for API Innovation

DALLAS, TX, August 27, 2024 – Shush Inc., a leading provider of innovative Network Authentication solutions, is proud to announce its membership with the GSMA, a global organization dedicated to unifying the mobile ecosystem and driving innovation for positive business environments and societal change. Shush has solidified its work with the GSMA by signing an MOU to become a GSMA Open Gateway channel partnership. This agreement positions Shush as an industry leading solution to all Mobile Network Operators consulting with the GSMA for strategic direction.

The GSMA represents mobile operators and organizations across the mobile ecosystem and adjacent industries. Its vision is to unlock the full power of connectivity for the benefit of people, industry, and society. Through its Connectivity for Good, Industry Services and Solutions, and Outreach initiatives, the GSMA advances policy, addresses societal challenges, and promotes technology interoperability to ensure the mobile ecosystem thrives.

As a member of GSMA, Shush Inc. will contribute to advancing innovation and shaping the future of Network Authentication. By collaborating with industry leaders and participating in GSMA's initiatives and events, Shush Inc. aims to leverage its expertise in Network Authentication to drive positive impact and foster growth in the mobile ecosystem. Shush's Sherlock offering is both CAMARA and shortly anticipate being Open Gateway compliant, aligning with industry standards to ensure seamless integration and interoperability. 

"We are beyond thrilled to join the GSMA and actively contribute to its mission of unlocking the full potential of Network Authentication," said Eddie DeCurtis, Co-Founder & CEO of Shush Inc. "Our membership in the GSMA provides us with a unique opportunity to collaborate with industry leaders at the cutting edge of mobile technology. We are eager to harness our advanced Network Authentication solutions to drive groundbreaking innovation, bolster security, and foster a more connected, secure, and thriving mobile ecosystem. This partnership underscores our unwavering commitment to shaping the future of Network Authentication and making a profound, lasting impact on the industry."

"We are excited to welcome Shush Inc. as a new member of the GSMA," said Henry Calvert, Head of Networks at GSMA. "Their expertise in Network Authentication will be a valuable addition to our community as we work together to drive innovation to accelerate programmable networks for enterprise developers, through the GSMA Open Gateway initiative."

"Joining the GSMA marks a significant milestone for Shush Inc.," said Daryl Carlough, Co-Founder & CFO of Shush Inc. "We look forward to contributing our knowledge and experience to the GSMA community, fostering innovation, and helping to create a more secure and interconnected mobile environment."

"At Shush Inc., we are committed to accelerating Network Authentication time to market," said David Galante, Vice President of Customer Experience & Marketing of Shush Inc. "Our collaboration with the GSMA will enable us to stay at the forefront of industry developments and ensure that our offerings meet the evolving needs of mobile operators and their customers."

 

About Shush Inc.:  

Shush Inc. is a leading provider of Network Authentication solutions dedicated to redefining convenience and reliability in the industry. With a focus on innovative authentication processes, Shush Inc. empowers Mobile Network Operators with robust Network Authentication solutions tailored to meet their unique needs. For media inquiries, please contact: media@shush.pw

 

About GSMA:  

The GSMA is a global organization unifying the mobile ecosystem to discover, develop, and deliver innovation foundational to positive business environments and societal change. Our vision is to unlock the full power of connectivity so that people, industry, and society thrive. Representing mobile operators and organizations across the mobile ecosystem and adjacent industries, the GSMA delivers for its members across three broad pillars: Connectivity for Good, Industry Services and Solutions, and Outreach. This activity includes advancing policy, tackling today's biggest societal challenges, underpinning the technology and interoperability that make mobile work, and providing the world's largest platform to convene the mobile ecosystem at the MWC and M360 series of events. 

 

We invite you to find out more at www.gsma.com.

Tags: Press Release

Network Authentication Playbook: Best Practices

Posted by Eddie DeCurtis on August 27, 2024 at 10:14 AM

The Growing Challenge of Network Authentication

If you’re a professional, expert, or product leader at a mobile network operator (MNO), you’ve probably been losing sleep over network security lately. With the rise of sophisticated cyber-attacks, keeping your network safe has become a top priority.  The rise of SIM swap attacks should be particularly concerning to Infosec leaders at MNOs. But it’s not just about security anymore—it’s also about customer trust, experience, and staying ahead in a competitive market. 

This article will walk you through the best practices for network authentication, offering practical, actionable insights that you can start applying today. Plus, we'll explore how integrating a solution can streamline your efforts, making your job easier and your network more secure.

Market Landscape: Trends and Challenges in Network Authentication

Network authentication has never been more critical. As mobile devices become the primary method for users to access banking, ride-sharing, crypto trading, social media, and enterprise apps, the need for robust authentication mechanisms has skyrocketed. Add to that the fact that cyber threats are evolving at a breakneck pace, and you’ve got a recipe for sleepless nights. 

One of the most significant challenges MNOs face today is the threat of SIM swap attacks. These attacks, where fraudsters hijack a user's mobile number by tricking the carrier to transfer the number to a new SIM card, have become increasingly common. 

Just recently, several high-profile cases hit the news where consumers lost thousands of dollars because of SIM swap fraud. One recent high-profile SIM swap fraud attack occurred in Toronto, where ten individuals were arrested on August 1, 2024. This case involved over 1,500 compromised cellular accounts, leading to more than $1 million in losses. 

The investigation, dubbed “Project Disrupt,” began in June 2023 and uncovered widespread fraud that affected telecom companies, financial institutions, and individual consumers.

It’s clear that the stakes are high, and the need for secure, reliable network authentication is more urgent than ever. Recently in the United States, the Federal Communications Commission  (FCC) has taken steps to thwart future SIM swap attacks with a federal mandate. At the November 15, 2023, Open Meeting, the FCC adopted a Report and Order implementing new rules to protect cell phone consumers from SIM swap and port-out fraud, two practices that bad actors use to take control of consumers’ cell phones. This new order requires all MNOs in the US to disclose their secure authentication methods to the committee by July 8, 2024. 

On the bright side, emerging technologies and standards are offering new ways to enhance network security.  Silent Authentication, which uses network attributes that only the MNOs possess, offers a new way of confirming the mobile device requesting access to a third-party service is under the control of the rightful owner, not a fraudster.   

 

Screenshot 2024-08-27 at 9.54.14 AM

Authentication in Network Security: Why It Matters and Common Threats

Network authentication is the first line of defense in keeping unauthorized users out of your network. It’s how you ensure that the person or device trying to access your network is who they say they are. But as important as it is, authentication is also one of the most challenging aspects of network security to get right.

Let’s talk about some of the most common threats:

  1.   SIM Swap Fraud: As mentioned earlier, this type of fraud has been on the rise, causing significant financial losses for consumers and headaches for MNOs.
  2.   Phishing Attacks: Despite all the warnings, phishing remains a major problem. Fraudsters trick users into giving up their login credentials, which they then use to gain unauthorized access to networks.
  3.   Credential Stuffing: Hackers use lists of stolen usernames and passwords to gain access to multiple accounts, taking advantage of the fact that many people reuse passwords across different services.

These threats are constantly evolving, which means your authentication methods need to be adaptable and resilient.

Strategic Framework: Implementing Network Authentication

To effectively implement network authentication, it’s crucial to develop a strategy that’s both comprehensive and flexible. Here are some best practices to keep in mind:

  1. Silent Authentication - This method is the flagship of network authentication use cases. It provides a complete, seamless, and silent authentication process. In this flow, the mobile device IP address is confirmed mutually between the mobile app publisher and the MNO. If the IP address matches, then device ownership is confirmed and the transaction should proceed. 
  2. SIM Swap - When a bank or other institution needs to confirm the device receiving an SMS 2FA code belongs to the rightful owner of the device, a SIM Swap date check greatly reduces the chance of fraud. If the result of this inquiry shows that the SIM has been reseated within the last 24/48/72 hours, it’s very likely that the device has been compromised. 
  3. Device Status - The MNO has valuable information regarding the activation, billing and operational status of the device. This request provides a critical assessment of the status of the mobile device. This request confirms the device has not been reported as lost, stolen or is in a blocked state.
  4. Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring users to verify their identity through multiple methods, such as an OTP code sent over SMS. However, it is critical that this isn't the only security method used.
  5.  Zero Trust Architecture: In a Zero Trust model, no one inside or outside the network is trusted by default. Every request is authenticated, authorized, and encrypted, regardless of where it originates.
  6. KYC validation - Network admins should integrate KYC validation into user onboarding and ongoing authentication processes by using automated systems for identity verification and document validation. It's essential to comply with relevant regulations, ensure data security through encryption and access controls, and maintain clear communication with users about the KYC process. Regular audits and updates are crucial for staying compliant and secure. Finally, having a plan for detecting fraud and responding to data breaches is vital.
  7. Regular Audits and Updates: The threat landscape is always changing, so your network authentication strategy should be regularly reviewed and updated to ensure it remains effective.

By following these best practices, MNOs can significantly reduce the risk of unauthorized access and enhance overall network security.

Product Development and Integration: Key Considerations

When it comes to integrating network authentication into your services, there are several key considerations to keep in mind:

  1.   User Experience: As important as security is, it should never come at the expense of the user experience. A clunky, confusing authentication process will frustrate users and lead to higher churn rates. The goal is to make authentication as invisible as possible while maintaining a high level of security. Methods that require zero user interaction should be implemented as a priority. Examples include Silent Authentication, SIM Swap and Device Status.
  2.   Scalability: Your authentication solution should be able to grow with your business. Whether you’re adding new services, expanding into new markets, or dealing with an influx of new users, your network authentication should be able to handle it all.
  3.   Compliance: Different markets have different regulations regarding data security and privacy. Your authentication solution needs to be flexible enough to comply with these regulations, no matter where you operate.

The Best Solution for Network Authentication

At this point, you might be wondering, "How can we implement all this without turning the business upside down?" That’s where Shush comes in.

Shush offers a comprehensive network authentication solution that’s not only secure but also incredibly user-friendly. Here’s what sets Shush apart:

  • Domain Expertise: The Shush Chief Product Officer, Jon Morrow, crafted a best-in-class service within T-Mobile USA over the last several years. He is now at Shush developing a best-in-class cloud agnostics platform deployable within the trusted domain of any MNO.  Shush understands what the market needs from brands and banks to global MNOs . 
  • No Upfront Cost: We understand the capital constraints within MNOs. As a result, Shush bears the costs of the platform, technical integration, and operation - so there are no upfront costs by our partners. In addition to offering our Self-Service Network Auth SaaS solution, Shush offers a Managed Service Model where all operations are handled by our team which allows Network Authentication to become a revenue center versus a capital expenditure.
  • Seamless Integration: Shush Sherlock is designed to integrate with existing API gateways which facilitate authentication, throttling and rate limiting. API gateways facilitate the northbound interactions between Demand partners (CPaaS providers ) and Shush Sherlock platform. Shush Sherlock then integrates with telco-native APIs to retrieve the network elements needed for real-time network authentication use cases.
  • Scalable and Flexible: Whether you’re a small MNO or a large enterprise, Shush scales with your needs. Plus, we don’t charge MNOs to use our technology—we offer a managed service where our team handles everything, from billing to support, to operations.
  • Proven Track Record: Numerous MNOs have successfully integrated Shush into their network security infrastructure. Case studies and testimonials highlight how Shush has helped them enhance their security, reduce fraud, and improve user trust.
  • Compliance-Ready: Shush is designed to meet the stringent security and privacy requirements of any market, ensuring you stay compliant while keeping your network secure.

Red Ring Binder with Inscription Compliance on Background of Working Table with Office Supplies, Laptop, Reports. Toned Illustration. Business Concept on Blurred Background.

Security Protocols: Mitigating Risks and Ensuring Compliance

Mitigating risks is all about being proactive rather than reactive. Here are some tips:

  • Regular Security Audits: Regularly audit your network for vulnerabilities and ensure that your authentication methods are up to date.
  • User Education: Educate your users about the importance of strong, unique passwords and how to spot phishing attempts.
  • Compliance Monitoring: Keep up to date with industry standards and regulations to ensure your network remains compliant.

Marketing and Positioning: Network Authentication as a Value-Added Service

Finally, let’s talk about how to position network authentication as a value-added service.

  1. Highlight the Benefits: Focus on how your network authentication solution enhances security and user trust. Use real-world examples, like those recent SIM swap attacks, to show the importance of robust authentication.
  2.  Leverage Case Studies: Share success stories from MNOs that have successfully integrated network authentication solutions like Shush. These stories can be powerful tools in convincing potential clients of the value of your services.
  3. Communicate Clearly: Avoid technical jargon when marketing your network authentication services. Instead, focus on how they solve real-world problems for your clients.

Final Thoughts

Network authentication is a critical component of any MNO’s security strategy. With the increasing number of threats out there, it’s essential to have a solution that’s both effective and user-friendly. 

Shush offers a proven, scalable, and compliant network authentication solution that takes the hassle out of securing your network. Instead of reinventing the wheel, why not trust Shush to help you protect your network and your users? 

Remember, in today’s fast-paced world, staying ahead of the curve is crucial. By implementing the strategies and best practices discussed in this article, and by leveraging a trusted partner like Shush, you can ensure your network remains secure and your users stay happy.

Tags: Network Authentication, Blog Post

Shush and Global Telco Consult (GTC) Forge Strategic Partnership

Posted by Shush Marketing on August 5, 2024 at 9:00 AM

FOR IMMEDIATE RELEASE

Shush Inc. and Global Telco Consult GmbH (GTC) Forge Strategic Partnership to Drive Innovation in Telecommunications

Collaboration Set to Enhance Next-Generation Telecom Solutions and Global Connectivity

DALLAS, TX, and MUNICH, Germany, August 5, 2024 – Shush Inc., a pioneering leader in Network Authentication solutions, is thrilled to announce a strategic partnership with Global Telco Consult GmbH (GTC), a distinguished independent telecommunications consultancy renowned for its expertise across Messaging, Identity, IoT, Recruitment, and M&A services.

GTC stands out for its unparalleled track record in helping enterprises, carriers, and service providers navigate the complexities of the telecommunications landscape. From optimizing SMS and next-generation IP messaging to deploying advanced Identity and Fraud Detection tools, GTC offers comprehensive solutions tailored to the evolving needs of its clients.

Through this strategic partnership, Shush Inc. and GTC will leverage their respective strengths to drive innovation and deliver cutting-edge solutions to the telecommunications industry. By combining Shush Inc.'s expertise in Network Authentication with GTC's extensive experience in consulting and managed services, the partnership aims to maximize current and emerging technologies, drive revenue growth, and future-proof communication strategies for clients.

"We are thrilled to partner with Global Telco Consult GmbH," said Eddie DeCurtis, Co-Founder & CEO of Shush Inc. "With GTC's deep expertise and customized consulting services, coupled with Shush Inc.'s innovative Network Authentication solutions, we are well-positioned to drive technological advancements and operational excellence in the telecommunications industry."

GTC's neutral stance as an independent entity makes it a valuable partner, enabling collaboration without competition and fostering an environment conducive to driving innovation and growth. By providing fully customized consulting and managed services, GTC empowers clients to navigate the rapidly evolving telecommunications landscape with confidence.

"We are thrilled about our partnership with Shush Inc.," said Guillaume Bourcy, Chief Identity Officer at Global Telco Consult GmbH. “This collaboration enables us to deliver exceptional value in the mobile identity space, driving innovation and shaping the future of digital identity solutions for telecom operators, vendors, and enterprises alike.”

For more information about Shush Inc. and Global Telco Consult GmbH, please visit www.shush.pw and https://globaltelcoconsult.com

About Shush Inc.:

Shush Inc. is a leading provider of Network Authentication solutions, dedicated to redefining convenience and reliability in the industry. With a focus on innovative authentication processes, Shush Inc. empowers mobile network operators with robust security solutions tailored to meet their unique needs.

About GTC:

Global Telco Consult GmbH (GTC) is a leading independent telecommunications consultancy specializing in Messaging, Identity, IoT, Recruitment, and M&A services. With a commitment to providing fully customized consulting and managed services, GTC empowers enterprises, carriers, and service providers to navigate the complexities of the telecommunications industry with confidence. GTC's neutral stance as an independent entity makes it a valuable partner in driving innovation and operational excellence without competing with its clients. Through strategic partnerships and expertise-driven solutions, GTC continues to shape the future of telecommunications.


Media Contact:

Daryl Carlough
Shush Inc.
+1 617-320-4863
email us here
Visit us on social media:
X
LinkedIn

 

Tags: Press Release

Shush and Covr Security AB Partner to Enhance Digital Security Solutions

Posted by Shush Marketing on July 9, 2024 at 12:16 PM

FOR IMMEDIATE RELEASE

Dallas, TX, July 9, 2024 – Shush Inc., a leading provider of innovative Network Authentication solutions, is thrilled to announce a strategic partnership with Covr Security AB, a pioneering Swedish cybersecurity firm. Through this collaboration, Shush Inc. and Covr Security AB will work together to create advanced digital security solutions to better serve their customers.

Covr Security AB, established in 2015, is renowned for revolutionizing mobile and digital security. Specializing in providing an innovative mobile security management platform, Covr Security AB primarily caters to sectors necessitating robust customer authentication and privacy, such as online banking, digital payments, and mobile banking. Their platform stands out for its advanced multi-factor authentication methods, offering unparalleled protection against cyber threats.

"We are incredibly excited to partner with Covr Security AB to enhance digital security solutions for our customers," said Eddie DeCurtis, Co-Founder & CEO of Shush Inc. "Covr Security AB's expertise and innovative approach to cybersecurity align perfectly with our commitment to providing cutting-edge Network Authentication solutions. Together, we aim to empower our clients across various industries with secure, seamless digital transactions, fundamentally transforming the way businesses and consumers experience online security. This partnership is not just a collaboration; it's a leap forward in making the internet a safer and more trustworthy place for everyone."

This strategic partnership between Shush Inc. and Covr Security AB reflects their shared commitment to advancing digital security and providing exceptional solutions to their clients. By combining their respective strengths and resources, the two companies are poised to deliver innovative cybersecurity solutions that address the evolving needs of today's digital landscape.

"We are delighted to collaborate with Shush Inc. to develop advanced digital security solutions," said George Fraser, Chief Revenue Officer of Covr Security AB. "This partnership represents a significant step forward in our mission to make the internet a safer place for everyone. Together with Shush Inc., we are committed to delivering cutting-edge cybersecurity solutions that provide unmatched protection and peace of mind to our customers."

About Shush Inc.: 

Shush Inc. is a leading provider of Network Authentication solutions, dedicated to redefining convenience and reliability in the industry. With a focus on innovative authentication processes, Shush Inc. empowers Mobile Network Operators with robust security solutions tailored to meet their unique needs.

About Covr Security AB:

Covr Security is a pioneering Swedish cybersecurity firm, renowned for revolutionizing mobile and digital security. Established in 2015, we specialize in providing an innovative mobile security management platform, primarily catering to sectors necessitating robust customer authentication and privacy, such as online banking, digital payments, and mobile banking. Our platform is distinctive for its advanced multi-factor authentication methods, offering unparalleled protection against cyber threats. This user-centric solution empowers our clients across various industries with secure, seamless digital transactions, reflecting our commitment to making the internet a safer, more trustworthy place. For more information, visit www.covrsecurity.com

-END-

Tags: Press Release

Twilio Authy users should prepare for SIM Swap attacks

Posted by Shush Marketing on July 8, 2024 at 4:34 PM

 

Details of the security breach

Recently, Twilio Authy experienced a security breach which has compromised the mobile phone numbers of millions of users. Hackers were able to gain unauthorized access to the app's database and obtain a significant amount of user data.

The breach exposed personal information, including phone numbers, associated with Twilio Authy accounts. It is important to note that no account passwords or sensitive financial information were compromised in the breach.

Twilio Authy has taken immediate action to investigate the breach and enhance its security measures to prevent similar incidents in the future.

The mobile subscribers on the leaked list are now subject to SMS smishing and potential SIM swap attacks.  Since these users are known Twilio Authy users, they are now highly likely to receive attacks with fake SMS OTP requests with malicious links. This further demonstrates that mobile app based authentication methods and SMS OTP can be comprised.  

Impact on user phone numbers

The security breach has raised concerns about the privacy and security of user phone numbers. While no sensitive information was compromised, the exposure of phone numbers could potentially lead to targeted spam messages, phishing attempts, or other malicious activities.

It is recommended that users remain vigilant and report any suspicious activity related to their Twilio Authy accounts. Additionally, users should consider updating their 2FA settings and monitor their accounts for any unauthorized access.

Overview of Twilio Authy 2FA app

Twilio Authy is a popular two-factor authentication (2FA) app that provides an additional layer of security for user accounts. It allows users to secure their online accounts by requiring a second form of authentication, typically a unique code sent to their mobile device.

With the increasing threat of cyber attacks and data breaches, 2FA has become a crucial security measure for individuals and organizations. Twilio Authy has gained popularity due to its user-friendly interface and compatibility with various online platforms.

The app works by generating one-time codes that are required to access online accounts. These codes can be delivered via SMS, phone call, or push notification, providing users with flexibility and convenience.

Response from Twilio Authy

Twilio Authy has taken the security breach seriously and has responded promptly to address the issue. The company has initiated a thorough investigation to determine the cause of the breach and identify any potential vulnerabilities in its system.

In response to the incident, Twilio Authy has implemented additional security measures to enhance the protection of user data. This includes strengthening encryption protocols, implementing stricter access controls, and conducting regular security audits.

Twilio Authy has also notified affected users regarding the breach and provided guidance on steps they can take to secure their accounts. The company is committed to ensuring the privacy and security of its users and will continue to monitor the situation closely.

Tags: Network Authentication, Data Breach

Strategic Alliance Formed Between Shush and ClearSky Technologies

Posted by David Galante on June 20, 2024 at 8:21 AM

EIN PRESSWIRE

Shush Inc. partners with ClearSky Technologies to revolutionize Network Authentication and wireless data solutions across North America. #NetworkInnovation

 

DALLAS, TEXAS, UNITED STATES, June 20, 2024 /EINPresswire.com/ -- Shush Inc., a leading provider of innovative Network Authentication solutions, is excited to announce a strategic alliance with Orlando, Florida-based ClearSky Technologies, a premier provider of cutting-edge wireless technology solutions specializing in the optimization of wireless data traffic and A2P message delivery. This alliance marks a significant milestone in advancing Network Authentication solutions, leveraging the expertise and resources of both organizations to deliver comprehensive network solutions tailored to the evolving needs of enterprises across North America.

ClearSky Technologies delivers A2P services for regional carriers, OTT providers and MVNOs, including Two-Factor Authentication (2FA) and One-Time Passwords (OTP). ClearSkyis partnering with Shush to further complement stability and trust in the authentication ecosystem. Enterprises are often attacked in the form of fraudulent numbers in A2P messaging and Artificially Inflated Traffic (AIT), causing billions of dollars to be lost.

The strategic alliance with ClearSky Technologies will enable Shush Inc. to offer Network Authentication to a robust foundation of Mobile Network Operators. ClearSky’s expertise in managing complex telecommunications issues, combined with their comprehensive suite of solutions that blend cloud-based components with local infrastructure, will greatly enhance Shush’s ability to deliver much-needed Network Authentication solutions to the wireless industry.

While top-tier carriers have invested millions in network authentication technologies, Shush and ClearSky are providing the same cutting-edge solutions to the entire industry at a fraction of the cost. This partnership brings advanced security within reach for all carriers but also significantly lowers the cost barrier, making it accessible to a broader wireless carrier market.

Eddie DeCurtis, Co-Founder & CEO of Shush Inc., expressed his enthusiasm about the alliance: "We are incredibly excited to partner with ClearSky Technologies. This collaboration significantly enhances our ability to deliver a comprehensive network solution to the wireless network marketplace. ClearSky’s managed services portfolio perfectly complements Shush Inc.'s expertise in Network Authentication, positioning us to meet and exceed the evolving needs of Mobile Network Operators. Together, we are set to revolutionize the landscape of wireless networks, offering unparalleled solutions that drive innovation and security."

Ron Willett, VP & GM of ClearSky Technologies, shared about the value of the alliance with Shush Inc.: "We are thrilled to join the Shush family and combine our product offerings with their state-of-the-art Network Authentication solution and deployment expertise. Together, we have a unique opportunity to bring enterprises a new and better way to authenticate users and increase customer satisfaction while protecting them from monetary exposure caused by AIT. This partnership will also allow our carrier partners to participate in a brand new revenue stream.”

About Shush Inc.:
Shush Inc. is a leading provider of Network Authentication solutions, dedicated to redefining convenience and reliability in the industry. With a focus on innovative authentication processes, Shush Inc. empowers Mobile Network Operators with robust Network Authentication solutions tailored to meet their unique needs. For media inquiries, please contact: media@shush.pw

About ClearSky Technologies:
ClearSky Technologies has been providing cutting-edge wireless technology solutions to mobile network operators for more than two decades. Their specialized portfolio includes the Total Traffic Manager (TTM™) solution for data traffic and policy management, and iCODE®, their leading A2P messaging service. All of ClearSky’s solutions are offered “as-a-service” and require little or no capital investment. Headquartered in Orlando, Florida, ClearSky serves over 100 mobile network operators globally, along with many other channel partners, network operators, and wireless providers. ClearSky addresses complex telecommunications issues with comprehensive, cost-effective solutions, combining cloud-based components with local infrastructure to ensure efficiency and reliability. Their commitment to innovation and ethical business practices has made them a trusted and integral partner in the industry.

###

Daryl Carlough
Shush Inc.
+1 617-320-4863
email us here
Visit us on social media:
X
LinkedIn

Tags: Press Release