Blog

Revenue leakage occurs when services are delivered without being billed. This is a growing concern for telecom operators, as revenue leakages can range from 1% to 5% of their total annual revenues. BillRun’s Call-Generator and Revenue Assurance solution maximizes profitability for telcos, by detecting leakage and preventing it from ever happening. 

Revenue leakage occurs when services are delivered without being billed. This is a growing concern for telecom operators, as revenue leakages can range from 1% to 5% of their total annual revenues. BillRun’s Call-Generator and Revenue Assurance solution maximizes profitability for telcos, by detecting leakage and preventing it from ever happening.

Revenue leakage plug – essential for telecom’s success

Telecom operations typically consist of a long chain of interrelated functions, providing services, tracking their delivery, and billing customers. In this process some data is lost, resulting in revenue leakage. A main cause of this leakage is fraud, though it could also stem from network overload; unmaintained infrastructure causing communication gaps; or obstructions blocking tower signals.

The ultimate revenue capture machine

BillRun’s Call-Generator and Revenue Assurance module is an automated component integrated in the billing system, which generates and routes phone calls, SMS, MMS, voice-mail, and auto-answering. Concurrently, the system monitors the network’s integrity to ensure proper functioning, and, before routing a call, validates coverage by scanning the network, generating location-based reports about detected problems.

Based on open-source technology, this robust, flexible and easily customizable solution supports 2G, 3G, and 4G technologies, saving significant expenses for telcos. Complying with international telecom regulations, BillRun has been integrated successfully at several leading telecom providers worldwide. To address inconsistent coverage, the module can be installed in any wireless modem, ensuring uninterrupted service in dead zones or during network overload.

Fraudulent users under the radar

The system identifies fraudulent use of phone numbers, preventing them from slipping under the radar without being charged. Operators can also pinpoint suspicious activity, such as IoT device tampering, whereby the SIM card is removed and used for making international calls or sending SMS spam. In devices intended for data transmission only, if calls are not blocked, data is not transmitted, resulting in considerable losses for operators.

Consistent picture

An audit log is created for each individual event of a call, guaranteeing that all system components portray an identical picture. Calls are represented by CDRs (call detail records), which are validated and analyzed for reliability, including call start-time, duration metering, and rating. Operators can review detailed call logs, indicating all successful and unsuccessful calls, and – by correlating events across the logs – identify anomalies of undetected or uncharged calls.

 

Brands

SIGN UP FOR OUR NEWSLETTER

Start receiving monthly updates on new features and the latest industry trends.

Invalid Name
Invalid Email
Invalid Input