Cookies are small text files that are stored on your computer when visiting our websites. We use two types of cookies on this website; Strictly necessary and performance cookies. We offer the user the ability to disable any performance (non-essential) cookie as described below.

Strictly necessary: Cookies that we believe are essential for the operation of the website.

Cookie Settings

This cookie stores your cookie settings for your next visit to the site

CMS Cookies

These cookies are used by our CMS system to identify you as a visitor to the website and are deleted when you close your browser

Performance cookies: These cookies collect information to allow us to improve the site.

__utma, __utmb, __utmc, __utmz

These cookies allow us to count user visits and traffic sources so that we can measure and improve the site performance using Google Analytic services.

__unam, __stid

These cookies allow you to share information with Social networking sites.


For more information on how we use Cookies see our Cookie Statement.

Accept & store my settings

& Media

In today’s saturated markets, rapid product innovation and competition are putting traditional revenue streams under pressure.

Harnessing innovation and the data explosion

The ‘data explosion’ has driven up network costs for telecoms operators, without a corresponding rise in their revenues. In this environment, how can you offer differentiated products and expand into new markets while still maintaining margins and retaining existing customers?

Our telecoms services stem from our roots in data intelligence. Whether using intelligent statistical analysis to improve network efficiency, solve the problems of revenue leakage or indentify and stop fraud, delivering business benefits from advanced data analytics runs as a common theme through everything we do.

And with telecoms operators at the forefront of the ‘data explosion’, releasing the value trapped in the data is more important than ever.

Detica StreamShield®

Detica Streamshield gives administrators the power to tailor end-user experience.
View video


Allows encrypted, filtered and secure data sharing. View video