Telstra Event Detection API
Proactive protection against fraud
Savvy criminals are attempting to circumvent two factor authentication by swapping SIM cards for a particular mobile number. The Telstra Event Detection (TED) API monitors for SIM swap events and alerts your business quickly of suspicious activity.
Subscribe to the Telstra Event Detection API to get the peace of mind that lost or stolen devices are secure, protecting you against financial loss and maintaining customer trust.
Use our powerful API service to protect your business
Our API directly links your applications to Telstra, ensuring you are quickly alerted to different types of network events like SIM swaps and international roaming.
Bolster your two-factor authentication
We alert you to suspicious activity based on analysis of timestamped event data, including SIM swaps, port-in, port-out, MSISDN registration, and mobile service registration and cancellation.
Carrier and roaming alerts
Be sure you’re aware when a change is made to the assigned Australian carrier of a mobile number or when an Australian mobile number is detected overseas.
Mitigate financial losses
Minimise financial losses by alerting subscribers to suspicious events as they are occurring.
Build brand trust
Give your customers the assurance their online transactions are secure.
Target your security
Better target resources to proactively monitor transactions for signs of fraud.
Reduce risk of fraud
Helps to reduce the risk of fraud for new forms of mobile payment services.
How it works
A network event occurs
Integration with the Telstra mobile network and customer apps
The customer is alerted and can take action
Reliable, high quality performance through the Telstra network
Consistently high-quality collaboration and application underpinned by our Next IP network and Australia’s largest mobile network.
Get integrated, end-to-end network visibility for a faster, more coordinated response to incident through our Security Operations Centres.
Telstra has been helping businesses manage risk and protect data for decades, while we have been protecting our own network for even longer.