The 15 Most Important Computer Security Startups Of 2013

Julie Bort

Computer security is a difficult problem that attracts some of the brightest minds in the tech industry who build some of the most innovative products.

We’ve assembled this list of the hottest, coolest security startups creating buzz for a number of reasons:

  • They’ve landed big finance rounds.
  • They have impressive founders.
  • They are solving a hard security problem.
  • They are approaching security in a fresh new way.

1.) Appthority: Protecting mobile app developers

Appthority CEO and cofounder Anthony Bettini

These days, everyone and anyone is a mobile app developer. But just because you can build an app, doesn’t mean it’s good or safe.

Appthority offers a cloud platform that checks to see if an app is secure so it can’t be hacked by the bad guys.

Appthority’s CEO and co-founder, Anthony Bettini hails from McAfee and was the technical editor for one of the best-selling hacking books of all time, “Hacking Exposed.”

2.) ThreatMetrix: Putting it all together to stop fraud fast

Reed Taussig, CEO, ThreatMetrix

Most businesses use a whole bunch of security products. If they find evidence of a hacker, that info isn’t easily shared between security products.

ThreatMetrix offers a cloud service that does all the big security stuff in one system and this lets it detect fraud the instant it happens, not sometime later.

ThreatMetrix landed on the Wall Street Jounal’s Top 50 startups of 2012 after it acquired another buzzy startup, malware detection firm TrustDefender, last year.

3.) Marble Cloud Security: Keeps hackers from fooling you into loading their malware

Dave Jevans, founder, Marble Cloud

Marble Cloud offers software for the bring-your-own-device phenom. Install it and if a user gets hacked, the malware can’t gain access to the company’s other data through the device.

It also protects people from bad stuff that could happen when they use a public Wi-Fi and from a growing threat known as “SMS phishing” where a text from the bad guys can fool you into installing malware or giving away your password.

Dave Jevans, founder and CTO, is also the founder of the Anti-Phishing Working Group, whose members include Yahoo, eBay, Google and Microsoft.

4.) AnchorFree: Safe and private public hotspots

AnchorFree: Safe and private public hotspots

David Gorodyansky, CEO and co-founder AnchorFree

AnchorFree offers software it calls the “Hotspot Shield” which gives everyone secure, anonymous, and private browsing on the Internet.

It came to fame during the Arab Spring, helping people in oppressed countries stay under-the-radar when using the Internet. That helped it land a $52 million investment led by Goldman Sachs last year.

AnchorFree has also attracted a whole bunch of famous angels including Flickr backer Esther Dyson, former Huffington Post president Greg Coleman, and Bert Roberts, the former CEO of MCI.

5.) Wickr: Your message will self destruct

Wickr: Your message will self destruct.

Kevin Smith/Business insider

Wickr’s mission is to let you use the mobile Internet and “Leave No Trace.”

It offers an app that gives you uber-control over your mobile messages — text, pictures, audio, video — with military-grade security to prevent snooping.

Then, at your command, the message self destructs and is gone forever.

Wickr isn’t the only one working in this area. Snapchat offers some of these features, as does Silent Circle.

Still, Wickr stands out for its co-founder, Nico Sell, who has started over 20 security companies over the past two decades and also helped run the yearly hacking conference DEFCON.

6.) Impermium: Making nasty comments go away

Impermium: Making nasty comments go away

Mark Risher did a lot of anti-spam work for Yahoo before cofounding Impermium

The Internet isn’t always a nice place. People and blog spammers write the nastiest comments and Tweets.

Impermium calls that stuff “Mal.content” and its tool finds it, deletes it and stops the spread of it.

Built by the former leaders of Yahoo!’s anti-spam and security teams, Mark Risher and Vish Ramarao, Imperium recently hired Sameer Bhalotra, the former White House senior director for cybersecurity, as its COO.

7.) Victrio: identifying bad guys when they call on the phone

Victrio: identifying bad guys when they call on the phone

Victrio cofounder Lisa Guerra (LinkedIn/Lisa Guerra)

What’s to stop fraudsters from calling a company on the phone and lying their way into obtaining forbidden information?

Victrio, that’s what.

Victrio has a very cool tech that does realtime phone fraud detection based on a “voice print.”  The tech is popular with banks, credit card companies, and any company that still does a lot of business through call centers.

Founder Tony Rajakumar and vice president of engineering and co-founder, Lisa Guerra, cut their teeth at BeVocal, a voice detection company bought in 2007 by Nuance Communications.

8.) Shape Security: Keeping people away from bad websites

Shape Security: Keeping people away from bad websites

Shape Security cofounder Sumit Agarwal

Shape is still in stealth mode and has been somewhat tight-lipped about its technology, but we know that it’s working on a way that makes it harder for hackers to trick people into visiting malware-laced websites.

The company has a whole bunch of Valley tech bigwigs excited enough to invest. It just raised $20 million (bringing their total to $26 million) from investors like Venrock, the venture-capital arm of the Rockefeller family; Kleiner Perkins; Eric Schmidt’s TomorrowVentures; and executives at DropboxFacebookLinkedIn, and Twitter.

Shape was cofounded by ex-Googler Sumit Agarwal, who was head of Google’s mobile product management.

9.) 41st Parameter: Taking a digital fingerprint of your PC

41st Parameter: Taking a digital fingerprint of your PC

Ori Eisen, founder, 41st Parameter

41st Parameter’s FraudNet has a creative approach to help retailers find hackers and fraudsters.

It invisibly scans the PC and creates a digital “fingerprint” of it. Even if a hacker has your credentials, if the person’s not logging in from your actual PC, 41st knows it and flags those activities.

The company was founded by Ori Eisen, who was the worldwide fraud director for American Express.

10.) CrowdStrike: Seeking to unmask and capture the hackers themselves

CrowdStrike: Seeking to unmask and capture the hackers themselves

George Kurtz

CrowdStrike is taking a completely different approach to security: find and identify the hacker.

Although CrowdStrike is technically in stealth mode, the company has created a ton of buzz for its aggressive stance on rooting out the hackers, as opposed to an emphasis on building defensive tech.

Its founders include George Kurtz, McAfee’s former CTO. Early employees are former FBI cybercrime bigwigs and a top U.S. information-warfare Air Force colonel, now retired.

11.) Tenable Network Security: Protecting the Department of Defense

Tenable Network Security: Protecting the Department of Defense

Ron Gula, CEO, Tenable Network Security

In September, Accel invested $50 million into Tenable, (YouTube/tenablesecurity) the biggest investment Accel ever made in a North American company.

Tenable isn’t that young (founded in 2002) and doesn’t make the sexiest security tech: Its flagship product is the Nessus “vulnerability management software” which helps companies manage all the security alerts and patches.

But it’s got a giant list of enterprise customers including a recently-signed huge contract with the Department of Defense.

12.) FireEye: Stopping the attacks that no one else can stop

FireEye: Stopping the attacks that no one else can stop

Ashar Aziz, founder, FireEye

FireEye solves two really hard problems: protecting corporate networks against so-called “advanced persistent threats” and against “zero-day” attacks.

APTs are very personalized attacks by hackers determined to get into a particular network.  Zero-day attacks are software holes that haven’t been fixed by the software vendor.

FireEye finds this stuff by flagging suspicious stuff and then opening it in a safe, virtual environment. For instance, its email appliance opens the suspected email attachment to see what it does. The whole process takes a fractions of a second and if the email contains malware, it stops it.

FireEye was founded by former Sun distinguished engineer Ashar Aziz who holds 18 patents on this tech alone.

13.) Co3 Systems: Helping companies recover after an attack

Co3 Systems: Helping companies recover after an attack

Ted Julian, chief marketing officer, Co3 Systems (Twitter/@eajulian)

Despite all the security companies buy, they can still get hacked.

When that happens, Co3 Systems solves an interesting problem: reporting that security breach. It makes sure a company meets its compliance obligations.

The company is run by a team of experienced execs including EMCs former director of engineering, Allen Rogers, and one-time IDC market research analyst, Ted Julian, who previously cofounded Arbor Networks.

14.) Bromium: Letting malware happen, safely

Bromium: Letting malware happen, safely

Simon Crosby, co–founder, CTO, Bromium

Bromium is doing for computer security what VMware did for servers. The company has created a technology called “micro-virtualization” that doesn’t care if potentially dangerous software gets installed on a PC because it runs in a safe container that can’t touch the rest of the PC.

In this way, PC users can download apps or open attachments without worrying about unleashing a virus on the company.

It was founded by Simon Crosby, who is known as the founder of XenSource, an open source competitor to VMware.

15.) CipherCloud: Encrypting data before sending it to the cloud

CipherCloud: Encrypting data before sending it to the cloud

Pravin Kothari, founder, CipherCloud (Twitter/@pkothari)

CipherCloud offers a service that just about every enterprise is going to need as it adopts the cloud.

It secures a company’s sensitive data in real time before that data is sent to the cloud. That means enterprises don’t have to trust the cloud provider to keep their stuff safe.

It was founded by Pravin Kothari, whose previous security company was ArcSight, which he sold to Hewlett Packard for $1.6 billion. In its first year in business, CipherCloud has already nabbed about 40 big enterprise customers, including two of the world’s top banks.

Plus, Andreessen Horowitz put $30 million into the company last month, raising its total to $31.4 million.

Please follow SAI: Enterprise on Twitter and Facebook.


Recommended for you:

What Diet Pills, Athletes And CRM Have in Common

SAP Guest

By Nicholas Kontopoulos

Imagen de Hola Gourmets 2009

Imagen de Hola Gourmets 2009 (Photo credit: jlastras)

My father was a chef, so I have enjoyed a lifelong love affair with well-prepared and delicious food of all kinds. But I haven’t enjoyed the subsequent battle of the bulge, which had me looking for a quick victory.

But I soon learned there’s no such thing as a “magic pill” for swiftly achieving and maintaining optimal weight and fitness level. As with Olympic athletes or professional sports teams, success depends on a dedicated coaching staff, a healthy diet, collaboration and even data analysis. An entire support system works in concert to achieve a clearly delineated goal.

So it is with customer relationship management systems. Often, CRM systems and cloud-based solutions are sold as a “secret sauce” or “magic bullet” that will yield instant success. But these diet-pill-style solutions often fail to address what is broken in the business, such as strategy alignment, customer centricity, a shared vision of what the business is trying to achieve and the willingness to see it through.

Corner-cutting businesses join the sad statistics that surround CRM:

  • Nearly half suffer technical and integration difficulties
  • One third report project failures due to poor business design
  • Almost a quarter realize they need to customize their CRM

A piece of technology plugged into the wall is not what delivers value. Those who think otherwise suffer the all too painful reality of CRM failure, according to John Burton, director of product management on SAP’s CRM team. The benefits of CRM accrue only when you bring the various parts of the enterprise together — aligned and passionate about a common goal — and enable them to work in concert to understand and deliver what customers really need.

What separates winning restaurants from the losers is the ability to bring together delicious food with an environment that inspires employees to put their heart and soul into delivering an indelible experience to customers. For athletes, it’s the common vision and teamwork that results in success.

For CRM, it’s not just about the technology box you buy. Success requires the intersection and alignment of four components: strategy, processes, people and technology.

You need:

So, when it comes to CRM: Think big, but start small. Don’t fall for the magic pill. A successful strategy will require a clear vision of what you are trying to achieve and a passion to see it through.


Recommended for you:

The Social CMO: Ted Rubin On Listening, Relationships, And The Social C-Suite

Todd Wilms

the social CMOAfter doing this awhile, you get to see the signs of the self-promoter and the quick name-for-themselves artists.  You also – with more rarity – get to meet the real deal.  So, I was very pleased when he agreed to sit down and chat on topics ranging from the new directions for marketing, listening and relationships, and why “lurking” in social is a good thing.

1. We have to start off with your title. Why Social CMO?

Before becoming the CMO at Collective Bias, I decided that I really wanted to focus on social and have become tired of the C-suite’s focus total on ROI directly from search and banners and affiliate programs.  It is time to wake up and realize that social is a shell that should be wrapped around everything we do as marketers. You can easily extend this beyond marketing to areas like your supply chain or HR.  So, I took that title believing it expressed a lot better what I am looking to accomplish.

2. Just so everyone understands the context of who you are, explain your company, Collective Bias?

My business partner John Andrews, while serving as Head of Emerging Media at Wal-Mart, came up with the idea of interacting with bloggers to gain insight into real products from real people. It then evolved into a content and media strategy, and then the basis for the Wal-Mart Moms program.  He left Wal-Mart and started Collective Bias based on that idea.  Collective Bias® is a content marketing media company that drives retail sales through the coordinated creation of social media stories. Through Social Fabric®, a private and proprietary community of over 1,400 influencers with a reach of over 30MM , Collective Bias connects shoppers with the brands and retailers shoppers use in their daily lives to drive conversations on a wide variety of social media platforms. Their stories build consumer engagement and brand loyalty, which leads to increased sales.

3. So, is this “Blogging, Evolved?”

Not really the evolution of blogging, more like leveraged and syndicated content as the evolution of media. Bloggers, or micro-publishers are totally democratizing content and creating what truly is “New Media.” I talk to many people who say that they don’t read blogs. When we open up their computer and look at what they do read, 9 out of 10 of their sites are blogs – they just don’t realize because they are so professionally done. Some of the top technology, finance, food and travel information they are reading are from bloggers.

4. Where do companies fail in their efforts to be social?

For years, marketing and advertising has been about control. Consumers now have a heavy hand in the control of your brand… it is now “Generation WE,” and not just with Millennials. There is no more total control by marketers. Any person can spread “their” message of your brand through their social graph at such a dramatic pace.  And the conversation goes on and on – at an accelerated level and pace.

5. Does this apply to PR agencies as well?

Absolutely.  For years, PR was about control of the message.  Say as little as possible and control it yourself.  Now, with social media, it has been turned on its head – other people control and can freely comment on or interact with your message and share their feelings or perceptions.  Most executives in the C-Suite still want to control, but it is too late – you don’t own it any more.

6. So where does the C-Suite go wrong with this control?

C-Suite execs go wrong when they don’t want to understand – they still dismiss it.  I have conversations with execs who say that it is a waste of time because people are just talking about when they go to the bathroom (chuckle), but what they don’t realize is that was so 2006, it is now 2013 and we have moved well beyond that.  People are fundamentally building relationships and aggressively pursuing engaging dialogue within their networks using these social tools. Social media is not a passing fad… and influencers are emerging every day. Welcome to the ‘Age of Influence,’ where anyone can build an audience and effect change, advocate brands, build relationships and make a difference.

Secondly, they miss when they don’t encourage their employees to actively build on these channels.  This is another version of control – wanting to centrally control the message.  But where this is a miss is when you don’t utilize some of your best assets within your company – your people – to help build and enhance your brand and be dynamic advocates for your products and services.   This also leads to a fundamental loss in your opportunities and ability to listen.

7. You talk a lot about listening. Why is this so important?

What is so scary for companies about listening is that they have to hear what is being said about them and that forces a reaction.  What is so great – and so revolutionary – about social media is that it truly gives the opportunity for every person to have a voice and an impact on what they like, don’t like, love, etc. about the products and services they use.  Previously, companies only had a few channels to receive that kind of communication – big customers, or analysts or some partners.  Now, everyone has a voice.

If you allow your employees to listen and really hear what is being said, you actually give them the ability to build relationships with your brand’s supporters and your detractors. This is your ability to build digital relationships.

8. I have heard you call this ‘looking people in the eye, digitally,’ correct?

Absolutely, this is where the idea of relationships has the same importance as before – that old notion of “people do business with people they have a relationship with” is still true – but now we can scale it.  We can now interact with people at scale. Before you were limited in the number of people you could meet or pick up the phone to call or fax to.  Even email was limiting because it was one way and sometimes you could not even reply to some emails. Very often extremely frustrating for consumers.

I hear ‘What do you mean scale – I mean, how many tweets can you answer?’ all the time. What I see happening is that you will gain a lot of traction with the so-called “lurkers” – the silent observers – in your communities and not just with the people you are directly engaging with. Lurkers are engaging with you by watching how you interact with your communities.  These are some of the most important people in your network.

9. The lurkers – those who don’t add anything to conversation – are important?

Absolutely.  Look at it this way – we use the cocktail party analogy for social media all the time.  If you went to a cocktail party and everyone was doing all the talking and no one was listening, nothing would ever get accomplished, because no one would hear anything. You need those folks who listen as a part of that community… for brands very often they are the most valuable, and most often they share in other places… via different social platforms, and with good old face-to-face word of mouth, still a VERY powerful medium.

10. Hence, you just wrote your book on relationships called ‘Return on Relationship.’

Relationships are the new currency… the digital revolution has turned marketing on its head (or so some would have you believe). Just when you thought you had a handle on measuring ROI (Return on Investment), it seems that social media has thrown a monkey-wrench in the whole business. But has it really?

In some ways it has, because traditional formulas for calculating ROI really work better for advertising initiatives—and social is more about communication than it is about advertising. It’s more about developing relationships and nurturing them, which oddly enough is almost a full-circle back to the “before mass advertising” days of face- to-face sales and marketing. In those days we actually met our customers, talked to them and got to know them personally. What a novel concept!

Mass advertising (while it has its place) moved us away from our face-to-face roots, but social is bringing us back. It’s how people today like to receive information and make buying decisions. They talk to each other via social channels. They seek information there, and they want to interact with businesses there directly or vicariously via the interaction of others. If you want to continue reaching your prospects in this social media age, your marketing focus needs to return to building relationships.

ROR isn’t a new concept in marketing; it’s the value that accrues over time through loyalty, recommendations and sharing. It’s a back-to-basics measurement that calculates how well brands create authentic connection, interaction and engagement with customers—and it’s time to re-learn the concept.

 11. You are pretty active on twitter and you write frequently.  Are these good channels for you for listening and communicating?

I have four personal twitter handles… @TedRubin, @R_onR, @Parentng, and @just_b_nice.  What it comes down to is that I am a frustrated author (chuckle).  So I use twitter to express my ideas and to share them for feedback.  Where others might use it for just promoting their or other’s links, I use it like a digital whiteboard.  I sketch out my ideas and thoughts to gain reactions and insights from my community.  This goes back to my idea of truly listening and really hearing what is going on.

12. On Twitter, you shared some ideas on how to use it.  Care to elaborate?

Yes, I don’t think there is a right way or wrong way to use these tools.  I hear from a lot folks who are nervous to try these out because they are afraid of making a mistake.  My guidance is this: do what you want to do.  Does it work for you? Great!  If not, try something else until you get the result you are looking for.  It is really that simple.  Just because I say – or some “guru” says here are the “Top 10 things to do on Twitter” doesn’t mean they are the right things for you to do on twitter.

*My philosophy is that Twitter’s an amazing networking, communication and outreach tool and platform that leads into other forms of social sharing. Do not underestimate the value of those who simply lurk, search, and absorb content.

13. This, I think, leads us down the path of measurements and how to know what works?

Yes.  Look, everyone wants to know that what they are doing is working.  Our problem is that when digital came along in the ’90s we tried to measure it just like we did everything before it.  We applied the old standards of things like “impressions” on that new medium.  We have continued that trend with social and are trying to measure it the same way we do traditional digital, and we often make the mistake of thinking it is the same as all digital advertising just because it lives on digital platforms. This is one of the biggest headaches for marketers today.  Execs want measurements they can’t get – or don’t mean what they think they mean – and marketers struggle to find ways to collect those measurements.

Success” in a social campaign, and an annualized social media calendar, should be determined by the goals for the campaign and an overall long-term strategy… we like to use the term “Conditions of Satisfaction.” Far too often, companies start a campaign simply with the goal of having a “social” campaign, because that’s something they feel like they need to do or have been pitched by an agency. Most Social Marketing “experts” flock to those kinds of clients, and then pick some random metric as success.

In our world of coordinated creation of social media stories at Collective Bias, there are typically two kinds of success, or ROI, on social campaigns – Cost Mitigation, and Sales Increase. And we believe there is a Return on Relationship (ROR) fostered by all brand relevant content and communication… simply put the value that is accrued by a person or brand due to nurturing a relationship. ROI is simple $’s and cents, ROR is the value (both perceived and real) that will accrue over time through loyalty, recommendations and sharing.


Interested in more of what makes the CMO tick? I will be following up with further insights via Twitter @toddmwilms or on LinkedIn.  Big thank you to Ted for this insight.  I think I have 5-6 more blogs from our series of conversations.


Recommended for you:

3 Things To Consider Before You Buy Predictive Analytics

Lindsey Nelson

3 Things To Consider Before You Buy Predictive Analytics

As customers, we amass a large amount of data under our names. We may not realize it, but our store cards, credit cards, Google searches, create a picture of us. What we buy, what we like, what we’re interested in.

All of this information can be used by businesses to help decide how to target us more effectively so we buy their branded product.

How? Some decide by gut instinct but most do so by predictive analytics. So what is it anyway?

According to Webopedia, it is “the practice of extracting information from existing data sets in order to determine patterns and predict future outcomes and trends”. In business, it is used to take current data, paired with historical facts, to understand a specific audience or sector so you can detect risks before they happen or optimize for opportunities to come.

The technology isn’t brand new. In fact, it’s been helping credit card companies determine whether or not their card holders will pay on time. It’s also being by the US CDC to determine where the next flu outbreak will occur.

However, the predictive analytics has grown up and is now available in comprehensive software packages. So if you’re thinking about buying one, make sure to consider these things before doing so.

1. Get a demo

It may sound silly but some don’t try before they buy. Make sure to take note of how time consuming and complex it is. Will it take more time to learn it than to actually use it? If so, don’t waste your money.

2. Learn the power of the tool

Can it automatically detect and learn about operating systems, application frameworks, your organizations applications, database engines, and networking media? Is it compatible with the latest and greatest technology out there? Consumer product operating systems tend to be a bit more advanced than that of enterprises. Make sure you aren’t buying an outdated tool where your employees can’t use their new toys.

3. Consider the price tag

There are a lot of solutions out there, make sure it is cost effective to your environment after evaluating the aforementioned points. Require that your supplier prove their claims by sharing customer references.

If possible, ask to speak to a customer. Find out what the seller’s customer service is like. Without quality support, your implementation and issues that will come up may make the predictive analytics tool not worth your time.

There is no one solution fits all. Some aspects on the wish list will be missing, but don’t use that excuse as a reason against implementing predictive analytics. In fact, if you need a few reasons – here are 7. However, if it’s time efficient, powerful for what you need, and at the right price, then make the purchase. You won’t regret it!

Image from


Recommended for you:

Mobile Accountability V: Pondering The Goals Of US Broadband Mapping

Christine Ekman

The National Telecommunications & Information Association (NTIA) cites the goal of the US Broadband Mapping Project as:

“to increase broadband Internet access and adoption in America, which supports economic growth, job creation, and improved education, health care, and public safety…creating and maintaining the first public, searchable nationwide map of broadband availability; broadband-usage research that can inform efforts to close the digital divide; and promoting digital literacy to help Americans compete in the 21st century economy.”

National Broadband MapAs a mobile analytics service, we like this. This is a good thing. We certainly like that the NTIA is including mobile broadband networks in their mapping project.

This is especially important as we look to an environment where more megabytes are to be transferred on smart devices over mobile networks than on large form devices over more traditional wire line internet.

With the project well under way, many states have searchable and filterable online broadband maps, we pause to note how effectively the objectives of the original goal are being met. Though not explicitly stated, it is clear that, in large part, the National Broadband Map is focused on how best to provide and educate the public about broadband service options. If the mobile adoption trends continue, mobile broadband over Smartphones and tablets will be the platform of choice.

With that in mind we question why individuals can find mobile network performance information about a specific address, but not about an area, or in a map-layer view.  After all the point of mobile is well, moving!  There to be a holdover from fixed wire line measurement. Consider the commonplace home Wi-Fi network that connects through a DSL or a cable modem.

Knowing the download speed the cable or phone company can offer you at the threshold of your house is important because that will be an indicator of how fast you can expect the various Wi-Fi devices on your network to transfer data. Since all the devices are connecting to the internet through this single point of service, knowing the throughput speed at this point made sense.

This single access point, way of thinking very much challenges the basic definition of ‘mobile technology’. People need to know how their mobile devices are going to function at home, at work, on the drive to work, at the in-laws house, etc. using many different access points, not just one. In order to select the best network it is necessary to see performance data over a continuous area not just a fixed point.

Currently the broadband map layers only show aggregated data about network performance and even the number of available providers. So in rural county X you can see that there is only one available network provider and an estimated download speed of 100 Kbps, but you can’t see which provider it is unless you type in a specific address and even then you can’t be sure if down the road a few miles on the way to work it is the same provider. This does not seem to be offering individuals a good way to make a good mobile broadband decision.

A second criticism is the oversimplification of the speed and coverage mapping layers for mobile broadband service. Currently, if we were to look at a map overlay of a city like Denver, we would only see an orange color layer indicating data throughput speeds of <10 mbps. Wow, 10+ mbps everywhere in the Denver metro area, on any carrier. The problem is that you can’t break this down at all to see what network types e.g.: LTE, 3G, CDMA, etc. or which carriers are providing specific speeds.

It’s nearly impossible that the public would regularly see these speeds on a 3G network. We understand that mobile carriers are somewhat private about publicizing data transfer speeds in specific areas, but it does not help anyone to make a carrier or device selection without being able to find what networks are offering these great speeds and in what areas of the city.

Secondly, I live in Denver, my company (Mobile Pulse) headquarters are in Denver, and we have tens of thousands of speed tests run on various networks and device from the Denver metro area—here’s a shocker, our clients very rarely see speeds over 10 mbps, certainly not on an averaged basis. Are these speeds that users are experiencing or are they the “optimal speeds” the network can offer?

These observations of the US Broadband Mapping Project suggest the need to look at the performance of mobile networks with new tools and analysis techniques. The goal is at least in part to provide individuals the coverage and performance of specific mobile network providers and view it on a map layer as opposed to a fixed point.

Also, there is clearly some need to validate the performance claims being made by carrier data. Mobile Pulse, Root Wireless, NetMotion  and Oogla have worked with several states to capture more accurate mobile network performance data. This data offers an in depth view of throughput speeds in an area as found on specific devices and networks. It seems appropriate in the wake the of current broadband map shortcomings, that this new and more accurate data be available and viewable to the public. It would certainly provide a more suitable data set for determining the best mobile network provider for an individual.

  • Do you think that crowd sourcing mobile performance data is the way to get the most accurate mapping analysis?
  • Are your employees satisfied with mobile performance and coverage?
  • Are you using the latest 4G/LTE device and still seeing gaps in mobile service?

This article was a joint effort of Christine Ekman and Chris Affrunti. We look forward to your comments, tweets, shares, likes and insights.


Recommended for you: