Monty Mobile announces partnership with Unico providing a complete eSIM consumer ecosystem

Monty Mobile announces partnership with Unico providing a complete eSIM consumer ecosystem

Monty Mobile has signed a reseller agreement with Unico to sell and implement the uPair Entitlement Server into the Middle East and African markets. Monty Mobile will be supported by Unico in deploying uPair, an end-to-end world-class Entitlement Server for Mobile Network Operators (MNOs) which aims to drive down costs and address an underserved market in the region.

uPair enables fast end-user activation of primary and secondary eSIM services without the need for on-premises deployment. It allows users to connect multiple SIM and eSIM enabled devices to one number and service – including Google, Samsung, and Apple products. uPair leverages RESTful and TMF interfaces along with a range of additional functions providing support for the comprehensive lifecycle management of connected mobile and wearable devices.

Monty Mobile and Unico will support MNOs with device manufacturer certifications and training to ensure world-class customer service. This alliance will drive the creation of advanced solutions in the smart connectivity space and establish a complete world-class eSIM solution within ME & Africa.

About Monty

Monty Mobile positions itself as a leader in SMS/VAS and eSIM technologies, facilitating the international flow of Voice and SMS across global markets, by working closely with worldwide enterprises aggregators and mobile operators.

With more than 20 years of experience, Monty Mobile has become a key regional player in the telecommunication business, delivering the promise of the best possible digital innovative technologies; eSIM solutions being the core of the collaboration with Unico.

Monty Mobile is recognised for its in-house development, customised state-of-the-art products, and services. And in its quest to constantly evolve, it has partnered with Unico, providing a complete eSIM solution, including it on wearables.

About Unico

Unico was founded by Geoff Illing and Mike Palmer in 1984 to solve some of the most complex business and technology problems across Australia & Asia Pacific.

Now boasting a team of nearly 160 members across Australia, Unico is proud to offer its customers full onshore service and support. Its team of highly skilled professionals understand the technology landscape and the business challenges faced by Australian organisations.

Working with some of Australia’s largest organisations within Telco, eCommerce, racing, consumer business, utilities and defence, Unico is highly regarded within the tech industry for the reliable delivery of career-spanning work, including an unbreakable solution for Australia’s largest Telco.

The team of software engineers, developers, technology specialists and consultants are passionate about helping Unico’s customers deliver their business strategy through seamless and smart technology solutions, striving to deliver a high level of service and customer experience.

For interviews or additional information, please contact:

Monty Mobile – Farouk Tabbal | +61 +96170602065 |

Unico – Jessica Magree | +61 432 559 212 |

Case studies

uPair a world class Entitlement Server for Telstra

uPair a world class Entitlement Server for Telstra

Telstra’s investment in the uPair entitlement server empowers customers to use the built-in cellular capability of their wearable technology. 


  • An easy to integrate, entitlement server solution with low entry cost for the customer’s end users.
  • Compatible with Apple & Samsung devices.
  • High availability, low latency, and fault-tolerant provisioning system.
  • CRM integration and customer entitlement management.
  • Built-in multiple edge case scenario capability & ACID compliance.
  • Enables new revenue subscription streams.

In 2017, Telstra chose long term partner Unico and our uPair product to be part of the global launch of the Apple Watch into the Australian telecommunications market. The uPair entitlement server enables Telstra customers to connect multiple SIM and eSIM enabled devices to ‘Telstra One Number’.

With the built-in cellular capability of Apple Watch (GPS + cellular), the ‘Telstra One Number’ connection allows customers to bundle wearable devices into a low-cost entry point at $5 per month1. This gives customers the freedom to leave the house without their mobile handset. Leveraging uPair entitlement capabilities with Telstra One Number product was an Australian first and allows customers to share a single number with multiple devices, with accurate subscriber identification information within the Telstra network.

“Telstra selected Unico to deliver our mobile entitlement and Websheet server because of their deep integration with Telstra systems.

Unico played an integral role in the launch of the 2017 Apple Watch and were critical in enabling a brilliant customer experience.”

– Miklos Horvath, Group Owner Converged
Service Enablement, Telstra

Our team worked with the Telstra architecture and design teams to deliver the entitlement server as part of ‘Telstra One Number’. The full solution involved collaboration and integration between Telstra, Apple, Ericsson and eSIM vendor G&D. The uPair product incorporated third party API’s, Telstra API’s, our own family of new API’s, and with the workflow management and Websheet portal delivered a premium user experience.

Our turn-key entitlement server allowed Telstra to focus on the strategy and product roll out needed to deliver and support ‘Telstra One Number’. uPair successfully abstracted third party API’s, the paired relationship lifecycle management and all related data and user interfaces.

“Telstra One Number has been a highly successful value add service and boosted average revenue per user. Our customers can now get their number on their wrist for $5 per month1.

With the ongoing growth of Telstra One Number, we look forward to expanding our capability to include Google WearOS, connected car, and Apple Family Plans in the near future.”

– Miklos Horvath, Group Owner Converged
Service Enablement, Telstra

uPair provides Telstra with a telco grade, real-time highly available entitlement service that was able to meet the aggressive timelines of the 2017 Apple Watch launch. Unico developed and customised the uPair product, and successfully integrated it into the Telstra network on time. The ‘Telstra One Number’ roll out exceeded Telstra’s expectations, as evidenced with high adoption and customer satisfaction rates. Unico also subsequently played an integral role in the launch of the Samsung Galaxy Watch into the Australian market.

Thousands of Australians are connected to the Telstra network for phone calls and messages via their wearable devices using uPair software.

1 Telstra pricing correct as at September 2021.

Jason Bodsworth

Business Development Manager

+61 3 9865 9179

Case studies

SAFe Agile adoption (including DevOps with Agile) and organisational change management

SAFe Agile adoption (including DevOps with Agile) and organisational change management

Unico supported a leading Australian Telco transform organisationally to meet future needs of customers and improve adoption of a ‘cloud-first’ approach and SAFe Agile ways of working, including DevOps with Agile.


  • Real time charging and billing functions
  • Improved people, culture and capability of a cloud-first principle and Agile ways of working
  • Uplift of software quality
  • DevOps with Agile approach
  • Joint organisation change management plan
  • SAFe Agile delivery and SAFe coaches
  • Data driven decisions.

A leading Australian Telco recognised the necessity to completely transform to continue to meet the future needs of its customers. It sought improved people, culture and capability via the adoption of a cloud-first approach and Agile ways of working to increase competence, knowledge, team performance, improved organisational governance, harness and improve innovation opportunities and decrease time to market for a new product through implementation of DevOps with Agile approach.

The project called for a new approach for more effective change management and improved governance, including adopting a whole of business Future Ways of Working (FWOW) transformation.

Key objectives:

• Improve responsiveness for internal and external customers

• Compress the time taken to market for new and updated product

• Increase operating efficiency

• Uplift software quality

• Lower resourcing costs

• Increase visibility of the development pipeline between the two partners

• Undertake the change with a seamless transition representing minimal disruption.

We worked closely with the Telco to form a Joint Organisation Change Management Plan. The plan included a shared transformation vision and plan, clear roles and responsibilities between the Telco and our team. Shared Tools that supported collaboration and alignment between the SAFe Coach and the Telco’s FWOW Coaches were adopted, and Unico led the adoption of SAFe agile delivery across the partnership.

The Telco is now empowered by transparency and this leads to evidence and data driven decision making. This ensures there is clearer visibility on its product roadmap and the organisation is positioned with the confidence to deliver to it. The result for the customer is that they are delivering more effectively and with greater consistency.

Jason Bodsworth

Business Development Manager

Case studies

Online Charging System (OCS) integration eliminating bill shock

Online Charging System (OCS) integration eliminating bill shock

We supported a leading Australian Telco to eliminate bill shock through an Online Charging System (OCS) integration providing real time charging and billing functions.


  • Real time charging and billing functions
  • OCS management and orchestration
  • Mapping OCS specific API’s
  • Core IT systems underwent minimal change
  • Elimination of bill shock.

A leading Australian Telco was receiving negative feedback due to bill-shock from excessive mobile data usage, from both domestic and international mobile traffic. In addition, the Australia Regulator (ACMA) was moving to enforce protection for customers against such bill-shock for roaming data. As a result of this and the desire to improve the customer experience, the Telco wanted to move towards a ‘real-time’ charging solution that involved the introduction of an Online Charging System (OCS).

The OCS Integration Layer allowed a series of the Telco’s defined interfaces to be supported into the network, with the OCS managing any orchestration, mapping to OCS specific API’s, and commands and data models – especially as these OCS API’s and commands evolved over numerous versions. This allowed the Telco’s ‘Core’ IT systems to undergo minimal change and be isolated from the numerous lifecycle upgrades that occurred in the network and Online Charging System architecture.

The solution bridged the gap between classic networks and the ‘IT’ systems that delivered the rating, charging and billing function for hundreds of thousands of orders daily with very low fallout, whilst maintaining a regular release program.

Case studies

Defence Telco migration to a microservice database

Defence Telco migration to a microservice database

Our team helped a key Defence Telco enhance a Network Design Tool and migrate to a microservice database. The project included uplifting the design tool to achieve greater automation, reduced errors and better visibility.


  • Reduction in errors and enhanced visibly
  • Transition to Microservices based architecture
  • Migration to a microservice database.
  • Automatic generation of design artefacts.

As the services the Defence Telco provided to Defence evolved, the design tool had not been updated in-line with the changes and significant manual tasks were required. The Defence Telco contracted us to work on uplifting the design tool to achieve greater automation, reduce errors and better visibility for Defence.

A sprint plan was provided that outlined the content of each sprint, including the business value that would be delivered in each iteration. While this formed the foundation for the commitments to the Defence Telco, requirements and design were continuously evolved and improved upon in each iteration and for each Sprint, and the Defence Telco had the opportunity to refine or re-prioritise tasks.

The existing solution was a Ruby on Rails monolith application. The uplift work that we performed transitioned the solution to a Microservices based architecture. This provided the Defence Telco flexibility and the additional benefit of allowing development across differing classifications. As Microservices are independent of each other, new services may be developed in an unclassified environment while others are developed in a classified environment.

The applications included:

•  Site application providing summary information regarding a Defence site

• ‘Baseline’ application allowing the automatic generation of design artifacts at a given point in time

• Document application managing linkages to reference and design documents

• Concession application managing design concessions and variances

• Approval application tracking and linking design approach.

The solution resulted in several enhancements and automatic generation of two key design artefacts that previously required creating a document and significant manual work.

Jason Bodsworth

Business Development Manager

+61 3 9865 9179

Case studies

Agile data migration of ICT personnel resources

Agile data migration of ICT personnel resources

A leading Global Telco’s ICT platform had reached the end of life and would no longer be supported. After a thorough market evaluation and procurement process, the Telco selected the Matrixx Digital Commerce Platform (DCP) to deliver the RTC program and agile data migration for all their mobile subscribers.


  • Migration of 8 million subscribers
  • Matrixx DCP
  • Agile SAFe™ management and principles
  • Delivered in 7 weeks, 6 weeks ahead of schedule.

Unico was engaged to deliver agile data migration and to ensure multiple stakeholders and relevant system owners were openly collaborating and meeting complex cross-system interfacing requirements.

It was unknown at the start of the engagement what the performance of the legacy platform and interfacing systems was. Therefore, we needed to plan based on our experience with similar technologies and approaches.

This allowed our team to work back from the required completion date and schedule the project accordingly to ensure there were no slippages. The solution we developed was executed through the implementation of our customised Unico migration solution which interacted with the Telco’s middleware.

UMT was designed specifically to follow the Matrixx DCP processes allowing the seamless transition of working documents and the Telco’s ability to continue working throughout the migration on other related critical activities and BAU tasks.

During the migration, the UMT tool was required to hold and retry transaction types for subscribers who were still part of the migration, without causing service failure and with minimal impact. The migration tool also ensured that services did not get migrated in the event of failure during migration.

Unico used a hyper ‘Agile’ approach adhering to SAFe™ management practices and principles. In doing so, we adopted all relevant practices, values and methodologies as defined by the SAFe™ methodology.

Unico successfully migrated all 8 million of the Telco’s prepaid subscribers to Matrixx DCP, the new system and real-time charging. The project was delivered ahead of time in 7 weeks (estimated 13 weeks), there was zero downtime of the migration tool.

Jason Bodsworth

Business Development Manager

+61 3 9865 9179

Business update Partners

The largest Oracle MySQL NDB Cluster in the Southern Hemisphere

The largest Oracle MySQL NDB Cluster in the Southern Hemisphere

When one of Australia’s largest telecommunications providers needed a new mission-critical platform for provisioning millions of mobile, fixed, and broadband services, they turned to us – Australia’s leading Oracle MySQL technology partner – to develop a solution.

We developed an “always on technology” mobile provisioning and fixed service orchestration solution that deployed the largest Oracle MySQL NDB Cluster in the Southern Hemisphere.

The solution stores millions of services and involves:

  • Taking provisioning orders from multiple CRMs and orchestrating these orders across many network devices to activate fixed and mobile services.
  • Maintaining a comprehensive service inventory of customer network data that is used throughout the provisioning process.
  • Complex service and cross service orchestration when provisioning these services into various network systems.
  • Zero touch provisioning, with self-healing through existing state determination and use of automated retry with no manual intervention.
  • Fully configurable so new services and devices can be added as needed.

Oracle MySQL enabled us to deliver a single centralised database for all service inventory data resulting in significant cost savings. These solutions incorporated the MySQL database and have benefitted extensively from its function, performance, and reliability.

We have been working with Oracle MySQL for over ten years, resulting in numerous highly complex mission critical technology solutions. We have also deployed the Oracle Communications Service Gateway (OCSG) into a leading Australian Telco to provide a ‘Network As A Service’ (NaaS) gateway.


Four ways to protect your investment in IoT from cybersecurity threats

Four ways to protect your investment in IoT from cybersecurity threats

IT professionals are used to thinking about how to protect our information technology assets from cybersecurity threats. Data loss, data theft, exposure, identity theft and ransom attacks are the menu du jour. As we move towards Industry 4.0 internet of things (IoT) is connecting operational technology (OT) to the network at breakneck speeds, raising the stakes for cyber-attacks to the levels of tales we see in dystopian fiction.

We have seen nation-state attacks against nuclear power plants (India, November 2019), as well as widespread attacks on IP connected surveillance cameras. Just today it was announced that  a major cyber security attack has been identified by the Australian government. However, threats like ransomware take on a new form: consider a farm with hundreds or thousands of IoT sensors being held ransom under the treat that their crop may be flooded just before harvest, sending them into financial ruin. 

cybersecurity threats
Recent attacks have highlighted just how vulnerable Australian government and business are to malicious cyber attack.

OT security is no longer speculative; this week we have seen exposure of attack surfaces in the networking stacks of embedded devices. Nineteen vulnerabilities were discovered in the Treck TCP/IP library commonly in use in IoT devices, four of which are considered critical.

Physical security used to be the primary concern for OT managers, but now we must consider a broader landscape due to cybersecurity threats. 

How do OT cyber-attacks work? 

In addition to securing the back-office systems the devices talk to, OT security professionals now need to look at the devices themselves. The attack vectors can be broken into four key areas of concern. 

1) Device firmware: This is the software running the device and comprises the base operating system on the device and the application sitting on top of this. Both elements will make use of code which is either subject to unintentional vulnerability via defect, or introduction of malicious artefacts through open-source libraries in use. 

2) Device hardware: There are common protocols in use to communicate between the hardware elements of IoT devices which can be the subject of attack. The very common I2C and one-wire protocols connect sensors and actuators to a device and are prone to being sniffed if physical access is available. 

3) Device APIs: IoT devices are useless unless they are connected to a back end, and these interfaces or application program interfaces (APIs) are often vulnerable to attack. The same attack tools used to attack web servers can be used to attack IoT devices; most common weaknesses exploited are default usernames/passwords, weak passwords, and hard-coded passwords, but buffer overrun attacks are also a concern for the transport protocols in use (HTTPS in most instances) where the attacker uses carefully constructed URLs to attempt to break into the API. 

4) Radio networks: Wireless communications are a dream come true for an attacker, removing the need for physical access to carry out an attack. Open discovery protocols or weak network configuration can leave devices open to man-in-the-middle attacks which potentially expose user or API credentials, allow actors to extract, inject or otherwise change device data or allow actors to alter the state of actuators by replaying or inserting commands on the device interface. 

“Physical security used to be the primary concern for OT managers, but now we must consider a broader landscape.”

So, what can you do?

We have found that there are four components to an effective protection strategy for IoT assets from cybersecurity threats.

1) URL filtering: This is the practice of recognising URLs that are known sources or destinations for cyber-attacks. In the case of IoT it is particularly important to manage this access to prevent BotNet attacks which can generate significant amounts of traffic or computational load. 

2) Behavioural assurance: IoT devices are typically low power, low data bandwidth devices so many will fit into one of a few behavioural patterns. Once a pattern is selected for a device, we watch traffic for patterns outside this behavioural definition. For example, a period of high data utilisation when the device has been classed as low bandwidth, or traffic generation during a period when the device should be dormant. 

3) Behavioural profiling: Patterns of behaviour can be established quickly for IoT devices. Artificial intelligence (AI) algorithms can be trained early in a device life cycle to understand the expected behavioural profile of a device, observing low traffic under normal circumstances, occasional high traffic due to an event, and seeing traffic to several legitimate destinations. Once established, the AI can continue to scan the traffic, watching for changes in this behavioural profile to understand when an attack is imminent, or under way. 

4) Global threat profiling: If you have access to enough devices, AI algorithms can begin to learn the patterns of the threat actors as well. This can be applied to the entire population of devices under protection, meaning that new threats can be identified and acted on more rapidly than would be otherwise possible. 

Choose the right protection and integrator  

Unico have extensive experience delivering tailored solutions that meet the specific needs of our customers. Alongside Allot, one of our strategic partners, we have a product that provides four comprehensive modes of protection for your IoT infrastructure: 

  • URL filtering 
  • Behavioural assurance 
  • Behavioural profiling 
  • Global threat profiling 

If you would like to find out more about protecting your business or your customers business from cybersecurity threats, then please get in contact as I would be happy to show you how the Allot IoTSecure Service can provide affordable, multi-tenanted IoT protection solutions ready to ship to your customers out of the box. 

Bruce McCole

Principal Consultant


Telco Software Solutions

‘Always on’ mission-critical systems – Unico’s telco software solutions.

telco software solutions

Supporting Australian business 

With over 35 years of experience with telco software solutions, Unico have a team of inspired Australian based software engineers and technology specialists that are ready to lead the industry into a digitally transformed world.

Deliver working solutions

Cross company orchestration

We believe in empowering our customers to select and use best-of-breed solutions without constraint. At Unico we have significant experience in designing and delivering multi-vendor integrations into Tier 1 telcos, delivering working solutions. Our team are recognised within industry for doing whatever it takes to ensure our customers get exactly what they need.

At Unico we bridge the gap between IT and telco – we simplify the complex and create elegant and insightful solutions for our customers. Our team work to industry standards and are closely aligned with the TM Forum to ensure we are working with the newest and best telco grade solutions for intercompany delivery.

Network efficiency

Having a network that is efficient at every minute of every day is now mandatory due to unprecedented new levels of network traffic. Historically spikes in traffic have occurred during different times of the day over various separate network segments. However network usage has now flattened and spread to new non-traditional areas outside CBDs including outlying suburban and rural locations.

Now more than ever your network needs to adapt in real time to meet customer expectations and needs. Our team can help you scale fast, adapt to the increasing demands and reach full potential.


Digital transformation

In this period of accelerated digitisation, it has never been more important for your business to be ‘digital’ ready. Many large telco’s are struggling under the weight of implemented transformation strategies that use outmoded architectures and costly lift and shift strategies. Unico embrace and invest in new telco digital transformation strategies that enable you to undertake intelligent transformation and increase speed to market in order to encourage business continuity.

Network resiliency

Closed Loop Autonomous Operations (NoOps) is key to delivering real-time resiliency customised for every customer. The power of automation allows you to to identify network faults and repair in seconds, largely without human intervention. Our team can help you enjoy the same operational benefits as Facebook, Google and Netflix, without heavy investment or custom orchestration.


Network protection

The business network has escaped the box of corporate premises now, and with that comes increased risk to the business as your employees access sensitive data over public networks. Virtual private network (VPN) solutions have been around for years, but don’t scale. Your customers need a more intelligent telco software solution for the protection of their digital assets – we are well positioned to help you provide this protection at a fraction of the cost without compromising capability.

We can help you


Our capabilities

Case studies


Jason Bodsworth

Business Devlopment Manager