Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1
|
|
- Gladys Primrose Newman
- 6 years ago
- Views:
Transcription
1 Utimaco IS GmBH Teo Poh Soon Director CryptoServer Products Aachen, Germany June 2014 Page 1
2 Utimaco Overview 100 % ownership by Utimaco GmbH Corporate Headquarter in Aachen, Germany Offices in USA, UK, Italy and Singapore 180 employees (FTE) LIMS HSM Market leader in LI mediation technology with >200 deployments worldwide Leading in professional HSM solutions for critical infrastructures. > 1100 installations Business unit snapshot Blue chip customer portfolio Highly synergic sales partnerships Demonstrated technology leadership Compliance with all common international LI standards Underpinned by attractive future growth dynamics Focusing on smart grids, fraud detection, digital media protection, cloud services, business processing, Internet of things, automotive, banking and finance Strong benefits for OEM customers High security certifications Target markets driven by high growth rates Selected customers CryptoServer Products Aachen, Germany June 2014 Page 2 Utimaco GmbH 2
3 LIMS: Cutting-edge lawful interception technology Overview Product overview Since 1994, Utimaco provides state of the art lawful interception technologies Main functions include the administration of requests for interception-related information in telecom networks and the delivery to one/several Monitoring Centers of LEAs Utimaco offers since 2010 as well a Data Retention Suite as a carrier-grade system to enable fast and secure access to retained call data by LEAs Fixed network Mobile network ISP ( , VoIP,...) Telecommunication service provider INI (Internal Network Interface) X2 X3 X2 X3 X2 X3 X1 X1 X1 Mediation device 1 Mediation device 2 Mediation device 3 Mediation device n Utimaco LIMS Management server Database Decoder SSL Gateway High-availability module Remote provisioning unit Hl1 Hl2 Hl3 Ll handover interface Law enforcement agency Monitoring center Proven solutions for mobile and fixed network operators as well as Internet service providers LIMS Gateway In 2011, Utimaco won a large tender for a nationwide implementation of its LIMS technology in Australia LIMS Management Server LIMS Access Points CryptoServer Products Aachen, Germany June 2014 Page 3 Utimaco GmbH 3
4 Data retention vs. lawful interception Past Data retention Call detail records Subscriber data Future Lawful interception Call detail records Call content Archival of connection records and subsriber data Legal obligation of service providers Handover interfaces to law enforcement agencies Network interfaces Administration of warrants Access protection Data security Accounting and auditing Applies to voice & data Realtime monitoring of communication Connections records and content No long-term storage CryptoServer Products Aachen, Germany June 2014 Page 4 Utimaco GmbH 4
5 Product Overview SecurityServer or General Purpose HSM protects business critical information against unauthorised access, manipulation and theft. Security Server integrates with systems such as identity management and PKI environments, document management and archiving solutions and many more. Product Information Integrated key management Scalability and high-availability Flexible Framework allows our customer to customize Remote administration, Remote diagnostics Support of standard API interfaces such as: Microsoft CSP, CNG; PKCS#11, JCE Supported OS: Windows; Linux; AIX Available with CSe- and Se- Series. Plug-In Cards and Appliances CryptoServer Products Aachen, Germany June 2014 Page 5
6 Roots of Trust to many Critical infrastructure - Subscriber Authentication - Card Preparation and personalization - Road Pricing System - Payment solution - Conditional Access - Time Stamping - Smart Metering - Cheque Transcation System - Public Key Infrastructure - Document Security - Cloud Services CryptoServer Products Aachen, Germany June 2014 Page 6
7 Manifold opportunities in Smart Networks connecting securely the Internet of Things and Machine-2-machine communication Smart Grids many opportunities, for instance mobility: Secure communication to protect smart grids and safely store cryptography keys underlying that security Utimaco HSMs are secure roots key of certificate issuing authority behind the communication infrastructure of Tesla Model S cars and their whitelabelled customers for on-board communication and the constant battery-maintenance data communication CryptoServer Products Aachen, Germany June 2014 Page 7 Utimaco GmbH
8 Thanks for your attention! Utimaco IS GmbH Germanusstraße Aachen, Germany Phone Web info@utimaco.com Copyright 2014 Utimaco IS GmbH All trademarks are trademarks of the particular copyright holder. Specifications are subject to change without notice. CryptoServer Products Aachen, Germany June 2014 Page 8
Utimaco OX Summit
Utimaco LIMS @ OX Summit Utimaco TS GmbH October 2017 Dirk Börgerding Key Account Manager Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 1 Utimaco Group Company Facts Founded 1983 HQ in Aachen, Germany
More informationUtimaco HSM Introduction JIPDEC Seminar June 2017
Utimaco HSM Introduction JIPDEC Seminar June 2017 Joerg Horn Director Business Development Utimaco HSM Business Unit Aachen, Germany 2016 hsm.utimaco.com Page 1 Part 1 Introduction Utimaco History HSM
More informationUtimaco Portfolio Overview Hardware Security Products and Services
Utimaco Portfolio Overview Hardware Security Products and Services About Utimaco Your Root of Trust Utimaco is a leading manufacturer of Hardware Security Modules (HSMs) that provide the Root of Trust
More informationDATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION
DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION 2 Data Retention Data Retention has become a buzzword in intense debates between data protectors and law makers over the last few years. It refers
More informationSecurity Architecture Models for the Cloud
White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,
More informationPartner Program Overview
Partner Program Overview Utimaco TS GmbH November 2014 Utimaco TS GmbH Aachen, Germany Nov 2014 Page 1 Utimaco s goal is. to implement a successful and trustworthy partnership with our partners leading
More informationUtimaco LIMS TM. Techpaper. Lawful Interception with Umbrella Systems
Techpaper Lawful Interception with Umbrella Systems Table of contents 1 The Challenge... 3 2 Umbrella Systems... 4 3 Abbreviations... 7 25. Aug 2010 Copyright Utimaco Safeware AG 2 of 8 1 The Challenge
More informationPortfolio Overview for Payment & GP HSMs
Portfolio Overview for Payment & GP HSMs Malte Pollmann, CEO Priyank Kumar, Product Management, Payment HSMs Dieter Bong, Product Management, General Purpose HSMs Utimaco HSM Business Unit Aachen, Germany
More informationUtimaco eidas Update. June Thorsten Groetker CTO. Utimaco HSM Business Unit Aachen, Germany 2017 Utimaco eidas Update, June 2017 Page 1
Utimaco eidas Update June 2017 Thorsten Groetker CTO Utimaco HSM Business Unit Aachen, Germany 2017 Utimaco eidas Update, June 2017 Page 1 eidas Agenda Recap eidas, Trust Services, Standardization Signature
More informationeidas compliant Trust Services with Utimaco HSMs
eidas compliant Trust Services with Utimaco HSMs March 15, 2018 Dieter Bong Product Manager Utimaco HSM Business Unit Aachen, Germany 2018 eidas-compliant Trust Services with Utimaco HSMs Page 1 eidas
More informationSafeGuard SecurityServer
SafeGuard SecurityServer The Hardware Security Module for Securing Cryptographic Key Material Transparent Pricing Unlimited connections without extra licenses. Unrestricted use in applications. Compliance
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationHARDWARE SECURITY MODULES DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY
HARDWARE SECURITY MODULES DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY HARDWARE SECURITY MODULES Deployment strategies for enterprise security Organizations around the world are creating open, flexible
More informationIBM and Juniper Networks
IBM and Juniper Networks Transforming and simplifying your network infrastructure S O L U T I O N B R I E F Enabling strategic advantage in a changing world A less expensive energy bill, a package that
More informationAlcatel-Lucent 1357 ULIS
Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationMonitoring obligations. DataBridge : Fulfil CSP requirements for communcations monitoring
Monitoring obligations DataBridge : Fulfil CSP requirements for communcations monitoring DataBridge Flexible communications monitoring 2 Meeting your obligations flexibly As terrorists and organised criminals
More informationThales e-security. Security Solutions. PosAm, 06th of May 2015 Robert Rüttgen
Thales e-security Security Solutions PosAm, 06th of May 2015 Robert Rüttgen Hardware Security Modules Hardware vs. Software Key Management & Security Deployment Choices For Cryptography Software-based
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More informationMONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.
MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. DataBridge Flexible communications monitoring Meeting your obligations flexibly As terrorists and organized criminals take
More informationPKI is Alive and Well: The Symantec Managed PKI Service
PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions
More informationHP Investigation (Dragon Data Retention and Guardian Online) solutions
HP Investigation (Dragon Data Retention and Guardian Online) solutions HP Dragon Blue IP Probe Deep Packet Inspection Solution brief HP Investigation is committed to help organizations to handle massive
More informationHARDWARE SECURITY MODULES (HSMs)
HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical
More informationGöran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden
Göran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden M2M An enabler of Smart Grid 2 OUR CREDENTIALS We have over 200 people dedicated to M2M in our organisation
More informationUtimaco LIMS. Lawful Interception of Telecommunication Services
Lawful Interception of Telecommunication Services 2 LIMS worldwide Lawful Interception Lawful Interception (LI) is the legally approved surveillance of telecommunication services, and has become an important
More informationM2MD Communications Gateway: fast, secure, efficient
Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.
More informationNext Level Remote Access
Next Level Remote Access Next Generation Network Access Technology www.ncp-e.com Next Level Remote Access VPN Since the company was founded in 1986, NCP has been committed to making deploying, using and
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationSecurity for Wireless Handhelds
wireless security solutions security applications developer toolkits professional services Security for Wireless Handhelds integrating strong, transparent security without increasing costs or time-to-market
More informationBuild VoLTE Services using NFV & Cloud Reduce complexity and increase RoI
Build VoLTE Services using NFV & Cloud Reduce complexity and increase RoI Vivek Bhargava Director, Product Marketing Oracle Communications Oracle In Communications R&D, product strategy, sales and services
More informationHosted Secure Tokenization Module
Hosted Secure Tokenization Module Agenda Tokenization Definition Tokenization Explained Tokenization Benefits Ultra Infrastructure Diagram Ultra Token Management Ultra Benefits Ultra Performance Ultra
More informationBringing Business Value to Object Oriented Storage
Bringing Business Value to Object Oriented John Hufferd Senior Director of Technology May 15, 2007 Legal Disclaimer All or some of the products detailed in this presentation may still be under development
More informationTaking Back Control of Your Network With SD-LAN
IHS TECHNOLOGY SEPTEMBER 2016 Taking Back Control of Your Network With SD-LAN Matthias Machowinski, Senior Research Director, Enterprise Networks and Video TABLE OF CONTENTS Access Networks Are Under Pressure...
More informationIntegrating Communications Compliance into the Next Generation 4G LTE Network
SS8 : WHITEPAPER : INTEGRATING CC INTO THE NEXT GENERATION 4G LTE NETWORK Integrating Communications Compliance into the Next Generation 4G LTE Network All telecommunication providers that currently or
More informationSymantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010
Symantec To Acquire VeriSign s Identity and Authentication Business May 19, 2010 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities
More informationTrusted Identities That Drive Global Commerce
Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance
More informationGSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System
Cryptography Network Security GSMK Firewall and Intrusion Detection System GSMK Firewall and intrusion detection system to prevent attacks via interconnect. Protect your Network s Achilles Heel. With the
More informationM2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres
M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications
More informationLawful Intercept Overview
CHAPTER 1 This chapter provides information about Lawful Intercept and contains the following sections: Information About Lawful Intercept, page 1-1 Network Components Used for Lawful Intercept, page 1-3
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationMobile, Fixed, and Broadband Network Services
CUSTOMER CASE STUDY Telefónica Type of Company: Specialty: Global Telecommunications Provider Mobile, Fixed, and Broadband Network Services Accedian Solutions: SkyLIGHT Performance Assurance Platform,
More informationMeeting FFIEC Meeting Regulations for Online and Mobile Banking
Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationDeliver Data Protection Services that Boost Revenues and Margins
FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing
More informationLogicalis. Leon Bouwer Sales Specialist IM/ECM/Big Data
Logicalis Leon Bouwer Sales Specialist IM/ECM/Big Data About Logicalis Group Logicalis is an international IT solutions and managed services provider with a breadth of knowledge and expertise in communications
More informationM2MD Communications Gateway: fast, secure and efficient
Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular
More informationCian Kinsella CEO, Digiprove
Cian Kinsella CEO, Digiprove cian.kinsella@digiprove.com Malaga 7 th June 2013 Been developing software since 1972 Commercial and Freelance Co-founder of 3 Software Product Companies Have had many different
More informationPrivacy Policy. (GDPR compliance)
Privacy Policy (GDPR compliance) Summary This privacy policy sets out the data processing practices carried out by MSE Meeting Rooms. We process personal information through the use of the telephone, a
More informationCardOS Secure Elements for Smart Home Applications
Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.
More informationOn Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor
On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com
More informationSolutions Overview. Nortel Networks. Preside. Next-Generation Management Solutions
Solutions Overview Nortel Networks Next-Generation Management Solutions Giving Service Providers a View to the Future Today A place where you can......rapidly create new services...attract new customers...discover
More informationSierra Wireless. Corporate Overview. May 2017
Sierra Wireless Corporate Overview May 2017 Sierra Wireless Leader, Innovator, Trusted Partner in the IoT IoT Leader in device-to-cloud solutions Innovator essential IP in Cat M1 edge intelligence open
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationA Cloud WHERE PHYSICAL ARE TOGETHER AT LAST
A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT
More informationSoftware Defined Storage
Software Defined Storage IBM Spectrum Portfolio Ian Hancock ian.hancock@uk.ibm.com Business challenges are IT challenges Create new business models (CEO) Transform financial & management processes (CFO)
More informationKerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook
Kerio Cloud Cloud Hosted Enterprise-Class Email, Calendars, Contacts, Tasks, and Instant Messaging Twitter LinkedIn Facebook Presented by Adam Bielawski June 15, 2016 Why Kerio? Kerio provides safe, simple,
More informationIntegration Guide. PrimeKey SignServer Ubuntu
Integration Guide PrimeKey SignServer Ubuntu Integration Guide: PrimeKey SignServer Imprint copyright 2014 Utimaco IS GmbH Germanusstrasse 4 D-52080 Aachen Germany phone +49 (0)241 / 1696-200 fax +49 (0)241
More informationOrange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November
Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell
More informationGetting to Grips with Public Key Infrastructure (PKI)
Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue
More informationIdentity and Authentication PKI Portfolio
Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime
More informationSecuring V2X communications with Infineon HSM
Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security
More informationCarrier Reliability & Management: Overview of Plivo s Carrier Network
Carrier Reliability & Management: Overview of Plivo s Carrier Network Build your company on direct connections with access to 1600+ carrier networks WWW.PLIVO.COM/CARRIERS Global Coverage with Latency-free
More informationDrive digital transformation with an enterprise-grade Managed Private Cloud
Singtel Business Product Factsheet Brochure Managed Private Defense Cloud Services Drive digital transformation with an enterprise-grade Managed Private Cloud Singtel Managed Private Cloud enables enterprises
More informationCompliance and Security in a Cloud-First Era
Compliance and Security in a Cloud-First Era Regions: Dublin (EU-West) 3 x Availability Zones Launched in 2007 Frankfurt (EU-Central) 2 x Availability Zones Launched 2014 Edge Locations: Amsterdam,
More informationCorporate Guideline. Export Compliance Policy
Export Compliance Policy Table of contents EXPORT INFORMATION ON UTIMACO PRODUCTS... 3 GLOBAL EXPORT CONTROLS... 4 GOBAL EXPORT CONTROLS PRODUCT CLASSIFICATION... 5 2 EXPORT INFORMATION ON UTIMACO PRODUCTS
More informationManaging your Cloud with Confidence
Mobility Cloud and Security Managing your Cloud with Confidence Stephen Miles VP Service Assurance - APJ Agenda The Digital Revolution and the changing IT Landscape Management challenges in the new world
More informationVodafone Analyst & Investor Day Monday 27 September 2004
Vodafone Analyst & Investor Day Monday 27 September 2004 Verizon Wireless Andy Halford Chief Financial Officer 1 Safe Harbor Statement NOTE: This presentation contains statements about expected future
More informationMAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP
MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP APR 2018 MARC GEBERT EMEA IOT SECURITY BD LEAD SENIOR DIRECTOR Secure Connections for the Smarter World Everything Smart Everything
More informationTHALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION
www.thalesesecurity.com THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION Enterprises are committing to a digital transformation initiative by embracing new opportunities and building
More informationUse Digipass two-factor authentication
DIGIPASS BY VASCO Secure your business Use Digipass two-factor authentication S T R O N G s tat i c PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l i c K E Y I N F R A S T R U C T U R E digipass
More informationThe Road to a Secure, Compliant Cloud
The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationASX IPO NOW LIVE. Key Points
ASX IPO NOW LIVE Key Points Vonex s ASX IPO to raise up to $7 million is now live To view the IPO Prospectus and apply online visit https://investors.vonex.com.au/offer/ Nearly fully underwritten by State
More informationInvestor Presentation. February 2016
Investor Presentation February 2016 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended,
More informationScalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018
Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:
More informationAAA Authentication: New Use Cases
AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf
More informationConquer New Digital Frontiers with leading Public Cloud Platforms.
Singtel Business Product Factsheet Brochure Managed Defense Public Cloud Services Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Managed Public Cloud supports enterprises in
More informationITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016
ITU Workshop Combating grey devices Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016 Security solutions Qualcomm s vision Theft Deterrence Enterprise
More informationApple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...
More informationNew Business. Opportunities for Cellular IoT. Loic Bonvarlet Director of Marketing Secure Identity Arm. Copyright 2018 Arm, All rights reserved.
New Business Opportunities for Cellular IoT Loic Bonvarlet Director of Marketing Secure Identity Arm Key Takeaways Cellular IoT market worth $9.65 Billion by 2025 (CAGR: 21.4%)* New SIM technologies unleash
More informationStreamlining Lawful Intercept for WiMAX Networks
White Paper Streamlining Lawful Intercept for WiMAX Networks f f Meet stringent lawful intercept requirements for monitoring WiMAX IP-based voice, data and multimedia traffic f f Comply with lawful intercept
More informationDigi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited.
Certificate Practice Statement v3.6 Certificate Practice Statement from Digi-Sign Limited. Digi-CPS Version 3.6. Produced by the Legal & Technical Departments For further information, please contact: CONTACT:
More informationDisruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise
Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions
More informationWEB-APIs DRIVING DIGITAL INNOVATION
WEB-APIs DRIVING DIGITAL INNOVATION Importance of Web-APIs Simply put, Web-APIs are the medium to make a company s digital assets consumable to any channel, which has a current or latent need. It helps
More informationOver the Top (OTT) Provision of Telecoms Services in Nigeria
Over the Top (OTT) Provision of Telecoms Services in Nigeria Presentation Delivered at the Bicsi Conference & Exhibition 2017 By Engr. Gbenga Adebayo ALTON Chairman August 17, 2017 Introduction The Association
More informationINTERNET OF THINGS KONTRON
INTERNET OF THINGS SECURITY @ KONTRON EMBEDDED COMPUTING CONFERENCE 2017 ECC WINTERTHUR SEPTEMBER 5 TH, 2017 AGENDA 01 INTRODUCTION 02 SECURITY LAYERS 03 KONTRON & S&T // 2 WHAT IS IN IT FOR YOU THROUGH
More informationAccelerate Your Cloud Journey
Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension
More informationAn Introduction to the Max PVN
An Introduction to the Max PVN Net2Phone Overview 2 VoIP Leader Net2Phone is a leading provider of VoIP products and services throughout the world #1 worldwide for retail VoIP services Proven, scalable
More informationData Use and Reciprocal Support Agreement (DURSA) Overview
Data Use and Reciprocal Support Agreement (DURSA) Overview 1 Steve Gravely, Troutman Sanders LLP Jennifer Rosas, ehealth Exchange Director January 12, 2017 Introduction Steve Gravely Partner and Healthcare
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationCloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.
Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and
More information2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE
Co-Host Host 2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its
More informationStrengthen hybrid cloud operations and controls with Liquid Sky. Singtel Business
Singtel Business Product Factsheet Brochure Managed Singtel Liquid Defense Sky Services Strengthen hybrid cloud operations and controls with Liquid Sky Singtel Liquid Sky is a hybrid cloud management portal
More informationVault Systems. Using IBM NeXtScale to disrupt industry with secure, cost-effective private cloud. Overview. IBM Systems & Technology Case Study
Vault Systems Using IBM NeXtScale to disrupt industry with secure, cost-effective private cloud Overview The need Vault Systems was established in partnership with software provider JN Solutions to build
More informationFUJITSU Backup as a Service Rapid Recovery Appliance
FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports
More information2nd ETSI Security Workshop Future Security. Lawful Interception standardisation, Retained Data
2nd ETSI Security Workshop Future Security Activities in ETSI/TC LI Lawful Interception standardisation, Retained Data Peter van der Arend Royal KPN Netherlands; Chairman ETSI/TC LI 1 Why Lawful Interception
More informationETSI Security Standards Workshop January 2006
ETSI Security Standards Workshop Adrian Scrase ETSI CTO adrian.scrase@etsi.org 1 Welcome to ETSI 2 ETSI is A European standards organization Active in all areas of ICT Setting globally-applicable standards
More informationScalable Security solutions to enable Cyber Security and to manage Digital Identities
Scalable Security solutions to enable Cyber Security and to manage Digital Identities It s all about managing identities GIC@CeBIT 2017 International Cyber Security Conference Axel Deininger 20.03.2017
More information