Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1

Size: px
Start display at page:

Download "Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1"

Transcription

1 Utimaco IS GmBH Teo Poh Soon Director CryptoServer Products Aachen, Germany June 2014 Page 1

2 Utimaco Overview 100 % ownership by Utimaco GmbH Corporate Headquarter in Aachen, Germany Offices in USA, UK, Italy and Singapore 180 employees (FTE) LIMS HSM Market leader in LI mediation technology with >200 deployments worldwide Leading in professional HSM solutions for critical infrastructures. > 1100 installations Business unit snapshot Blue chip customer portfolio Highly synergic sales partnerships Demonstrated technology leadership Compliance with all common international LI standards Underpinned by attractive future growth dynamics Focusing on smart grids, fraud detection, digital media protection, cloud services, business processing, Internet of things, automotive, banking and finance Strong benefits for OEM customers High security certifications Target markets driven by high growth rates Selected customers CryptoServer Products Aachen, Germany June 2014 Page 2 Utimaco GmbH 2

3 LIMS: Cutting-edge lawful interception technology Overview Product overview Since 1994, Utimaco provides state of the art lawful interception technologies Main functions include the administration of requests for interception-related information in telecom networks and the delivery to one/several Monitoring Centers of LEAs Utimaco offers since 2010 as well a Data Retention Suite as a carrier-grade system to enable fast and secure access to retained call data by LEAs Fixed network Mobile network ISP ( , VoIP,...) Telecommunication service provider INI (Internal Network Interface) X2 X3 X2 X3 X2 X3 X1 X1 X1 Mediation device 1 Mediation device 2 Mediation device 3 Mediation device n Utimaco LIMS Management server Database Decoder SSL Gateway High-availability module Remote provisioning unit Hl1 Hl2 Hl3 Ll handover interface Law enforcement agency Monitoring center Proven solutions for mobile and fixed network operators as well as Internet service providers LIMS Gateway In 2011, Utimaco won a large tender for a nationwide implementation of its LIMS technology in Australia LIMS Management Server LIMS Access Points CryptoServer Products Aachen, Germany June 2014 Page 3 Utimaco GmbH 3

4 Data retention vs. lawful interception Past Data retention Call detail records Subscriber data Future Lawful interception Call detail records Call content Archival of connection records and subsriber data Legal obligation of service providers Handover interfaces to law enforcement agencies Network interfaces Administration of warrants Access protection Data security Accounting and auditing Applies to voice & data Realtime monitoring of communication Connections records and content No long-term storage CryptoServer Products Aachen, Germany June 2014 Page 4 Utimaco GmbH 4

5 Product Overview SecurityServer or General Purpose HSM protects business critical information against unauthorised access, manipulation and theft. Security Server integrates with systems such as identity management and PKI environments, document management and archiving solutions and many more. Product Information Integrated key management Scalability and high-availability Flexible Framework allows our customer to customize Remote administration, Remote diagnostics Support of standard API interfaces such as: Microsoft CSP, CNG; PKCS#11, JCE Supported OS: Windows; Linux; AIX Available with CSe- and Se- Series. Plug-In Cards and Appliances CryptoServer Products Aachen, Germany June 2014 Page 5

6 Roots of Trust to many Critical infrastructure - Subscriber Authentication - Card Preparation and personalization - Road Pricing System - Payment solution - Conditional Access - Time Stamping - Smart Metering - Cheque Transcation System - Public Key Infrastructure - Document Security - Cloud Services CryptoServer Products Aachen, Germany June 2014 Page 6

7 Manifold opportunities in Smart Networks connecting securely the Internet of Things and Machine-2-machine communication Smart Grids many opportunities, for instance mobility: Secure communication to protect smart grids and safely store cryptography keys underlying that security Utimaco HSMs are secure roots key of certificate issuing authority behind the communication infrastructure of Tesla Model S cars and their whitelabelled customers for on-board communication and the constant battery-maintenance data communication CryptoServer Products Aachen, Germany June 2014 Page 7 Utimaco GmbH

8 Thanks for your attention! Utimaco IS GmbH Germanusstraße Aachen, Germany Phone Web info@utimaco.com Copyright 2014 Utimaco IS GmbH All trademarks are trademarks of the particular copyright holder. Specifications are subject to change without notice. CryptoServer Products Aachen, Germany June 2014 Page 8

Utimaco OX Summit

Utimaco OX Summit Utimaco LIMS @ OX Summit Utimaco TS GmbH October 2017 Dirk Börgerding Key Account Manager Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 1 Utimaco Group Company Facts Founded 1983 HQ in Aachen, Germany

More information

Utimaco HSM Introduction JIPDEC Seminar June 2017

Utimaco HSM Introduction JIPDEC Seminar June 2017 Utimaco HSM Introduction JIPDEC Seminar June 2017 Joerg Horn Director Business Development Utimaco HSM Business Unit Aachen, Germany 2016 hsm.utimaco.com Page 1 Part 1 Introduction Utimaco History HSM

More information

Utimaco Portfolio Overview Hardware Security Products and Services

Utimaco Portfolio Overview Hardware Security Products and Services Utimaco Portfolio Overview Hardware Security Products and Services About Utimaco Your Root of Trust Utimaco is a leading manufacturer of Hardware Security Modules (HSMs) that provide the Root of Trust

More information

DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION

DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION 2 Data Retention Data Retention has become a buzzword in intense debates between data protectors and law makers over the last few years. It refers

More information

Security Architecture Models for the Cloud

Security Architecture Models for the Cloud White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,

More information

Partner Program Overview

Partner Program Overview Partner Program Overview Utimaco TS GmbH November 2014 Utimaco TS GmbH Aachen, Germany Nov 2014 Page 1 Utimaco s goal is. to implement a successful and trustworthy partnership with our partners leading

More information

Utimaco LIMS TM. Techpaper. Lawful Interception with Umbrella Systems

Utimaco LIMS TM. Techpaper. Lawful Interception with Umbrella Systems Techpaper Lawful Interception with Umbrella Systems Table of contents 1 The Challenge... 3 2 Umbrella Systems... 4 3 Abbreviations... 7 25. Aug 2010 Copyright Utimaco Safeware AG 2 of 8 1 The Challenge

More information

Portfolio Overview for Payment & GP HSMs

Portfolio Overview for Payment & GP HSMs Portfolio Overview for Payment & GP HSMs Malte Pollmann, CEO Priyank Kumar, Product Management, Payment HSMs Dieter Bong, Product Management, General Purpose HSMs Utimaco HSM Business Unit Aachen, Germany

More information

Utimaco eidas Update. June Thorsten Groetker CTO. Utimaco HSM Business Unit Aachen, Germany 2017 Utimaco eidas Update, June 2017 Page 1

Utimaco eidas Update. June Thorsten Groetker CTO. Utimaco HSM Business Unit Aachen, Germany 2017 Utimaco eidas Update, June 2017 Page 1 Utimaco eidas Update June 2017 Thorsten Groetker CTO Utimaco HSM Business Unit Aachen, Germany 2017 Utimaco eidas Update, June 2017 Page 1 eidas Agenda Recap eidas, Trust Services, Standardization Signature

More information

eidas compliant Trust Services with Utimaco HSMs

eidas compliant Trust Services with Utimaco HSMs eidas compliant Trust Services with Utimaco HSMs March 15, 2018 Dieter Bong Product Manager Utimaco HSM Business Unit Aachen, Germany 2018 eidas-compliant Trust Services with Utimaco HSMs Page 1 eidas

More information

SafeGuard SecurityServer

SafeGuard SecurityServer SafeGuard SecurityServer The Hardware Security Module for Securing Cryptographic Key Material Transparent Pricing Unlimited connections without extra licenses. Unrestricted use in applications. Compliance

More information

The Open Application Platform for Secure Elements.

The Open Application Platform for Secure Elements. The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java

More information

HARDWARE SECURITY MODULES DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

HARDWARE SECURITY MODULES DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY HARDWARE SECURITY MODULES DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY HARDWARE SECURITY MODULES Deployment strategies for enterprise security Organizations around the world are creating open, flexible

More information

IBM and Juniper Networks

IBM and Juniper Networks IBM and Juniper Networks Transforming and simplifying your network infrastructure S O L U T I O N B R I E F Enabling strategic advantage in a changing world A less expensive energy bill, a package that

More information

Alcatel-Lucent 1357 ULIS

Alcatel-Lucent 1357 ULIS Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement

More information

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps

More information

Monitoring obligations. DataBridge : Fulfil CSP requirements for communcations monitoring

Monitoring obligations. DataBridge : Fulfil CSP requirements for communcations monitoring Monitoring obligations DataBridge : Fulfil CSP requirements for communcations monitoring DataBridge Flexible communications monitoring 2 Meeting your obligations flexibly As terrorists and organised criminals

More information

Thales e-security. Security Solutions. PosAm, 06th of May 2015 Robert Rüttgen

Thales e-security. Security Solutions. PosAm, 06th of May 2015 Robert Rüttgen Thales e-security Security Solutions PosAm, 06th of May 2015 Robert Rüttgen Hardware Security Modules Hardware vs. Software Key Management & Security Deployment Choices For Cryptography Software-based

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. DataBridge Flexible communications monitoring Meeting your obligations flexibly As terrorists and organized criminals take

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

HP Investigation (Dragon Data Retention and Guardian Online) solutions

HP Investigation (Dragon Data Retention and Guardian Online) solutions HP Investigation (Dragon Data Retention and Guardian Online) solutions HP Dragon Blue IP Probe Deep Packet Inspection Solution brief HP Investigation is committed to help organizations to handle massive

More information

HARDWARE SECURITY MODULES (HSMs)

HARDWARE SECURITY MODULES (HSMs) HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical

More information

Göran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden

Göran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden Göran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden M2M An enabler of Smart Grid 2 OUR CREDENTIALS We have over 200 people dedicated to M2M in our organisation

More information

Utimaco LIMS. Lawful Interception of Telecommunication Services

Utimaco LIMS. Lawful Interception of Telecommunication Services Lawful Interception of Telecommunication Services 2 LIMS worldwide Lawful Interception Lawful Interception (LI) is the legally approved surveillance of telecommunication services, and has become an important

More information

M2MD Communications Gateway: fast, secure, efficient

M2MD Communications Gateway: fast, secure, efficient Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.

More information

Next Level Remote Access

Next Level Remote Access Next Level Remote Access Next Generation Network Access Technology www.ncp-e.com Next Level Remote Access VPN Since the company was founded in 1986, NCP has been committed to making deploying, using and

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

Cyber security mechanisms for connected vehicles

Cyber security mechanisms for connected vehicles Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX

More information

Security for Wireless Handhelds

Security for Wireless Handhelds wireless security solutions security applications developer toolkits professional services Security for Wireless Handhelds integrating strong, transparent security without increasing costs or time-to-market

More information

Build VoLTE Services using NFV & Cloud Reduce complexity and increase RoI

Build VoLTE Services using NFV & Cloud Reduce complexity and increase RoI Build VoLTE Services using NFV & Cloud Reduce complexity and increase RoI Vivek Bhargava Director, Product Marketing Oracle Communications Oracle In Communications R&D, product strategy, sales and services

More information

Hosted Secure Tokenization Module

Hosted Secure Tokenization Module Hosted Secure Tokenization Module Agenda Tokenization Definition Tokenization Explained Tokenization Benefits Ultra Infrastructure Diagram Ultra Token Management Ultra Benefits Ultra Performance Ultra

More information

Bringing Business Value to Object Oriented Storage

Bringing Business Value to Object Oriented Storage Bringing Business Value to Object Oriented John Hufferd Senior Director of Technology May 15, 2007 Legal Disclaimer All or some of the products detailed in this presentation may still be under development

More information

Taking Back Control of Your Network With SD-LAN

Taking Back Control of Your Network With SD-LAN IHS TECHNOLOGY SEPTEMBER 2016 Taking Back Control of Your Network With SD-LAN Matthias Machowinski, Senior Research Director, Enterprise Networks and Video TABLE OF CONTENTS Access Networks Are Under Pressure...

More information

Integrating Communications Compliance into the Next Generation 4G LTE Network

Integrating Communications Compliance into the Next Generation 4G LTE Network SS8 : WHITEPAPER : INTEGRATING CC INTO THE NEXT GENERATION 4G LTE NETWORK Integrating Communications Compliance into the Next Generation 4G LTE Network All telecommunication providers that currently or

More information

Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010

Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010 Symantec To Acquire VeriSign s Identity and Authentication Business May 19, 2010 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities

More information

Trusted Identities That Drive Global Commerce

Trusted Identities That Drive Global Commerce Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance

More information

GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System

GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System Cryptography Network Security GSMK Firewall and Intrusion Detection System GSMK Firewall and intrusion detection system to prevent attacks via interconnect. Protect your Network s Achilles Heel. With the

More information

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications

More information

Lawful Intercept Overview

Lawful Intercept Overview CHAPTER 1 This chapter provides information about Lawful Intercept and contains the following sections: Information About Lawful Intercept, page 1-1 Network Components Used for Lawful Intercept, page 1-3

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Mobile, Fixed, and Broadband Network Services

Mobile, Fixed, and Broadband Network Services CUSTOMER CASE STUDY Telefónica Type of Company: Specialty: Global Telecommunications Provider Mobile, Fixed, and Broadband Network Services Accedian Solutions: SkyLIGHT Performance Assurance Platform,

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Deliver Data Protection Services that Boost Revenues and Margins

Deliver Data Protection Services that Boost Revenues and Margins FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing

More information

Logicalis. Leon Bouwer Sales Specialist IM/ECM/Big Data

Logicalis. Leon Bouwer Sales Specialist IM/ECM/Big Data Logicalis Leon Bouwer Sales Specialist IM/ECM/Big Data About Logicalis Group Logicalis is an international IT solutions and managed services provider with a breadth of knowledge and expertise in communications

More information

M2MD Communications Gateway: fast, secure and efficient

M2MD Communications Gateway: fast, secure and efficient Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular

More information

Cian Kinsella CEO, Digiprove

Cian Kinsella CEO, Digiprove Cian Kinsella CEO, Digiprove cian.kinsella@digiprove.com Malaga 7 th June 2013 Been developing software since 1972 Commercial and Freelance Co-founder of 3 Software Product Companies Have had many different

More information

Privacy Policy. (GDPR compliance)

Privacy Policy. (GDPR compliance) Privacy Policy (GDPR compliance) Summary This privacy policy sets out the data processing practices carried out by MSE Meeting Rooms. We process personal information through the use of the telephone, a

More information

CardOS Secure Elements for Smart Home Applications

CardOS Secure Elements for Smart Home Applications Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.

More information

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com

More information

Solutions Overview. Nortel Networks. Preside. Next-Generation Management Solutions

Solutions Overview. Nortel Networks. Preside. Next-Generation Management Solutions Solutions Overview Nortel Networks Next-Generation Management Solutions Giving Service Providers a View to the Future Today A place where you can......rapidly create new services...attract new customers...discover

More information

Sierra Wireless. Corporate Overview. May 2017

Sierra Wireless. Corporate Overview. May 2017 Sierra Wireless Corporate Overview May 2017 Sierra Wireless Leader, Innovator, Trusted Partner in the IoT IoT Leader in device-to-cloud solutions Innovator essential IP in Cat M1 edge intelligence open

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT

More information

Software Defined Storage

Software Defined Storage Software Defined Storage IBM Spectrum Portfolio Ian Hancock ian.hancock@uk.ibm.com Business challenges are IT challenges Create new business models (CEO) Transform financial & management processes (CFO)

More information

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class  , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook Kerio Cloud Cloud Hosted Enterprise-Class Email, Calendars, Contacts, Tasks, and Instant Messaging Twitter LinkedIn Facebook Presented by Adam Bielawski June 15, 2016 Why Kerio? Kerio provides safe, simple,

More information

Integration Guide. PrimeKey SignServer Ubuntu

Integration Guide. PrimeKey SignServer Ubuntu Integration Guide PrimeKey SignServer Ubuntu Integration Guide: PrimeKey SignServer Imprint copyright 2014 Utimaco IS GmbH Germanusstrasse 4 D-52080 Aachen Germany phone +49 (0)241 / 1696-200 fax +49 (0)241

More information

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

Identity and Authentication PKI Portfolio

Identity and Authentication PKI Portfolio Identity and Authentication PKI Portfolio Gemalto offers comprehensive public key infrastructure (PKI) authentication solutions that provide optimal levels of security. Supporting a wide portfolio of IDPrime

More information

Securing V2X communications with Infineon HSM

Securing V2X communications with Infineon HSM Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security

More information

Carrier Reliability & Management: Overview of Plivo s Carrier Network

Carrier Reliability & Management: Overview of Plivo s Carrier Network Carrier Reliability & Management: Overview of Plivo s Carrier Network Build your company on direct connections with access to 1600+ carrier networks WWW.PLIVO.COM/CARRIERS Global Coverage with Latency-free

More information

Drive digital transformation with an enterprise-grade Managed Private Cloud

Drive digital transformation with an enterprise-grade Managed Private Cloud Singtel Business Product Factsheet Brochure Managed Private Defense Cloud Services Drive digital transformation with an enterprise-grade Managed Private Cloud Singtel Managed Private Cloud enables enterprises

More information

Compliance and Security in a Cloud-First Era

Compliance and Security in a Cloud-First Era Compliance and Security in a Cloud-First Era Regions: Dublin (EU-West) 3 x Availability Zones Launched in 2007 Frankfurt (EU-Central) 2 x Availability Zones Launched 2014 Edge Locations: Amsterdam,

More information

Corporate Guideline. Export Compliance Policy

Corporate Guideline. Export Compliance Policy Export Compliance Policy Table of contents EXPORT INFORMATION ON UTIMACO PRODUCTS... 3 GLOBAL EXPORT CONTROLS... 4 GOBAL EXPORT CONTROLS PRODUCT CLASSIFICATION... 5 2 EXPORT INFORMATION ON UTIMACO PRODUCTS

More information

Managing your Cloud with Confidence

Managing your Cloud with Confidence Mobility Cloud and Security Managing your Cloud with Confidence Stephen Miles VP Service Assurance - APJ Agenda The Digital Revolution and the changing IT Landscape Management challenges in the new world

More information

Vodafone Analyst & Investor Day Monday 27 September 2004

Vodafone Analyst & Investor Day Monday 27 September 2004 Vodafone Analyst & Investor Day Monday 27 September 2004 Verizon Wireless Andy Halford Chief Financial Officer 1 Safe Harbor Statement NOTE: This presentation contains statements about expected future

More information

MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP

MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP APR 2018 MARC GEBERT EMEA IOT SECURITY BD LEAD SENIOR DIRECTOR Secure Connections for the Smarter World Everything Smart Everything

More information

THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION

THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION www.thalesesecurity.com THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION Enterprises are committing to a digital transformation initiative by embracing new opportunities and building

More information

Use Digipass two-factor authentication

Use Digipass two-factor authentication DIGIPASS BY VASCO Secure your business Use Digipass two-factor authentication S T R O N G s tat i c PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l i c K E Y I N F R A S T R U C T U R E digipass

More information

The Road to a Secure, Compliant Cloud

The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

ASX IPO NOW LIVE. Key Points

ASX IPO NOW LIVE. Key Points ASX IPO NOW LIVE Key Points Vonex s ASX IPO to raise up to $7 million is now live To view the IPO Prospectus and apply online visit https://investors.vonex.com.au/offer/ Nearly fully underwritten by State

More information

Investor Presentation. February 2016

Investor Presentation. February 2016 Investor Presentation February 2016 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended,

More information

Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018

Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018 Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:

More information

AAA Authentication: New Use Cases

AAA Authentication: New Use Cases AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf

More information

Conquer New Digital Frontiers with leading Public Cloud Platforms.

Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Business Product Factsheet Brochure Managed Defense Public Cloud Services Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Managed Public Cloud supports enterprises in

More information

ITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016

ITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016 ITU Workshop Combating grey devices Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016 Security solutions Qualcomm s vision Theft Deterrence Enterprise

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

New Business. Opportunities for Cellular IoT. Loic Bonvarlet Director of Marketing Secure Identity Arm. Copyright 2018 Arm, All rights reserved.

New Business. Opportunities for Cellular IoT. Loic Bonvarlet Director of Marketing Secure Identity Arm. Copyright 2018 Arm, All rights reserved. New Business Opportunities for Cellular IoT Loic Bonvarlet Director of Marketing Secure Identity Arm Key Takeaways Cellular IoT market worth $9.65 Billion by 2025 (CAGR: 21.4%)* New SIM technologies unleash

More information

Streamlining Lawful Intercept for WiMAX Networks

Streamlining Lawful Intercept for WiMAX Networks White Paper Streamlining Lawful Intercept for WiMAX Networks f f Meet stringent lawful intercept requirements for monitoring WiMAX IP-based voice, data and multimedia traffic f f Comply with lawful intercept

More information

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited.

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited. Certificate Practice Statement v3.6 Certificate Practice Statement from Digi-Sign Limited. Digi-CPS Version 3.6. Produced by the Legal & Technical Departments For further information, please contact: CONTACT:

More information

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions

More information

WEB-APIs DRIVING DIGITAL INNOVATION

WEB-APIs DRIVING DIGITAL INNOVATION WEB-APIs DRIVING DIGITAL INNOVATION Importance of Web-APIs Simply put, Web-APIs are the medium to make a company s digital assets consumable to any channel, which has a current or latent need. It helps

More information

Over the Top (OTT) Provision of Telecoms Services in Nigeria

Over the Top (OTT) Provision of Telecoms Services in Nigeria Over the Top (OTT) Provision of Telecoms Services in Nigeria Presentation Delivered at the Bicsi Conference & Exhibition 2017 By Engr. Gbenga Adebayo ALTON Chairman August 17, 2017 Introduction The Association

More information

INTERNET OF THINGS KONTRON

INTERNET OF THINGS KONTRON INTERNET OF THINGS SECURITY @ KONTRON EMBEDDED COMPUTING CONFERENCE 2017 ECC WINTERTHUR SEPTEMBER 5 TH, 2017 AGENDA 01 INTRODUCTION 02 SECURITY LAYERS 03 KONTRON & S&T // 2 WHAT IS IN IT FOR YOU THROUGH

More information

Accelerate Your Cloud Journey

Accelerate Your Cloud Journey Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension

More information

An Introduction to the Max PVN

An Introduction to the Max PVN An Introduction to the Max PVN Net2Phone Overview 2 VoIP Leader Net2Phone is a leading provider of VoIP products and services throughout the world #1 worldwide for retail VoIP services Proven, scalable

More information

Data Use and Reciprocal Support Agreement (DURSA) Overview

Data Use and Reciprocal Support Agreement (DURSA) Overview Data Use and Reciprocal Support Agreement (DURSA) Overview 1 Steve Gravely, Troutman Sanders LLP Jennifer Rosas, ehealth Exchange Director January 12, 2017 Introduction Steve Gravely Partner and Healthcare

More information

Securing Your Most Sensitive Data

Securing Your Most Sensitive Data Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way

More information

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox. Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and

More information

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Co-Host Host 2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its

More information

Strengthen hybrid cloud operations and controls with Liquid Sky. Singtel Business

Strengthen hybrid cloud operations and controls with Liquid Sky. Singtel Business Singtel Business Product Factsheet Brochure Managed Singtel Liquid Defense Sky Services Strengthen hybrid cloud operations and controls with Liquid Sky Singtel Liquid Sky is a hybrid cloud management portal

More information

Vault Systems. Using IBM NeXtScale to disrupt industry with secure, cost-effective private cloud. Overview. IBM Systems & Technology Case Study

Vault Systems. Using IBM NeXtScale to disrupt industry with secure, cost-effective private cloud. Overview. IBM Systems & Technology Case Study Vault Systems Using IBM NeXtScale to disrupt industry with secure, cost-effective private cloud Overview The need Vault Systems was established in partnership with software provider JN Solutions to build

More information

FUJITSU Backup as a Service Rapid Recovery Appliance

FUJITSU Backup as a Service Rapid Recovery Appliance FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports

More information

2nd ETSI Security Workshop Future Security. Lawful Interception standardisation, Retained Data

2nd ETSI Security Workshop Future Security. Lawful Interception standardisation, Retained Data 2nd ETSI Security Workshop Future Security Activities in ETSI/TC LI Lawful Interception standardisation, Retained Data Peter van der Arend Royal KPN Netherlands; Chairman ETSI/TC LI 1 Why Lawful Interception

More information

ETSI Security Standards Workshop January 2006

ETSI Security Standards Workshop January 2006 ETSI Security Standards Workshop Adrian Scrase ETSI CTO adrian.scrase@etsi.org 1 Welcome to ETSI 2 ETSI is A European standards organization Active in all areas of ICT Setting globally-applicable standards

More information

Scalable Security solutions to enable Cyber Security and to manage Digital Identities

Scalable Security solutions to enable Cyber Security and to manage Digital Identities Scalable Security solutions to enable Cyber Security and to manage Digital Identities It s all about managing identities GIC@CeBIT 2017 International Cyber Security Conference Axel Deininger 20.03.2017

More information