These patterns include: The use of proprietary software

Size: px
Start display at page:

Download "These patterns include: The use of proprietary software"

Transcription

1 Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal and trading-partner needs. A key decision on which form of security to use depends on how much each trading partner is willing to spend. Core Topic Application Integration and Middleware: Architectures and Patterns for Software Infrastructure Key Issue How will emerging software infrastructure architectural principles and design patterns best address the requirements of collaborative business-to-business processes? Strategic Planning Assumptions Through 2008, nearly all trading communities will use SSL to meet diverse trading-partner requirements (0.7 probability). Through 2008, 60 percent of all trading communities will use SSL in addition to at least one other security solution (for example, VPN, AS2, ebms or WS-Security) to meet diverse trading-partner requirements (0.8 probability). Diverse trading partners have diverse infrastructures and, thus, diverse security requirements. (Requirements include privacy, identity management, authentication, nonrepudiation and access control.) However, patterns for certain types and combinations of security have emerged within trading communities. These patterns encompass one or more of the following methodologies to secure transactions. These patterns include: The use of proprietary software Relying on standards to secure the data Securing the data by encryption Using virtual private networks (VPNs), leased lines and frame relays Using Secure Sockets Layer (SSL), Secure Hypertext Transport Protocol (S-HTTP) and Web browsers Using Proprietary Software to Secure B2B Networks The use of proprietary standards and protocols, included in most business-to-business (B2B) integration suites such as, Sterling Commerce's Connect:Direct Secure+ or Proginet's Secure Internet File Transfer (SIFT) is prevalent among trading communities in which a low number of trading partners with similar B2B integration infrastructures have monetary and resource investments in proprietary suites (for example, financial institutions using Connect:Enterprise or Connect:Direct). Some distinctions of this pattern are: Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 Trading partners use software from the same vendors within the community. Security can be standards-based (not likely), highly proprietary (likely) or hybrid (unlikely). The benefits of using this pattern include having a highly secured and homogeneous trading environment, which reduces the need to support multiple B2B standards. The challenges of using this pattern are: having to implement expensive licensed software and updates; and the cost of entry for new trading partners (which are often reluctant to implement proprietary solutions), which can prohibit growth of the community. Relying on Standards to Secure the Data New and emerging B2B standards, such as Applicability Statement 2 (AS2) and WS-Security, offer a way for trading partners to secure their transactions using solutions that support multiple B2B standards. This pattern can be used whether there are a few trading partners or many trading partners. Vendors such as Cyclone Commerce, IPNet Solutions and isoft provide software that can be deployed by any level or size trading partner. These solutions support most of the common B2B security standards (for example, EDI-INT), and some offer additional B2B integration functionality, such as provisioning, onboarding, community management and Web forms (browserbased technology, hosted by the hub, that enables smaller trading partners to enter, view and retrieve business transactions and documents). Although choosing this approach requires that trading partners agree on a standard, most integration middleware vendors (such as webmethods, Tibco Software, SeeBeyond Technology and Vitria Technology) support multiple standards and can rapidly deploy (via adapters or add-on modules) support for emerging standards, thus providing the trading partner with the capability to support current standards and emerging ones. Some distinctions of this pattern are: Trading partners agree on B2B standards to achieve security, compatibility or both. AS2 functionality is offered in more than 50 suites from 40 different vendors, including btrade, Cyclone Commerce, Global exchange Services, IPNet Solutions and Sterling Commerce. Web services will be secured via the use of multiple standards for example, XML Encryption, XML Digital Signatures, XML Key Management Specification (XKMS) and these standards, as well as others, are currently 7 August

3 supported by some Web services brokers (for example, Flamenco Networks) and are also widely accepted (and in various stages of integration) in identity management products and Web services security tools. The benefits of this pattern are that trading partners have a choice of multiple vendors from which to purchase technology. (In some cases, the software already exists or has an adapter that provides support of the standard, within the infrastructure.) Another benefit is that emerging B2B initiatives and methodologies, such as UCCnet, will heavily rely on established B2B standards (such as AS2). The challenges are that standards are still incomplete and are constantly being updated and appended, causing disruption in interoperability. Version changes and updates in vendor solutions also cause disruption. Securing the Data by Encryption Some trading partners will prefer to encrypt the transaction using digital certificates (examples include VeriSign, Entrust and Baltimore Technologies), signatures and encryption standards (for example, Rivest-Shamir-Adelman) addressing new and upcoming governmental, regional and enterprise regulations regarding privacy. Using encryption allows messages to flow in the open over public networks without being deciphered or changed. Using digital certificates and signature capability offers nonrepudiation benefits as well. Users of this pattern have trading communities the size of which depends of the complexity of an established public-key infrastructure (PKI), or they have existing digital certificates and signatures for and so on that they wish to reuse. When there is a real need for nonrepudiation, this is a pattern to consider, although some standards that utilize digital certificates for example, AS2 or ebxml Messaging Services (ebms) can be also used. Another benefit besides nonrepudiation is that established internal and external PKI infrastructures can be leveraged and ported into B2B infrastructures. Encryption and decryption present challenges, because they are resource-consuming and are dependent on the specific encrypt/decrypt algorithm and the size and complexity of the transaction. Both third-party management and self-management of certificates (that is, certificate issuance, confirmation and revocation) can quickly become expensive and time-consuming. VPNs, Leased Lines and Frame Relays Secure the "Wire" Before the use of standards and commercialized encryption, securing transactions by transmitting them over VPN (for example, vendors Aventail and Neoteris), leased private lines or frame relays was the most popular way of conducting secure 7 August

4 B2B transactions. This pattern, once common in large trading communities and in communities where trading partners are unwilling or unable to implement any B2B software, is still one of the simplest and most effective ways of securing the transport of B2B transactions between trusted trading partners. Additional security methods, specifically addressing privacy (such as encryption and digital certificates), are needed, because, in this pattern, the emphasis is placed on securing the transport mechanism not the actual destination (that is, "DMZ" or file servers) of the transaction. VPN technology, as well as direct leased lines and frame relays, is expensive, which puts this pattern out of reach for most small and midsize businesses. SSL, S-HTTP and Web Browsers The use of SSL and S-HTTP, in conjunction with Web forms hosted by one trading partner, offers a simple way of securing B2B transactions by securing the transport layer. SSL and S- HTTP are mature protocols that are widely deployed and embedded in all Web browsers. For the end user, the use of browser technology means no installed software and low maintenance and support costs. However, the trading partner hosting the Web forms must dedicate resources to develop and maintain a Web portal and the SSL or S-HTTP servers. Putting the Different Security Solutions in Perspective To date, no single security solution can address the requirements for all categories of trading partners, large and small, and with different levels of IT sophistication. To illustrate the challenge, we have mapped the various security solutions described above against our model for large supply chain communities (see Table 1 and "Business Strategy Drives B2B Connectivity Choices"). 7 August

5 Typical Integration Scenarios for Supply Chain Integration From the Point of View of the Channel Master Table 1 Patterns for B2B Security Most strategic and private Mixed model/ hybrid Least strategic/ public Strategic Importance High Medium Low Relationship Value and Differentiation High Medium Low Level of Trust and Risk High Medium Low Level of Trading-Partner IT Sophistication High Medium Low Number of Trading Partners "On-Boarded" Few Varies Many Willingness to Outsource Low Varies High Focus of Integration Application integration or document exchange Application integration or document exchange Application integration or document exchange Proprietary Security Not a good fit (too complex for most trading partners) Not a good fit (too complex for most trading partners) Standards-Based Security Encryption Security Safe Transport Security (but requires broad (but requires broad (but requires broad if embedded (but requires broad Not a good fit (not likely that many enterprises will use same certificate authority) Not a good fit (not likely that many enterprises will use same transport) SSL Security (but not for highvalue transactions) (but not for highvalue transactions) Source: Gartner Research (July 2003) Although a small, trusted group of trading partners can probably agree to deploy almost any security solution, the challenge is scale-up that is, getting larger numbers of trading partners to agree on the same security standards, certificate authority or transport. Standards-based security is the most promising solution, but it lacks sufficient maturity (specifications are a work in progress) and adoption. SSL, while ubiquitous, does not have the granularity for high-value or high-sensitivity transactions. Through 2008, nearly all trading communities will use SSL to meet diverse trading-partner requirements (0.7 probability). Through 2008, 60 percent of all trading communities will use SSL in addition to at least one other security solution (for example, VPN, AS2, ebms, WS-Security) to meet diverse trading-partner requirements (0.8 probability). 7 August

6 Acronym Key AS2 Applicability Statement 2 B2B business-to-business ebms ebxml Messaging Services ebxml Electronic Business XML PKI public-key infrastructure S-HTTP Secure Hypertext Transport Protocol SIFT Secure Internet File Transfer SSL Secure Sockets Layer VPN virtual private network XKMS XML Key Management Specification XML Extensible Markup Language Bottom Line: Midsize to large trading communities (50 partners or more) and communities with diverse security requirements should consider a combination of two or more business-tobusiness security solutions to secure their transactions for example, virtual private network/secure Sockets Layer, Applicability Statement 2/SSL, or digital certificates/secure Hypertext Transport Protocol. Smaller trading communities or communities with less diverse requirements can choose a security solution that best complements the value of the transactions (for example, digital certificates for high-value transactions or SSL for moderate-value transactions). 7 August

Web Services Take Root in Banks and With Asset Managers

Web Services Take Root in Banks and With Asset Managers Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations

More information

Should You Use Liberty or Passport for Digital Identities?

Should You Use Liberty or Passport for Digital Identities? Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft

More information

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published

More information

Four Partial Solutions for Remote Network Access

Four Partial Solutions for Remote Network Access Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers

More information

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

Best Practices for Deploying Web Services via Integration

Best Practices for Deploying Web Services via Integration Tactical Guidelines, M. Pezzini Research Note 23 September 2002 Best Practices for Deploying Web Services via Integration Web services can assemble application logic into coarsegrained business services.

More information

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc. Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying

More information

Prediction: Multimodal transaction processing will emerge

Prediction: Multimodal transaction processing will emerge Strategic Planning, M. Pezzini Research Note 19 December 2003 Predicts 2004: Prepare for Multimodal Transaction Processing Online transaction processing will have to support Web services, mobile channels

More information

Database Design Tool Magic Quadrant 2H02

Database Design Tool Magic Quadrant 2H02 Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

Predicts 2004: The Future of Windows Server

Predicts 2004: The Future of Windows Server Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially

More information

Management Update: Storage Management TCO Considerations

Management Update: Storage Management TCO Considerations IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total

More information

Can you wait until 2010?

Can you wait until 2010? Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their

More information

Enterprise Data Architecture: Why, What and How

Enterprise Data Architecture: Why, What and How Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented

More information

IBM's WebSphere Integration Offer Signals Long-Term Plan

IBM's WebSphere Integration Offer Signals Long-Term Plan Products, M. Pezzini, J. Thompson Research Note 8 April 2003 IBM's WebSphere Integration Offer Signals Long-Term Plan Version 4.2 of WebSphere Business Integration bundles more products into one package.

More information

Controlled Medical Vocabulary in the CPR Generations

Controlled Medical Vocabulary in the CPR Generations Tutorials, B. Hieb, M.D. Research Note 5 November 2003 Controlled Medical Vocabulary in the CPR Generations A CMV capability becomes progressively more important as computer-based patient record systems

More information

Building Better Interfaces: HL7 Conformance Profiles

Building Better Interfaces: HL7 Conformance Profiles Tutorials, W. Rishel Research Note 26 November 2002 Building Better Interfaces: HL7 Conformance Profiles The new Health Level Seven conformance technology allows individual healthcare organizations and

More information

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document

More information

FICON Drives Fibre Channel Security

FICON Drives Fibre Channel Security FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre

More information

COM R. Schulte

COM R. Schulte R. Schulte Research Note 7 July 2003 Commentary Event-Driven Applications: Definition and Taxonomy Simple event-driven applications are becoming widespread in mainstream enterprises. More-powerful complex-event

More information

Events Will Transform Application Servers

Events Will Transform Application Servers Technology, Y. Natis Research Note 8 July 2003 Events Will Transform Application Servers Today's application servers can act as simple "event servers." To handle complex events, application servers will

More information

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace

More information

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace

More information

COM I. Keene, B. Hafner

COM I. Keene, B. Hafner I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.

More information

Management Update: Wireless LAN Predictions for 2004

Management Update: Wireless LAN Predictions for 2004 IGG-11192003-03 K. Dulaney, R. Ahlawat Article 19 November 2003 Management Update: Wireless LAN Predictions for 2004 Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will

More information

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and

More information

NGN: Enterprise IP Telephony

NGN: Enterprise IP Telephony NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations

More information

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been

More information

Integration With the Business Modeler

Integration With the Business Modeler Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design

More information

Worldwide Workstation Shipments Rebound in Third Quarter

Worldwide Workstation Shipments Rebound in Third Quarter Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase

More information

Web Services, ebxml and XML Security

Web Services, ebxml and XML Security Web Services, ebxml and XML Security Dr David Cheung Director Center for E-Commerce E Infrastructure Development Electronic Commerce Models Business to Customer (B2C) Convenient access to services Business

More information

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the

More information

Finding Pure-Play Midtier ESPs: A Two-Step Process

Finding Pure-Play Midtier ESPs: A Two-Step Process Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors

More information

CIO Update: Security Platforms Will Transform the Network Security Arena

CIO Update: Security Platforms Will Transform the Network Security Arena IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will

More information

Ending the Confusion About Software- Defined Networking: A Taxonomy

Ending the Confusion About Software- Defined Networking: A Taxonomy Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server

More information

zapnote Analyst: Jason Bloomberg

zapnote Analyst: Jason Bloomberg zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-1198 Released: August 21, 2006 DATADIRECT XQUERY 2.0 ENABLING XQUERY FOR VERY LARGE MESSAGES Analyst: Jason Bloomberg Abstract As the quantity of XML in

More information

The Clinical Data Repository Provides CPR's Foundation

The Clinical Data Repository Provides CPR's Foundation Tutorials, T.Handler,M.D.,W.Rishel Research Note 6 November 2003 The Clinical Data Repository Provides CPR's Foundation The core of any computer-based patient record system is a permanent data store. The

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Asia/Pacific: Systems Consolidation, Hype or Reality?

Asia/Pacific: Systems Consolidation, Hype or Reality? Research Brief Asia/Pacific: Systems Consolidation, Hype or Reality? Abstract: Through 2005, consolidation will be of major concern to IT management in Asia/Pacific as organizations struggle to control

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

COM F. Troni, L. Fiering

COM F. Troni, L. Fiering F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work

More information

Spam Filtering Works Better With a Management Policy

Spam Filtering Works Better With a Management Policy Select Q&A, M. Grey, A. Hallawell Research Note 22 September 2003 Spam Filtering Works Better With a Management Policy A deployment of spam-filtering technology that does not consider business issues will

More information

China: User Perceptions and Plans for PCs and PDAs in 2003

China: User Perceptions and Plans for PCs and PDAs in 2003 End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not

More information

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

QUANTUM SAFE PKI TRANSITIONS

QUANTUM SAFE PKI TRANSITIONS QUANTUM SAFE PKI TRANSITIONS Quantum Valley Investments Headquarters We offer quantum readiness assessments to help you identify your organization s quantum risks, develop an upgrade path, and deliver

More information

zapnote PARASOFT Briefing Date: June 13, 2002 Analyst: Jason Bloomberg

zapnote PARASOFT Briefing Date: June 13, 2002 Analyst: Jason Bloomberg zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-0605-1D Released: July 17, 2002 PARASOFT TESTING BOTH WEB SERVICES PRODUCERS AND CONSUMERS Briefing Date: June 13, 2002 Analyst: Jason Bloomberg Abstract

More information

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Market Scope. Magic Quadrant Methodology

Market Scope. Magic Quadrant Methodology Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard

More information

TN3270 AND TN5250 INTERNET STANDARDS

TN3270 AND TN5250 INTERNET STANDARDS 51-10-55 DATA COMMUNICATIONS MANAGEMENT TN3270 AND TN5250 INTERNET STANDARDS Ed Bailey INSIDE Enterprise Data and Logic; User Productivity and Confidence; Newer Platforms and Devices; How Standardization

More information

CISCO IT DEPARTMENT DEPLOYS INNOVATIVE CISCO APPLICATION- ORIENTED NETWORKING SOLUTION

CISCO IT DEPARTMENT DEPLOYS INNOVATIVE CISCO APPLICATION- ORIENTED NETWORKING SOLUTION CUSTOMER TESTIMONIAL CISCO IT DEPARTMENT DEPLOYS INNOVATIVE CISCO APPLICATION- ORIENTED NETWORKING SOLUTION EXECUTIVE SUMMARY Visionary Technology Provides New Model for Application Infrastructure Services

More information

Predicts 2004: Enterprise Service Buses Are Taking Off

Predicts 2004: Enterprise Service Buses Are Taking Off Strategic Planning, R. Schulte Research Note 16 December 2003 Predicts 2004: Enterprise Service Buses Are Taking Off Today, enterprise service buses are used only in leadingedge applications. They quickly

More information

Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary

Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Publication Date: 9 April 2003 Author Wm.L.Hahn This document has been published to the following Marketplace codes: TELC-WW-EX-0576

More information

Super-Peer Architectures for Distributed Computing

Super-Peer Architectures for Distributed Computing Whitepaper Super-Peer Architectures for Distributed Computing Fiorano Software, Inc. 718 University Avenue, Suite 212 Los Gatos, CA 95032 U.S.A. +1.408.354.3210 email info@fiorano.com www.fiorano.com Entire

More information

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the

More information

4Q02 Update: Disk Storage Forecast Scenarios,

4Q02 Update: Disk Storage Forecast Scenarios, Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than

More information

ISV Support Is Key When Choosing a Server Operating System

ISV Support Is Key When Choosing a Server Operating System Markets, A. Butler Research Note 17 September 2003 ISV Support Is Key When Choosing a Server Operating System It's the support independent software vendors offer that determines the life span of a server

More information

Change & Configuration Management Market

Change & Configuration Management Market Change & Configuration Management Market Table of Contents 1. Market Size & Forecast... 3 2. Geographic Segmentation... 4 2.1 Change & Configuration Management Market in Americas... 4 2.2 Americas - Market

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

NetIQ's VoIP Management Products

NetIQ's VoIP Management Products Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.

More information

Managing SSL Security in Multi-Server Environments

Managing SSL Security in Multi-Server Environments Managing SSL Security in Multi-Server Environments Easy-to-Use VeriSign Web-Based Services Speed SSL Certificate Management and Cut Total Cost of Security CONTENTS + A Smart Strategy for Managing SSL Security

More information

Trends in Fixed Public Network Services: Austria, (Executive Summary) Executive Summary

Trends in Fixed Public Network Services: Austria, (Executive Summary) Executive Summary Trends in Fixed Public Network Services: Austria, 2000-2006 (Executive Summary) Executive Summary Publication Date: September 25, 2002 Authors Michal Halama Maureen Coulter Katja Ruud Susan Richardson

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

DBMS Software Market Forecast, (Executive Summary) Executive Summary

DBMS Software Market Forecast, (Executive Summary) Executive Summary DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:

More information

Hardware Decisions for Embedded Systems Design in Asia/Pacific

Hardware Decisions for Embedded Systems Design in Asia/Pacific End-User Analysis Hardware Decisions for Embedded Systems Design in Asia/Pacific Abstract: Over 900 embedded systems designers in Asia/Pacific responded to our survey of hardware decisions. Currently,

More information

Select Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay

Select Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay Select Q&A, A. Hallawell, M. Grey Research Note 22 September 2003 How to Select Spam-Filtering Products and Services Choose a spam-filtering solution by evaluating anti-spam providers' management, research

More information

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Overview and Benefits of SEEBURGER AS2 Spokes Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Technical Documentation Contents 1 CLASSIC EDI AND ITS COST PROBLEM 2 1.1 VAN (VALUE ADDED NETWORK)...

More information

Open Source Cloud Platforms: OpenStack

Open Source Cloud Platforms: OpenStack Open Source Cloud Platforms: OpenStack This Market Monitor overview report on the OpenStack marketplace provides updated vendor estimates through Q3 2016. OpenStack, the open source cloud project, was

More information

Nortel Networks Optivity Policy Services

Nortel Networks Optivity Policy Services Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access

More information

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of

More information

Intranets and Virtual Private Networks (VPNs)

Intranets and Virtual Private Networks (VPNs) Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private

More information

Warfare and business applications

Warfare and business applications Strategic Planning, R. Knox Research Note 10 April 2003 XML Best Practices: The United States Military The U.S. Department of Defense was early to recognize the value of XML to enable interoperability,

More information

Optimize Your Broadband WAN

Optimize Your Broadband WAN Technology, G. Johnson Research Note 15 September 2003 Optimize Your Broadband WAN When migrating from narrowband to broadband WANs, be aware that TCP's limitations can severely affect network performance,

More information

Open Source Cloud Platforms: OpenStack

Open Source Cloud Platforms: OpenStack Open Source Cloud Platforms: OpenStack This Market Monitor overview report on the OpenStack marketplace provides updated vendor estimates through Q2 2017. OpenStack, the open source cloud project, was

More information

Midsize Business Voice Service Spending Steady for 2003

Midsize Business Voice Service Spending Steady for 2003 End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in

More information

Huawei: China's Leading Equipment Vendor Returns to Growth

Huawei: China's Leading Equipment Vendor Returns to Growth Research Brief Huawei: China's Leading Equipment Vendor Returns to Growth Abstract: Huawei has turned in a strong performance during the first half of 2003. The second half of the year could be even better.

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.

More information

Sistemi ICT per il Business Networking

Sistemi ICT per il Business Networking Corso di Laurea Specialistica Ingegneria Gestionale Sistemi ICT per il Business Networking B2B Integration Docente: Vito Morreale (vito.morreale@eng.it) 1 B2B Interactions Businesses are constantly searching

More information

OpenService NerveCenter Event Correlation Network Management

OpenService NerveCenter Event Correlation Network Management John Inverso Product Report 31 July 2003 OpenService NerveCenter Event Correlation Network Management Summary NerveCenter provides network-event correlation and root-cause analysis abilities which its

More information

Trends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary

Trends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary Trends in Fixed Public Network Services: Finland, 2000-2006 (Executive Summary) Executive Summary Publication Date: October 17, 2002 Authors Susan Richardson Maureen Coulter Michal Halama Katja Ruud Lisa

More information

Get Ready for the Revival of Large Data Centers

Get Ready for the Revival of Large Data Centers Research Publication Date: 4 August 2006 ID Number: G00142079 Get Ready for the Revival of Large Centers Rakesh Kumar Although large data centers declined in importance in recent years, they will return

More information

This is a preview - click here to buy the full publication TECHNICAL REPORT. Part 101: General guidelines

This is a preview - click here to buy the full publication TECHNICAL REPORT. Part 101: General guidelines TECHNICAL REPORT IEC TR 62325-101 First edition 2005-02 Framework for energy market communications Part 101: General guidelines IEC 2005 Copyright - all rights reserved No part of this publication may

More information

Public-key Infrastructure Options and choices

Public-key Infrastructure Options and choices Public-key Infrastructure Options and choices Tim Moses Director, Advanced Security Technology April 98 1997 Entrust Technologies Overview General-purpose and Dedicated PKIs Trust models Two-key architecture

More information

Implementing Secure Socket Layer

Implementing Secure Socket Layer This module describes how to implement SSL. The Secure Socket Layer (SSL) protocol and Transport Layer Security (TLS) are application-level protocols that provide for secure communication between a client

More information

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following

More information

zapnote INTELLIGENCE WITH XML SPYS August, 2001 Analyst: Ronald Schmelzer

zapnote INTELLIGENCE WITH XML SPYS August, 2001 Analyst: Ronald Schmelzer zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-0111-1 Released: Dec. 21, 2001 ALTOVA XML DEVELOPER D INTELLIGENCE WITH XML SPYS XML D August, 2001 XML S Analyst: Ronald Schmelzer Abstract While previous

More information

NGN: The Evolution of Wireless Networks

NGN: The Evolution of Wireless Networks NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.

More information

A Foxit Software Company White Paper

A Foxit Software Company White Paper A Foxit Software Company White Paper www.foxitsoftware.com Foxit Software Company, LLC. June 2009 TABLE OF CONTENTS Abstract... 3 Introduction... 4 The Need for Data Security Policies... 4 PDF in the Enterprise...

More information

Management Update: Information Security Risk Best Practices

Management Update: Information Security Risk Best Practices IGG-07022003-01 R. Witty Article 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises to determine

More information

NEXT-GENERATION DATACENTER MANAGEMENT

NEXT-GENERATION DATACENTER MANAGEMENT NEXT-GENERATION DATACENTER MANAGEMENT From DCIM to DCSO Sometimes described as the operating or ERP system for the datacenter, datacenter infrastructure management (DCIM) is a technology that helps operators

More information

Performance/Throughput

Performance/Throughput Markets, S. Zaffos Research Note 31 March 2003 ATA Disks Redefine RAID Price/Performance Cost-optimized storage infrastructures should include redundant arrays of independent disks built with low-cost

More information

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN S O L U T I O N O V E R V I E W SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN Today s branch office users are consuming more wide area network (WAN) bandwidth

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

COLOCATION AND THE ART OF RAPID-EXECUTION TRADING. Examining Low Latency, Colocation and Proximity Hosting

COLOCATION AND THE ART OF RAPID-EXECUTION TRADING. Examining Low Latency, Colocation and Proximity Hosting COLOCATION AND THE ART OF RAPID-EXECUTION TRADING Examining Low Latency, Colocation and Proximity Hosting This fourth report in our low-latency series goes beyond the technology that underpins trading.

More information

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 Page 1 of 8 Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 7 June 2010 Michael A. Silver Gartner RAS Core Research Note G00200542 Respondents to

More information

Action Recommendation for 2004

Action Recommendation for 2004 Strategic Planning, P. Redman, T. Hart, W. Clark, J. Chapman, P. Dittner, R. Simpson, K. Foong, N. Ingelbrecht Research Note 20 November 2003 Changes in Store for Wireless WAN During 2004 The hottest growth

More information

Oracle Mission Critical Support Platform. General. Installation. Troubleshooting. Inventory and Discovery. Frequently Asked Questions Release 2.

Oracle Mission Critical Support Platform. General. Installation. Troubleshooting. Inventory and Discovery. Frequently Asked Questions Release 2. Oracle Mission Critical Support Platform Frequently Asked Questions Release 2.3 E23199-01 May 2011 General What is Oracle Mission Critical Support Platform? Is Oracle Mission Critical Support Platform

More information