T2S Connectivity SIA-Colt value proposition

Size: px
Start display at page:

Download "T2S Connectivity SIA-Colt value proposition"

Transcription

1 T2S Connectivity SIA-Colt value proposition T2S Info Session Malta, 18 April Colt Telecom Group Limited. All rights reserved.

2 T2S fosters changes in the Financial Messaging Market The European Central Bank have awarded two licenses for the design, creation and management of the new messaging infrastructure for connectivity to T2S This decision opens European financial messaging market to competition SIA-Colt have been awarded one of the licences as a T2S Value Added Network Service Provider (VANSP)

3 Powerful and cost effective solution SIA-Colt provides a powerful cost effective value proposition for the benefit of the whole financial community: Cost reductions Quality improvements Risk mitigation

4 Agenda SIA-Colt partnership SIA-COLT value Proposition Differentiators Systems architecture: High Level Overview T2S Standard Functionality Pricing and Timing SIX-SIS Zuerich April 4th 2012

5 A strategic partnership SIA-Colt Value Added Network Service Provider for T2S Fully complementary capabilities without overlap network connectivity Network traffic and associated security secure messaging Data handling and associated security Strong relationship

6 SIA in figures SIA GROUP is a leading European ICT solutions and services company in the areas of card processing, payment systems, securities markets and network services. SIA Group focus is European market with customers in other 20 countries 340 M turnover 1500 skilled staff 65 million card processed 30 billion transactions processed, of which 22.2 billion trading instructions Over 11 trillions bytes exchanged through 600 SIAnet connections Banks owned Under Central Bank oversight Strong record in building and managing mission critical infrastructures: RTGS, MTS, post-trading, RNI, CBI, EBA STEP2, Italian ACH, card processing

7 SIA is expert in Securities Processing value chain Execution Post - trade Surveillance and risk management London Stock Exchange Group MTS London Stock Exchange Group Monte Titoli Other Extra-EU CSDs SIA Eagle for Regulators & Markets Intermediaries Network services (connectivity and secure messaging) 14 major trading venues low latency access through SIAnet Financial Ring Post-trade secure messaging SWIFT Service Bureau RNI - Italian Interbank Network

8 Colt in figures 21-country, 35,000km network connecting 100 cities, with metropolitan area networks in 39 cities 18,000 buildings directly connected 19 ISO compliant integrated data centres 35,000 Customers 1.6 Billion Turnover 6000 skilled staff Managed Networking (including Ultra Low Latency, SWIFTNet) Managed IT services (including Cloud, Grid, Storage) Unified Communications and Collaboration Leading footprint in Financial Community

9 Agenda SIA-Colt partnership SIA-COLT value Proposition Differentiators Systems architecture: High Level Overview T2S Standard Functionality Pricing and Timing SIX-SIS Zuerich April 4th 2012

10 SIA-Colt value proposition strong differentiators(1/3) Highest resilience Cross border multiple high bandwidth circuits Metropolitan meshes-multiple alternative routes Automatic and instantaneous network fail-over Proximity to T2S data centers SIA-Colt DCs are located in T2S countries Milan Italy - production Milan Italy in-country backup Frankfurt Germany out-of-country backup Duplicated circuits between all data centres Each individual circuit can handle all T2S traffic

11 SIA-Colt value proposition strong differentiators(2/3) Peer2Peer messaging system Confidentiality: your data is not stored Seamless transit: lowest latency End to End contractual SLA Contractual end-to-end SLA Comprehensive % service availability E2E remote management Proactive problem resolution 24/7 Multilingual help desk Proactive scalability

12 SIA-Colt value proposition strong differentiators(3/3) Leading File Transfer System 42 Million files exchanged in 2010 High speed and wide bandwidth Peace of mind One stop shop turn-key solution All components provided and installed by SIA-Colt Lowest total cost of ownership All inclusive Flexible and transparent pricing schemes Highly competitive prices

13 Agenda SIA-Colt partnership SIA-COLT value Proposition Differentiators Systems architecture: High Level Overview T2S Standard Functionality Pricing and Timing SIX-SIS Zuerich April 4th 2012

14 SIA-Colt solution is based on a decoupled interface Data Exchange Protocol (DEP) the messaging protocol defined by T2S, to communicate with the T2S platform Actors will use the SIAnet.DOM protocols and infrastructure Application to Application (A2A) T2S Actors Region 1 Site 1 Site 2 DEP SIAnet.DOM Protocols CSD 1 CSD 2 SIA-Colt Region 2 Site 1 Site 2 Browsing User to Application (U2A) Browsing Bank 1 Bank 2 Authentication, access control and dynamic addressing End-to-End session

15 SIA-Colt takes care of T2S connectivity complexity Data Exchange Protocol development and maintenance Physical connectivity topology, resilience and security Support to T2S Business Continuity Business Continuity for NSP own connectivity services infrastructure (physical and messaging) EU Trusted CA services and PKI solution, with provisioning of HSM (T2S) and tokens/hsm (Actors) Sharing/delegation of NSP infrastructure internal management with Eurosystem for control and governance duties Risk management certifications and ISAE 3402 reporting

16 End-to-End Solution T2S Platforms Italy T2S SIA-Colt perimeter SIA-Colt performs the complete service management of software & hardware infrastructure components Real end-to-end contractual SLA SIA-Colt (SW provisioning) T2S Actor T2S Actor BA Germany DEP Gateway DB Data & NR Log HSM Network Gateway DB SIA-Colt network Network Gateway DB HSM T2S Smart Integrator DB Data & NR Log NOC Demarcation line for traditional secure messaging model

17 T2S data centre connectivity The T2S datacentres will be connected to SIA-Colt datacentres using a dedicated Ethernet based network: Point to point native Ethernet circuits in the same region (strong line in blue and green) Cross regions point to point Ethernet circuits Guaranteed and dedicated bandwidth provisioned Low, deterministic and steady latency Support of multicast and broadcast Service presentation based on Gigabit interfaces towards T2S Local Area network Every circuit will be capable to support the whole traffic The Ethernet circuits will be terminated on layer 3 equipment Two routers will be installed per datacentre (HSRP Enabled) Encryption will be enabled in order to ensure confidentiality and integrity of the business flows on the network Authentication will be based on digital certificates

18 T2S Actor Connectivity Actors network Based on IPVPN network (MPLS based network) Wide range of access methods and resilience features Colt-SIA datacentres are a middle-tier between the actors and T2S Communication between T2S and the Actors is screened by Intrusion Prevention Systems Mitigation of malicious traffic and proactive reaction to well-known attacks T2S IT-2 T2S DE-1 T2S IT-1 NSP Ethernet T2S DE-2 PKI Backup NSP Milan 1 NSP Milan 2 NSP Frankfurt NSP IPVPN PKI Actor-1 Actor-2 Actor-N Highly secure network connectivity between the T2S Actors and the NSP Hub and spoke topology and access control Full segregation between the T2S Actors Enabled network encryption to ensure confidentiality and integrity Enforced security using Digital certificates based authentication for the network devices

19 A2A - Messaging Services protocol The Messaging Interfaces, the DEP Gateway and the DEP Integrator, are the entities involved in the A2A orchestration The DEP Integrator at the T2S Actors site will offer interaction with the Business Applications on the T2S Actors based on WMQ middleware and XML primitives for easy integration All interactions are performed in push mode, i.e. it is always the sender that starts the communication

20 User to Application (U2A) U2A interaction will be supported using: IP connectivity between T2S Actors end users and the T2S web platform SSL VPN gateways hosted in SIA-Colt datacentres to control the end users access to the network Resilient architecture based on a cluster of GWs in each region Control will be based on the IP address of the access point and on the digital certificates, before they are allowed to get access to the T2S web platform

21 T2S Smart Integrator simplifies integration with actor s business application Message content validation Format translation from proprietary or into T2S ISO Bulk and Unbulk Message copy functionality Multi NSP Switch T2S Smart Integrator Makes core business independent from any network constraint Enables an effective multi-nsp Disaster Recovery and Business Continuity, eliminating any single point of failure SIA-Colt Network Actor BA Actor protocol (ad hoc implementation based on T2S Actor s requirements) T2S Smart Integrator Other Network

22 Sample network gateway configurations NSP perimeter VPN DB All-in-one Production, Test, Training & Development All running in one environment FEMS OR.separate Production Test Training Development

23 Sample network gateway configurations Production site NSP perimeter DB VPN VPN FEMS Multiple options for connectivity and server resilience Connectivity options include: Standby site NSP perimeter DB Dualling Protected circuits Diverse routing Diverse carrier VPN FEMS

24 Sample network gateway configurations NSP perimeter DB VPN FEMS Clustered server for scalability and resilience

25 Network Non-Repudiation process T2S SIA-Colt T2S Actor T2S Platform Copy ACK Copy T2S Actor BA DEP Gateway HSM ACK Network Gateway SIA-Colt network Copy HSM Network Gateway Smart Integrator DB Data & NR Log DB DB DB Data & NR Log Receiver DEP Sender 9. DEP Sender T2S Gateway FEMS Integrator Gateway Actor DEP Sender Receiver FEMS DEP Sender verifies 1. Gateway stores signs BA Business FEMS Integrator verifies stores generates sends makes the FEMS signature received deletes sends message the received signs Application signature a copy sends the message the of copy of the and ACK received the of the of generates to makes ACK and message, DEP all and, sends all a Integrator signature to copy sends the to if it (no receiver for ok, back it Sender message to for longer sends it sender T2S resending related (actor:request) receiver FEMS DEP Platform needed) it FEMS Integrator information if DEP if FEMS needed Gateway

26 Agenda SIA-Colt partnership SIA-COLT value Proposition Differentiators Systems architecture: High Level Overview T2S Standard Functionality Pricing and Timing SIX-SIS Zuerich April 4th 2012

27 1- T2S Standard functions for secure messaging Guaranteed delivery Only-once delivery, no data duplication Delivery in the same order of acceptance Enhanced security features: authentication confidentiality integrity Native data compression Neutrality with respect to the format and content of data Decoupling of network layer and core business application Smooth integration of varied Customer technological environments Automatic suspension/reactivation of data transfer Automatic traffic resending Full scalability Digital signature supporting non repudiation functionality

28 2- Other T2S standard services and functionality Archiving Archival for data exchanged and all related security information supporting the non repudiation feature Logging Log Management System compliant with NIST (log integrity and confidentiality) LMS collects all logs generated by the network infrastructure (e.g. encryption/network devices, security devices, DEP gateways), supporting audit processes and dispute resolution Accounting All information relating to the data traffic exchanged (A2A and U2A) and other supporting services used by each T2S Actor (e.g. PKI) collected and sent to SIA-Colt s reporting & billing procedures Appropriate billing policy (reverse billing modality supported) Training On site training about operations management and application interfaces Remote assistance during the entire pilot period All relevant manuals (Installation, Operations, User Guides) On-site support at T2S Actor request Reporting Annual SAS70/ISAE 3402

29 3- Other standard T2S functionality: PKI services PKI service with associated ETSI compliant Certification Authority Fully-audited support processes for delegation of the Registration Authority (RA) to Actors as Delegated RA PKI service delegating a part of the enrolment and vetting process to local and trustworthy operators using a paperless electronic workflow, with customized forms per role and function web portal to upload the forms to keep traceability and auditability SIA-Colt Security Officers DiCoA 1 Security Officers for for DiCoA 1 Delegated Delegated RA RA 1 RA 2 End user End user community for for community for for DiCoA 1 DiCoA 1 SIA-Colt DiCoA 2 Security Officers for for DiCoA 2 Delegated RA RA 1 End user community for for DiCoA 2 U2A Two digital certificates on USB tokens for each Actors user one certificate for identification/authentication on the T2S web platform one certificate for signature USB tokens provided by the NSP together with the certificates A2A Two digital certificates for each Actors user one for authentication purposes (and for non repudiation in the scope of NSP messaging solution) one for signing the messages and files exchanged with T2S platform (end-to-end non repudiation) T2S and the Actors Register and enrol their own users, as DRA Collect, validate and transmit supporting documents (photo ID scans for instance) Eventually deliver (in a face to face meeting) the corresponding token or card to its final holder

30 Service Delivery and Help Desk Service delivery SIA-Colt NOC provides advanced Customer support and governance features to connectivity and messaging infrastructure, including monitoring and management for the entire service up to Customer sites NOC provides: first level support and single point of contact (ticket based) incident and problem management and escalation activation capacity monitoring of nodes and related access plants switching of active nodes within sites or across sites, on request, to support Customer side local faults or business continuity needs (e.g.: site DR) implementation/removal of logical paths within relevant circuits NOC has dedicated secondary sites for business continuity Help Desk Technical Service Desk - single point of contact for managing incidents on the monitored service, comprising event detection, trouble ticket (TT) creation and follow-up Trouble tickets can be logged reactively by T2S Actors by or by phone on a 24x7x365 basis Access to the SIA-Colt ticketing system by web browser 3 levels of fault management expertise: 1st Level Support: provides services 24x7, 365 days a year, incident ownership, 1st level of customer diagnostic, escalation management 2nd Level Support: rectifies the incident through diagnostics, tests and corrective actions 3rd Level Support: manages all technical escalations

31 Agenda SIA-Colt partnership SIA-COLT value Proposition Differentiators Systems architecture: High Level Overview T2S Standard Functionality Pricing and Timing SIX-SIS Zuerich April 4th 2012

32 Pricing model Price Policy: T2S require the publication a Price Policy for the minimum set of services to connect T2S Actors to the T2S Platform

33 A new paradigm 1. A credible alternative 2. with strong competitive differentiators providing an end-to-end solution removing integration barriers 3. Aiming to be the price leader

34 T2S Timetable NSP Development and Acceptance Phases PoC PHASE >February 2012 July 2012< IMPLEMENTATION PHASE >July2012 March 2013< ENAT PHASE >March 2013 September2013< SIA-Colt November 2013 Ready

35 Maurice Bousin Antonio Sorlini Hugh Cumberland (0) Andrew Young (0)

SIX REPO AG SERVICE DESCRIPTION

SIX REPO AG SERVICE DESCRIPTION SIX REPO AG SERVICE DESCRIPTION 1. SUMMARY... 3 2. SIAnet Financial Ring... 4 2.1 SIAnet Financial Ring infrastructure... 4 2.2 Value added Services on SIAnet Financial Ring... 5 3. SIAnet Suite... 7 3.1

More information

T2S Connectivity Guide

T2S Connectivity Guide T2S Connectivity Guide Page 1 of 23 T2S Connectivity Guide Author 4CB Version 1.0 Date 29/11/2013 Status Classification Classified until Final Public N/A T2S Connectivity Guide Page 2 of 23 TABLE OF CONTENTS

More information

The T2S Dedicated Link solution. Connectivity Workshop 27 February S. Orsini, B. Giangregorio, D. Bernabucci Banca d Italia (4CB)

The T2S Dedicated Link solution. Connectivity Workshop 27 February S. Orsini, B. Giangregorio, D. Bernabucci Banca d Italia (4CB) The T2S Dedicated Link solution Connectivity Workshop 27 February 2012 S. Orsini, B. Giangregorio, D. Bernabucci Banca d Italia (4CB) 1 Disclaimer The following slides summarize the envisaged implementation

More information

T2S Dedicated Link Connectivity Solution

T2S Dedicated Link Connectivity Solution T2S Dedicated Link Connectivity Solution Presentation Meeting, 22 April 2013 T2S Programme Office European Central Bank 0 Dedicated Link Presentation Agenda Dedicated Link Origin Dedicated Link Overview

More information

T2S VANSP. End-to-end solutions for state-of-the-art connectivity and messaging

T2S VANSP. End-to-end solutions for state-of-the-art connectivity and messaging T2S VANSP End-to-end solutions for state-of-the-art connectivity and messaging A next-generation, T2S-ready solution......with the lowest total cost of ownership. SIA-Colt enable CSDs, central banks and

More information

Secure Access & SWIFT Customer Security Controls Framework

Secure Access & SWIFT Customer Security Controls Framework Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Connectivity Services, Autobahn and New Services

Connectivity Services, Autobahn and New Services Connectivity Services, Autobahn and New Services Domenico Vicinanza, DANTE EGEE 09, Barcelona, 21 st -25 th September 2009 Agenda Background GÉANT Connectivity services: GÉANT IP GÉANT Plus GÉANT Lambda

More information

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT FOR SHARED SERVICES (SHRD) Version: 1.0 Status: FINAL Date: 06/12/2017 Contents 1 EUROSYSTEM SINGLE MARKET INFRASTRUCTURE GATEWAY (ESMIG)... 6 1.1 Overview...

More information

Global IP Network (GIN) Connects You to the World

Global IP Network (GIN) Connects You to the World Global IP (GIN) Connects You to the World Delivering your Business Vision with the World s Tier 1 leading IP network NTT Communications (NTT Com) Global IP network (GIN) 100GigE service is the fastest

More information

Global Leased Line Service

Global Leased Line Service SERVICE BROCHURE Global Leased Line Service from NTT Communications Predictable, low latency global networking with the highest quality A global managed bandwidth solution from NTT Communications (NTT

More information

zsah Cloud Offering Security FAQ In partnership with Clearswift

zsah Cloud Offering Security FAQ In partnership with Clearswift zsah Cloud Offering Security FAQ In partnership with Clearswift zsah s Cloud Offering Overview zsah Main office and Data Centres Our main office is located in central London with support staff available

More information

Thomson Reuters. FCN Services

Thomson Reuters. FCN Services Thomson Reuters FCN Services Zajil International Telecom is one of the primary FCN Service providers in the MENA region designated and certified by Thomson Reuters as an approved solutions provider for

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

Position Title: IT Security Specialist

Position Title: IT Security Specialist Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such

More information

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

SWIFT SERVICES. Enabling the global exchange of electronic financial messages. Delivering value. Enabling success. Integrated Services

SWIFT SERVICES. Enabling the global exchange of electronic financial messages. Delivering value. Enabling success. Integrated Services SWIFT SERVICES Enabling the global exchange of electronic financial messages Delivering value. Enabling success. Integrated Services is a proud member of the BankservAfrica Group Integrated Services BANKSERVAFRICA

More information

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist Identität und Autorisierung als Grundlage für sichere Web-Services Dr. Hannes P. Lubich IT Security Strategist The Web Services Temptation For every $1 spent on software $3 to $5 is spent on integration

More information

WEB-APIs DRIVING DIGITAL INNOVATION

WEB-APIs DRIVING DIGITAL INNOVATION WEB-APIs DRIVING DIGITAL INNOVATION Importance of Web-APIs Simply put, Web-APIs are the medium to make a company s digital assets consumable to any channel, which has a current or latent need. It helps

More information

ZyLAB delivers a SaaS solution through its partner data center provided by Interoute and through Microsoft Azure.

ZyLAB delivers a SaaS solution through its partner data center provided by Interoute and through Microsoft Azure. Security In today s world, the requirement to focus on building secure solutions and infrastructure has become an important part of the value that businesses deliver to customers and resellers. This document

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...

More information

AGARIK, ATOS GROUP COMPANY PRESENTATION. Agarik, connected critical hosting

AGARIK, ATOS GROUP COMPANY PRESENTATION. Agarik, connected critical hosting AGARIK, ATOS GROUP COMPANY PRESENTATION Agarik, connected critical hosting Company profile 2 Profile The company INDUSTRY: CLOUD & MANAGED SERVICES An ATOS group company Staff: 50 (90% technical teams)

More information

Simplify Your Network Security with All-In-One Unified Threat Management

Simplify Your Network Security with All-In-One Unified Threat Management Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,

More information

SignCloud. Remote Digital Signature System

SignCloud. Remote Digital Signature System SignCloud Remote Digital Signature System All the information in this document is CONFIDENTIAL and can t be used entirely or in part without a written permission from Bit4id SRL. Contents 1. Executive

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability Dubrovnik, Croatia, South East Europe 20-22 May, 2013 IoT, Cloud and Managed Services Accelerating the vision to reality to profitability M. Abdul Munim Cloud and Managed Services Program Lead EMEAR Region

More information

Enterprise Case Study

Enterprise Case Study REUTERS / Stefano Rellandini Enterprise Case Study The Future of Your WAN Dimitrios Voutsinas Head of Network Design and Development About Thomson Reuters We are the leading source of intelligent information

More information

BT Connect Networks that think Optical Connect UK

BT Connect Networks that think Optical Connect UK BT Connect Networks that think Optical Connect UK Fast, reliable, secure and affordable Connecting the heart of your organisation Your organisation and its people rely on its applications email, databases,

More information

Secure Messaging Buyer s Guide

Secure Messaging Buyer s Guide Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com December 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered

More information

QuickBooks Online Security White Paper July 2017

QuickBooks Online Security White Paper July 2017 QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a

More information

Talk2M. You and your devices, together everywhere. IIoT Cloud for Remote Connectivity.

Talk2M. You and your devices, together everywhere. IIoT Cloud for Remote Connectivity. You and your devices, together everywhere. Talk2M IIoT Cloud for Remote Connectivity Talk2M is the first secure industrial connectivity service in the cloud. With servers spread out all over the world,

More information

GÉANT L3VPN Service Description. Multi-point, VPN services for NRENs

GÉANT L3VPN Service Description. Multi-point, VPN services for NRENs GÉANT L3VPN Service Description Multi-point, VPN services for NRENs Issue Date: 1 November 2017 GÉANT L3VPN Overview The GÉANT L3VPN service offers the National Research and Education Networks (NRENs)

More information

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds EXECUTIVE BRIEF SHAREBASE BY HYLAND Automate sharing. Empower users. Retain control. With ShareBase by Hyland, empower users with enterprise file sync and share (EFSS) technology and retain control over

More information

Infrastructure Security Overview

Infrastructure Security Overview White Paper Infrastructure Security Overview Cisco IronPort Cloud Email Security combines best-of-breed technologies to provide the most scalable and sophisticated email protection available today. Based

More information

Network. Arcstar Universal One

Network. Arcstar Universal One Network Universal One ARCSTAR UNIVERSAL ONE Universal One Enterprise Network NTT Communications' Universal One is a highly reliable, premium-quality network service, delivered and operated in more than

More information

Fact sheet FRANKFURT DATA CENTRE CAMPUS. Connect, transact and grow

Fact sheet FRANKFURT DATA CENTRE CAMPUS. Connect, transact and grow Fact sheet FRANKFURT DATA CENTRE CAMPUS Connect, transact and grow WELCOME TO FRANKFURT On the infrastructure side, the location Frankfurt am Main is the backbone of the digital business in Germany. As

More information

MTS Co-Location Hosting - MILAN

MTS Co-Location Hosting - MILAN MTS Co-Location Hosting - MILAN 25 October 2017 1 of 7 1.0 Introduction This policy document encompasses Co-Location services provided by MTS S.p.A., acting also as service provider of EuroMTS Limited

More information

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices Chris Steel, Ramesh Nagappan, Ray Lai www.coresecuritypatterns.com February 16, 2005 15:25 16:35

More information

TARGET instant payments settlement (TIPS) how? Massimiliano Renzetti Banca d Italia (4CB) Focus session, 7 July 2017, Frankfurt

TARGET instant payments settlement (TIPS) how? Massimiliano Renzetti Banca d Italia (4CB) Focus session, 7 July 2017, Frankfurt TARGET instant payments settlement (TIPS) how? Massimiliano Renzetti Banca d Italia (4CB) Focus session, 7 July 2017, Frankfurt Table of content 1 2 3 Project challenges Proof of concept Architecture overview

More information

WIPRO. Proactive about your Progress

WIPRO. Proactive about your Progress WIPRO Proactive about your Progress Which situation would you rather be in? Scenario 1 A leading IT company was using MS Exchange to send and receive mails across the organisation. As the organisation

More information

Efikasniji modeli IT usluga: Managed Services and Cloud Jedna platforma-neograničene mogućnosti. Hrvoje Supić Maks Strajher

Efikasniji modeli IT usluga: Managed Services and Cloud Jedna platforma-neograničene mogućnosti. Hrvoje Supić Maks Strajher Efikasniji modeli IT usluga: Managed Services and Cloud Jedna platforma-neograničene mogućnosti Hrvoje Supić Maks Strajher What is a Managed Services? Taking responsibility for daily operations of parts

More information

SafeNet Authentication Service for Your Business Introducing Strong Authentication as-a-service. Marko Bobinac PreSales Engineer CEE, Russia & CIS

SafeNet Authentication Service for Your Business Introducing Strong Authentication as-a-service. Marko Bobinac PreSales Engineer CEE, Russia & CIS SafeNet Authentication Service for Your Business Introducing Strong Authentication as-a-service Marko Bobinac PreSales Engineer CEE, Russia & CIS Agenda SafeNet introduction Introduction to Authentication

More information

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more. FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013 Visit us online at Flank.org to learn more. HITRUST CSF v9 Framework ISO 27001/27002:2013 Framework FLANK ISO 27001/27002:2013 Documentation from

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust

More information

Wiebe Ruttenberg & Emran Islam DG Market Infrastructure & Payments. From Cyber Threats via Cyber Security to Cyber Resilience

Wiebe Ruttenberg & Emran Islam DG Market Infrastructure & Payments. From Cyber Threats via Cyber Security to Cyber Resilience Wiebe Ruttenberg & Emran Islam DG Market Infrastructure & Payments From Cyber Threats via Cyber Security to Cyber Resilience AMISeCo meeting, 7 March 2017 Rubric Cyber threats landscape Cyber threats are

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

Five Key Considerations for Selecting Cloud Recovery Services

Five Key Considerations for Selecting Cloud Recovery Services Five Key Considerations for Selecting Cloud Recovery Services Looking for a cloud-based solution for backup and recovery? Here are some important things to keep in mind when interviewing providers. By

More information

E1-E2 (EB) Chapter 7 NIB II

E1-E2 (EB) Chapter 7 NIB II E1-E2 (EB) Chapter 7 NIB II For internal circulation of BSNL only Page 1 7. NIB PHASE - II Core of BSNL s Broadband service is National Internet Backbone (NIB). NIB is a mission to build world-class infrastructure

More information

QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen

QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen QuoVadis The Swiss solution for digital certificates with worldwide distribution QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen Overview!! Check list for Root signing or managed PKI!!

More information

Reaping the Full Benefits of a Hybrid Network

Reaping the Full Benefits of a Hybrid Network Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional

More information

Business Continuity & Disaster Recovery

Business Continuity & Disaster Recovery knowledge partner MARKET INSIGHT Business Continuity & Disaster Recovery Considerations for Saudi Organizations /mobily @MobilyBusiness 056 010 0901 I business.sales@mobily.com.sa About Us Mobily; the

More information

FUJITSU Backup as a Service Rapid Recovery Appliance

FUJITSU Backup as a Service Rapid Recovery Appliance FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Enterprise Certificate Console. Simplified Control for Digital Certificates from the Cloud

Enterprise Certificate Console. Simplified Control for Digital Certificates from the Cloud Enterprise Certificate Console Simplified Control for Digital Certificates from the Cloud HydrantID Enterprise Management Console HydrantID s HydrantSSL Enterprise service and HydrantCloud Managed PKI

More information

Accelerate Your Cloud Journey

Accelerate Your Cloud Journey Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension

More information

Service Description Safecom Customer Connection Version 3.5

Service Description Safecom Customer Connection Version 3.5 Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

BREITKOM Network Sdn Bhd Corporate Profile

BREITKOM Network Sdn Bhd Corporate Profile BREITKOM Network Sdn Bhd Corporate Profile ICT Connectivity, Solutions and Provision 1 AGENDA BREITKOM Network Sdn Bhd Corporate Overview Our Products & Services Telco Products & Solutions Our Services

More information

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers AN IPSWITCH WHITEPAPER 7 Steps to Compliance with GDPR How the General Data Protection Regulation Applies to External File Transfers Introduction Stolen personal data drives a thriving black market for

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

SD-WAN Transform Your Agency

SD-WAN Transform Your Agency Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud 2 Orchestrate the Cloud Infrastructure Business Drivers for Cloud Long Provisioning Times for New Services o o o Lack

More information

Data Services. Reliable, high-speed data connectivity

Data Services. Reliable, high-speed data connectivity Data Services Reliable, high-speed data connectivity Discover businessgrade, high-speed data connectivity Our family of data services includes (with Fibre To The Cabinet and Converged Voice and Data),

More information

eid Applications Cross Border Authentication

eid Applications Cross Border Authentication eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

Data Center Applications and MRV Solutions

Data Center Applications and MRV Solutions Data Center Applications and MRV Solutions Introduction For more than 25 years MRV has supplied the optical transport needs of customers around the globe. Our solutions are powering access networks for

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Fact sheet VIENNA DATA CENTRE CAMPUS. Connect, transact and grow

Fact sheet VIENNA DATA CENTRE CAMPUS. Connect, transact and grow Fact sheet VIENNA DATA CENTRE CAMPUS Connect, transact and grow WELCOME TO VIENNA Vienna is one of Europe s best connected cities, and is home to VIX, Austria s largest Internet exchange. In the North

More information

VPN Cloud. Mako s SD-WAN Technology

VPN Cloud. Mako s SD-WAN Technology VPN Cloud Mako s SD-WAN Technology Introduction VPN Cloud is a secure, scalable, and flexible encrypted wide area networking solution from Mako Networks. It is designed to be used to link remote or distributed

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

EBPI Critical Payments Solutions for a market in turbulence. Frank Kooistra, Product Owner

EBPI Critical Payments Solutions for a market in turbulence. Frank Kooistra, Product Owner EBPI Critical Payments Solutions for a market in turbulence Frank Kooistra, Product Owner Agenda Introduction EPBI Payments a market turbulence How EBPI Critical Payments Solutions Stack supports the market

More information

Company Profile. Cloud Acropolis Your True Omani Cloud Partner

Company Profile. Cloud Acropolis Your True Omani Cloud Partner Company Profile Cloud Acropolis Your True Omani Cloud Partner www.cloudacropolis.com Content About Us Strategy Schematic Telecom and ICT Innovations Testimonials ICT SME Challenges and Opportunities Contact

More information

Watson Developer Cloud Security Overview

Watson Developer Cloud Security Overview Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for

More information

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Cybersecurity ecosystem and TDL Antonio F. Skarmeta Cybersecurity ecosystem and TDL Antonio F. Skarmeta University of Murcia (UMU) SPAIN CyberSecurity Challenges in a fully connected World Trust Framework 1. Policies for trust in heterogeneous

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

Oktober 2018 Dell Tech. Forum München

Oktober 2018 Dell Tech. Forum München Oktober 2018 Dell Tech. Forum München Virtustream Digital Transformation & SAP Jan Büsen Client Solutions Executive, Virtustream The Business Agenda: Digital IT = Competitive Advantage Business Driven

More information

Fact sheet COPENHAGEN DATA CENTRE CAMPUS. Connect, transact and grow

Fact sheet COPENHAGEN DATA CENTRE CAMPUS. Connect, transact and grow Fact sheet COPENHAGEN DATA CENTRE CAMPUS Connect, transact and grow WELCOME TO COPENHAGEN Ranked by the World Bank as one of the best countries in the world to conduct business, Denmark boasts a forward-thinking

More information

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions

More information

to access T2S Oreste Di Francesco CSDs Connectivity Workshop, ECB February 27, 2012

to access T2S Oreste Di Francesco CSDs Connectivity Workshop, ECB February 27, 2012 Leveraging your SWIFT to access T2S Oreste Di Francesco CSDs Connectivity Workshop, ECB February 27, 2012 Agenda SWIFT in Figures T2S involvement so far Our VAN Solution Our Value Proposition VAN vs DL

More information

T Yritysturvallisuuden seminaari

T Yritysturvallisuuden seminaari T-110.5690 Yritysturvallisuuden seminaari Chapter 10: Conceptual Security Architecture Lauri Helkkula 22.10.2007 Sources Chapter 10 of the book Sherwood, Clark, Lynas: Enterprise Security Architecture,

More information

Customer Managed Connectivity - Milan

Customer Managed Connectivity - Milan Customer Managed Connectivity - Milan Service and Technical Description June 2017 Version 2 Table of Contents 1.0 Document Scope 3 1.1 1.2 1.3 1.4 Structure of this document 3 Version History 4 Use of

More information

Axway SecureTransport

Axway SecureTransport Axway SecureTransport Enhanced Managed File Transfer Gateway For many organizations, years of adding one-off file-transfer connections to meet specific needs has created a complex environment that lacks

More information

Cirius Secure Messaging Single Sign-On

Cirius Secure Messaging Single Sign-On Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) A Guide to Leveraging Privileged Account Security to Assist with SWIFT CSCF Compliance Table of Contents Executive Summary...

More information

Tiscali Business Services Wholesale IPVPN Services Summary

Tiscali Business Services Wholesale IPVPN Services Summary Tiscali Services Wholesale IPVPN Services Summary Products covered: WIPVPN Standard WIPVPN WIPVPN Premium WIPVPN Premium WIPVPN May 2007 V.2.0 1 Table of Contents 1. Introduction... 3 2. Core product offering.

More information

Insight Session on T2S User Testing

Insight Session on T2S User Testing Insight Session on T2S User Testing Dedicated Info Session on T2S User Testing and Migration: an urgent matter Frankfurt, 3 July 2013 T2S Programme Office European Central Bank 1 T2S User Testing Agenda

More information

Trusted Identities That Drive Global Commerce

Trusted Identities That Drive Global Commerce Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance

More information

Monte Titoli Connectivity test. v1.0 - February 2015

Monte Titoli Connectivity test. v1.0 - February 2015 Monte Titoli Connectivity test v1.0 - February 2015 Page 1 Introduction To support T2S platform, Monte Titoli has prepared new dedicated environments: - Production - Starting (avviamento) and DR they will

More information

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY

COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY COOPERATIVE ITS SECURITY STANDARDIZATION AND ACTIVITIES ON EUROPEAN C ITS TRUST MODEL AND POLICY ETSI IoT Security WORKSHOP, 13 15 June 2016 Brigitte LONC, RENAULT ETSI TC ITS WG 5 Chairman ETSI 2016.

More information

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the

More information

Fact sheet BRUSSELS DATA CENTRE CAMPUS. Connect, transact and grow

Fact sheet BRUSSELS DATA CENTRE CAMPUS. Connect, transact and grow Fact sheet BRUSSELS DATA CENTRE CAMPUS Connect, transact and grow WELCOME TO BRUSSELS Belgium has always been an important economic and business hub in Europe, and that s especially true today. Strategically

More information