Which Communications Protocol Is Best for B2B Integration? Comparing AS2, FTP and other popular B2B e-commerce standards

Size: px
Start display at page:

Download "Which Communications Protocol Is Best for B2B Integration? Comparing AS2, FTP and other popular B2B e-commerce standards"

Transcription

1 Which Communications Protocol Is Best for B2B Integration? Comparing AS2, FTP and other popular B2B e-commerce standards John Radko, Vice President, Enterprise Architecture, GXS Rochelle Cohen, Sr. Marketing Manager, GXS

2 Agenda Connectivity Protocols Overview John Radko Key Attributes to Consider John Radko Push vs Pull Encryption Non-repudiation Delivery Acknowledgement How Business Protocols Work John Radko GXS Solutions for Connectivity Rochelle Cohen Q&A Slide 2 GXS, Inc.

3 Connectivity Protocols Overview Slide 3 GXS, Inc.

4 Understanding Communications for Business to Business Business Protocols Basic + Security + Interoperability, Non- Repudiation, Receipt Management Application Protocols Basic + (security) + API call Security Protocols Basic Protocols Basic + Security Move Data How To Manage Many Different Options, With Different Security Schemes, Requirements for Receipts, Acknowledgements, etc? Slide 4 GXS, Inc.

5 Apologies, you might need this for the next page

6 Protocol Attributes Public Internet Encrypted Channel Encrypted Payload Non-repudiation Support Pull Model Support Push Model Interoperability Open Standard High Adoption Delivery Ack Global Adoption Business Protocols Application Protocols Security Protocols Basic Protocols AS1 AS2 AS3 AS4 OFTP SWIFT RosettaNet SOAP REST WebSphere MQ JMS Prop MFT (C*D, S*T) HTTPS FTPS SFTP FTP HTTP SMTP

7 Protocols around the World OFTP, OFTP2, EBICS Hulft, Zengin, JCA FTP, FTPS, SFTP, HTTPS, SOAP, REST AS1, AS2, AS3, AS4 SWIFT WebSphere MQ, JMS, Proprietary MFT Slide 7 GXS, Inc.

8 Push and Pull Models Slide 8 GXS, Inc.

9 Push Model Communications A Public Internet or other TCP/IP network Send document to B Slide 9 GXS, Inc.

10 Pull Model Communications A Public Internet or other TCP/IP network Poll for available documents Request document(s) B Slide 10 GXS, Inc.

11 Encryption Slide 11 GXS, Inc.

12 Channel Encryption A Sender ( A) Establish secure channel to receiver Send message through channel Receiver ( B) Accept secure channel from sender B Public Internet or other TCP/IP network Transfer Secured (in clear Tunnel or encrypted) Slide 12 GXS, Inc.

13 A Quick Word on Digital Certificates A Digital Cert Issuer: Verisign, et. Al. B <<public <<public key>> <<private key>> DB A Slide 13 GXS, Inc.

14 Symmetric Encryption A Sender ( A) Encrypt using shared secret Receiver ( B) Decrypt using shared secret B Public Internet or other TCP/IP network Transfer (in clear or encrypted) Slide 14 GXS, Inc.

15 Asymmetric Encryption A Sender ( A) Encrypt using receiver s public key Receiver ( B) Decrypt with own private key B Public Internet or other TCP/IP network Transfer (in clear or encrypted) Slide 15 GXS, Inc.

16 Non-repudiation Slide 16 GXS, Inc.

17 Non-repudiation A B Sender ( A) Share public key for receiver Sign message with private key Receiver ( B) Verify signature with public key for partner A A Slide 17 GXS, Inc.

18 Delivery Acknowledgement Slide 18 GXS, Inc.

19 Delivery Acknowledgement Multiple levels Core protocol Business protocol Functional Acknowledgment ASx and OFTP have strong support Can include digital signature and checksums Slide 19 GXS, Inc.

20 Questions? Slide 20 GXS, Inc.

21 How Business Protocols Work Slide 21 GXS, Inc.

22 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B Public Internet or other TCP/IP network SMTP or FTP or HTTP Slide 22 GXS, Inc.

23 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B Public Internet or other TCP/IP network SMTP or FTP or HTTP Slide 23 GXS, Inc.

24 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B Public Internet or other TCP/IP network SMTP or FTP or HTTP Slide 24 GXS, Inc.

25 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B Public Internet or other TCP/IP network SMTP or FTP or HTTP Slide 25 GXS, Inc.

26 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B Public Internet or other TCP/IP network SMTP or FTP or HTTP A Slide 26 GXS, Inc.

27 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B MDN Public Internet or other TCP/IP network SMTP or FTP or HTTP Slide 27 GXS, Inc.

28 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B Public Internet or other TCP/IP network SMTP or FTP or HTTP MDN Slide 28 GXS, Inc.

29 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B MDN Public Internet or other TCP/IP network SMTP or FTP or HTTP Slide 29 GXS, Inc.

30 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B MDN Public Internet or other TCP/IP network SMTP or FTP or HTTP Slide 30 GXS, Inc.

31 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B Public Internet or other TCP/IP network SMTP or FTP or HTTP Slide 31 GXS, Inc.

32 Business Protocols How They Work A Sender sign encrypt send verify MDN Receiver receive decrypt verify signature send MDN B Public Internet or other TCP/IP network MDN A SMTP or FTP or HTTP Slide 32 GXS, Inc.

33 Four Scenarios of B2B Enterprise Enterprise B2B Broker Service Provider Service Provider Service Provider Enterprise B2B Broker Enterprise B2B Broker Slide 33 GXS, Inc.

34 Questions? Slide 34 GXS, Inc.

35 GXS Solutions for Connectivity Slide 35 GXS, Inc.

36 Your B2B Communications Decisions Sending Company Receiving Company EDI Translator EDI Translator Service Provider EDI Data EDI Data Communications Software Communications Software Which protocol? How to connect? Slide 36 GXS, Inc.

37 GXS Connectivity Options Enabling Businesses to Make Technology Decisions Independent of Their s Connectivity Internet Private IP Networks (e.g. ANX, ENX, SWIFT*) Private (Frame Relay, Leased Line, MPLS) Browser Upload/Download VAN Interconnect Protocol FTP/VPN, SFTP & FTP/S AS2, AS3 SOAP & HTTPS Async, Bisync, ISDN, SNA Web Forms EDI-to-Fax OFTP, OFTP2, EBICS*, Hulft, Zengin X Services WebSphere MQ, Proprietary, Direct ERP * Available with Managed Services Only Slide 37 GXS, Inc.

38 AS2 and FTP/VPN Most Popular Protocols for New GXS Customers 40% % 30% 30% 20% 20% 10% 10% 0% AS2 FTP/VPN 0% SFTP FTPS AS2 Other FTP/VPN SFTP FTPS Other AS2 takes the lead as #1 in popularity FTP/VPN moves to #2 SFTP shows greatest growth in popularity overall Slide 38 GXS, Inc.

39 BizManager 400 TLi Translation GXS BizManager Comms Gateway Software Application Suite BizLink Enterprise Unlimited TPs/Connections Scalable/HA Supporting Optional Integrated Translation - AI and BizTrans BizConnect Professional Small to Medium Business All Comms Up to 25 TPs/Connections Optional Integrated Translation - AI and BizTrans BizConnect Entry Small Business AS2/FTP/SFTP Service Connection Enablement Non-Integrated Translators SecureLink Perimeter Security Proxies and Server for Firewall Seamless Integration and Administration Slide 39 GXS, Inc.

40 GXS Connectivity & Integration Solutions for Each Business Scenario B2B Programme Outsourcing Connectivity to GXS Trading Grid Software Slide 40 GXS, Inc.

41 Questions? Slide 41 GXS, Inc.

42 Thank You for Your Participation! For More Information EMEA Web: Phone: +44 (0) US Web: Phone: (option 3) AS2 Basics EDI Basics Slide 42 GXS, Inc.

SAMPLE Test for C : IBM Sterling B2B Integrator V5.2.6, Solution Implementation

SAMPLE Test for C : IBM Sterling B2B Integrator V5.2.6, Solution Implementation SAMPLE Test for C8060-217: IBM Sterling B2B Integrator V5.2.6, Solution Implementation This sample test is designed to give the candidate an idea of the content and format of the questions that will be

More information

Revised (10/17) Overview Transmission Toolkit

Revised (10/17) Overview Transmission Toolkit Revised (10/17) Overview Transmission Toolkit Copyright 2017 by KeyBank, N.A. Overview Transmission Toolkit All rights reserved. Reproduction of any part of this work beyond that permitted by Section 107

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 000-378 Title : IBM WebSphere DataPower SOA Appliances, Firmware V3.7.3 Vendors : IBM Version : DEMO

More information

Messaging Protocols in IBM Sterling B2B Integrator - Overview and Comparison

Messaging Protocols in IBM Sterling B2B Integrator - Overview and Comparison Messaging Protocols in IBM Sterling B2B Integrator - Overview and Comparison Aparna D Dhenge (aparna.dhenge@in.ibm.com) Kamalakannan R (rkamalakannan@in.ibm.com) Manoj Kumar Goyal (manojgoyal16@in.ibm.com)

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

AS2. By John Radko, Chief Architect for GXS. A GXS White Paper for the Active Business

AS2. By John Radko, Chief Architect for GXS. A GXS White Paper for the Active Business AS2 By John Radko, Chief Architect for GXS for the Active Business Table of Contents Executive Summary...3 Why AS2? The Business Case...4 How AS2 Works...5 AS2 Meeting the Challenges of B2B Commerce...7

More information

Secure Data Exchange Protocols

Secure Data Exchange Protocols COMPARISON GUIDE Secure Data Exchange Protocols Comparing transport protocols to securely exchange business data within and beyond the enterprise Table of Contents Introduction and Synopsis 3 Elements

More information

Overview February 19, 2016

Overview February 19, 2016 Overview February 19, 2016 Introduction The E-Business Message exchange (EBMX) is a Business to Business (B2B) gateway used by FCA to electronically communicate with its trading partners. The focus of

More information

IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway

IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway IBM Software Group IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway Presenter: Max Terpolilli WPG L2 Support WebSphere Support Technical Exchange Agenda IBM Software Group Digital

More information

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Overview and Benefits of SEEBURGER AS2 Spokes Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Technical Documentation Contents 1 CLASSIC EDI AND ITS COST PROBLEM 2 1.1 VAN (VALUE ADDED NETWORK)...

More information

These patterns include: The use of proprietary software

These patterns include: The use of proprietary software Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal

More information

Connectivity Implementation Guide

Connectivity Implementation Guide Version 3.0, October 2017 Document History Version Date Update Origin Written by Verified by 1.00 3/25/2011 Initial Draft Mike DeAlto Sue Merk 1.08 11/03/11 Final for customer use Sue Merk Sue Merk 2.0

More information

CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued

CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued CS155b: E-Commerce Lecture 6: Jan. 25, 2001 Security and Privacy, Continued FIREWALL A barrier between an internal network & the Internet Protects the internal network from outside attacks Executes administrator-defined

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

Chapter 6: Security of higher layers. (network security)

Chapter 6: Security of higher layers. (network security) Chapter 6: Security of higher layers (network security) Outline TLS SET 1. TLS History of TLS SSL = Secure Socket Layer defined by Netscape normalized as TLS TLS = Transport Layer Security between TCP

More information

Copyright and Legal Disclaimers

Copyright and Legal Disclaimers 1 Copyright and Legal Disclaimers User Manual for DiConnect Enterprise R11. Document Release Date: June 25, 2014. Copyright 2014 by DiCentral Corporation. All rights reserved. This document and all content

More information

Send and Receive Exchange Use Case Test Methods

Send and Receive Exchange Use Case Test Methods Send and Receive Exchange Use Case Test Methods Release 1 Version 1.0 October 1, 2017 Send and Receive Exchange Test Methods Release 1 Version 1.0 Technology Sponsor [Name] [Email] [Telephone] Signature

More information

DirectLine for Business AS2 USER GUIDE

DirectLine for Business AS2 USER GUIDE DirectLine for Business AS2 USER GUIDE Contents BMO AS2 Service...1 Introduction... 1 Overview... 1 ICS AS2 Mailbox User... 2 AS2 Mailbox Service Setup...3 Before You Begin... 3 Connectivity Testing...

More information

Axway SecureTransport

Axway SecureTransport Axway SecureTransport Enhanced Managed File Transfer Gateway For many organizations, years of adding one-off file-transfer connections to meet specific needs has created a complex environment that lacks

More information

Front cover B2B Enabled Managed File Transfer using WebSphere DataPower B2B Appliance XB60 and WebSphere MQ File Transfer Edition

Front cover B2B Enabled Managed File Transfer using WebSphere DataPower B2B Appliance XB60 and WebSphere MQ File Transfer Edition Front cover B2B Enabled Managed File Transfer using WebSphere DataPower B2B Appliance XB60 and WebSphere MQ File Transfer Edition Redguides for Business Leaders Richard Kinard Adrian Preston Jeremy Shapiro

More information

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc. Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) www.oasis-open.org Management Interoperability Protocol (KMIP) April 2 nd, 2009 1 Agenda The Need for Interoperable Management KMIP Overview KMIP Specification KMIP Use Cases 2 The Need for Interoperable

More information

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction

More information

Build a Flexible Application Infrastructure Environment WebSphere Connectivity Solutions

Build a Flexible Application Infrastructure Environment WebSphere Connectivity Solutions Build a Flexible Application Infrastructure Environment WebSphere Connectivity Solutions Business Challenge Our payments business is growing fast, our payments network needs to keep up! Your payments network

More information

Mainframe Networking 101 Share Session 15422

Mainframe Networking 101 Share Session 15422 Mainframe Networking 101 Share Session 15422 6 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 06/23/2014 Applied Expert Systems, Inc. 2014 1 Agenda Requirements for Communication

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

Liaison ECS. Architecture. Introduction

Liaison ECS. Architecture. Introduction Liaison ECS Connect every corner of your enterprise with ECS, Liaison s communications server. Fluent in a wide variety of data transfer protocols and standards, ECS moves data across your enterprise and

More information

Mainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler -

Mainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler - Mainframe Networking 101 Share Session 6 Junie Sanders jrsandler@cisco.com Kevin Manweiler - kmanweil@cisco.com 2 Agenda Requirements for Communication What are Networking Architectures? Networking Architectures

More information

Chapter 7 Doing Business on the Internet

Chapter 7 Doing Business on the Internet Chapter 7 Doing Business on the Internet Managing and Using Information Systems: A Strategic Approach by Keri Pearlson & Carol Saunders Introduction How has the Internet changed business? What is the difference

More information

Exam Name: IBM WebSphere Datapower SOA. Appliances Firmware V3.8.1, Solution Implementation

Exam Name: IBM WebSphere Datapower SOA. Appliances Firmware V3.8.1, Solution Implementation Vendor: IBM Exam Code: 000-609 Exam Name: IBM WebSphere Datapower SOA Appliances Firmware V3.8.1, Solution Implementation Version: DEMO 1. Which of the following is an advantage of using WS-Security instead

More information

Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC

Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC The Business Objective Automated Business Collaboration Facilitating exchange of information

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

CLEO VLTrader Made Simple Guide

CLEO VLTrader Made Simple Guide CLEO VLTrader Made Simple Guide Table of Contents Quick Reference... 3 Miscellaneous Technical Notes... 3 CLEO VLTrader at a Glance... 3 Introduction... 5 Application Page Layout... 5 Preconfigured Hosts...

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

Testpassport.

Testpassport. Testpassport http://www.testpassport.cn Exam : 000-609 Title : IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP Version : Demo 1 / 15 1. Which of the following is an advantage of using WS-Security

More information

Using SSL Public Key Security with Cornerstone MFT Server

Using SSL Public Key Security with Cornerstone MFT Server 2018 Using SSL Public Key Security with Cornerstone MFT Server Instructions for configuring and maintaining Public Key Certificate based security in conjunction with FTP, HTTP, and WebDAV services on Cornerstone

More information

ITdumpsFree. Get free valid exam dumps and pass your exam test with confidence

ITdumpsFree.  Get free valid exam dumps and pass your exam test with confidence ITdumpsFree http://www.itdumpsfree.com Get free valid exam dumps and pass your exam test with confidence Exam : 000-609 Title : IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP Vendors : IBM

More information

BusinessMail X AS2-Gateway

BusinessMail X AS2-Gateway BusinessMail X.400 - AS2-Gateway For years X.400 has been the preferred protocol for reliably transmitting EDI data. The deciding factors for this include standardized reports and tracing every mail. Using

More information

Application of Cryptographic Systems. Securing Networks. Chapter 3 Part 4 of 4 CA M S Mehta, FCA

Application of Cryptographic Systems. Securing Networks. Chapter 3 Part 4 of 4 CA M S Mehta, FCA Application of Cryptographic Systems Securing Networks Chapter 3 Part 4 of 4 CA M S Mehta, FCA 1 Application of Cryptographic Systems Learning Objectives Task Statements 1.3 Recognise function of Telecommunications

More information

How Managed File Transfer Addresses HIPAA Requirements for ephi

How Managed File Transfer Addresses HIPAA Requirements for ephi How Managed File Transfer Addresses HIPAA Requirements for ephi INTRODUCTION These new requirements have effectively made traditional File Transfer Protocol (FTP) file sharing ill-advised, if not obsolete.

More information

e-business Messaging Interchange Assessment

e-business Messaging Interchange Assessment e-business Messaging Interchange Assessment Copyright 2003 -, all rights reserved. 1 e-business Messaging Interchange Assessment Table of Contents 1 Introduction...3 2 Business Assumptions...5 FAX based

More information

inubit Suite 6 inubit Workbench/Process Engine System Connectors Guide

inubit Suite 6 inubit Workbench/Process Engine System Connectors Guide inubit Suite 6 inubit Workbench/Process Engine System Connectors Guide Copyright inubit AG Schöneberger Ufer 89-91 10785 Berlin Germany Phone: +49.30.72 61 12-0 Fax: +49.30.72 61 12-100 E-Mail: contact@inubit.com

More information

and compliments the capabilities of IBM Sterling B2B Integrator. IBM B2BAC key capabilities includes

and compliments the capabilities of IBM Sterling B2B Integrator. IBM B2BAC key capabilities includes Enablement of B2Bi Resources in B2BAC Sunil Kumar V 1, Girish Rao Salanke N S 2 1 M.Tech CNE, Department of CSE, R.V College of Engineering, Bengaluru, Karnataka, 560040, India 2 Assistant Professor, Department

More information

WebSphere 4.0 General Introduction

WebSphere 4.0 General Introduction IBM WebSphere Application Server V4.0 WebSphere 4.0 General Introduction Page 8 of 401 Page 1 of 11 Agenda Market Themes J2EE and Open Standards Evolution of WebSphere Application Server WebSphere 4.0

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents Oracle B2B 11g Technical Note Technical Note: 11g_006 Security This technical note lists the security options available in Oracle B2B Table of Contents Users... 2 Roles... 2 Step 1: Create the user in

More information

Agenda. What is Managed File Transfer? The shortcomings of traditional file transfer solutions. Introducing WebSphere MQ File Transfer Edition

Agenda. What is Managed File Transfer? The shortcomings of traditional file transfer solutions. Introducing WebSphere MQ File Transfer Edition Session 1887: Introduction to WebSphere MQ File Transfer Edition Adrian Preston (prestona@uk.ibm.com) Agenda What is Managed File Transfer? The shortcomings of traditional file transfer solutions Introducing

More information

Axway Activator Release Notes

Axway Activator Release Notes Axway Activator 6.0.0 Release Notes Document version: April 2018 Product version requirements New features and enhancements Known issues and limitations Documentation Support services Product version requirements

More information

Remote Connectivity for SAP Solutions over the Internet Technical Specification

Remote Connectivity for SAP Solutions over the Internet Technical Specification Remote Connectivity for SAP Solutions over the Technical Specification June 2006 Remote Connectivity for SAP Solutions over the page 2 1 Introduction SAP offers secure connections over the for support

More information

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version: Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named

More information

Lecture III : Communication Security Mechanisms

Lecture III : Communication Security Mechanisms Lecture III : Communication Security Mechanisms Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 X.800 : Security

More information

B2B Integration Using Seeburger AS2 Adapter with PI 7.1 Ehp1

B2B Integration Using Seeburger AS2 Adapter with PI 7.1 Ehp1 B2B Integration Using Seeburger AS2 Adapter with PI 7.1 Ehp1 Applies to: SAP NetWeaver Process Integration 7.1x, Seeburger 2.1x Summary This article is about preliminary design & configuration aspects

More information

An Oracle Technical White Paper May Deploying Oracle Beehive with BlackBerry Enterprise Server for MDS Applications

An Oracle Technical White Paper May Deploying Oracle Beehive with BlackBerry Enterprise Server for MDS Applications An Oracle Technical White Paper May 2010 Deploying Oracle Beehive with BlackBerry Enterprise Server for MDS Applications Introduction... 2 Solution Overview... 3 BlackBerry Infrastructure... 4 BlackBerry

More information

Network Interconnection

Network Interconnection Network Interconnection Covers different approaches for ensuring border or perimeter security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Lecture

More information

IBM Lotus Expeditor 6.2 Server MQ Everyplace Overview

IBM Lotus Expeditor 6.2 Server MQ Everyplace Overview IBM Lotus Expeditor 6.2 Server MQ Everyplace Overview WebSphere MQ Messaging Assured message delivery Level of assuredness may be lowered to improve performance Non-duplication of messages Application

More information

ASX ReferencePoint ISO Intra-Day Corporate Actions. SWIFT Readiness Guide

ASX ReferencePoint ISO Intra-Day Corporate Actions. SWIFT Readiness Guide ASX ReferencePoint ISO 20022 Intra-Day Corporate Actions SWIFT Readiness Guide Version 1.4 22 September 2014 1 Document purpose ASX has launched a new ISO 20022 feed for Corporate Actions, delivered over

More information

inubit 6.1 inubit Workbench/Process Engine System Connectors Guide

inubit 6.1 inubit Workbench/Process Engine System Connectors Guide inubit 6.1 inubit Workbench/Process Engine System Connectors Guide Copyright Bosch Software Innovations GmbH Schöneberger Ufer 89-91 10785 Berlin Germany Phone: +49.30.72 61 12-0 Fax: +49.30.72 61 12-100

More information

Introducing Oracle Queuing/Messaging Technology. Anthony D. Noriega MSCS, MBA, BSSE, OCP-DBA

Introducing Oracle Queuing/Messaging Technology. Anthony D. Noriega MSCS, MBA, BSSE, OCP-DBA Introducing Oracle Queuing/Messaging Technology Anthony D. Noriega MSCS, MBA, BSSE, OCP-DBA Objectives Emphasize technical concepts and Oracle queuing infrastructure technology. Highlight programming techniques,

More information

BUSINESSMAIL X.400 WEB INTERFACE AS2 GATEWAY V2.9

BUSINESSMAIL X.400 WEB INTERFACE AS2 GATEWAY V2.9 GATEWAY V2.9 User information (1) In the past it was necessary to use special forms or Excel sheets for the administration of your partners and trading relations. You had to send this information to central

More information

Agenda IBM Workplace Forms

Agenda IBM Workplace Forms 1 Agenda Welcome and Opening Video Overall Lotus Strategy & Roadmap IBM Lotus Notes & Domino Hannover and beyond IBM Workplace Overview & Strategy BREAK IBM Websphere Portal Overview & Roadmap IBM Workplace

More information

BUSINESSMAIL X.400 WEB INTERFACE SMTP MTA V2.9

BUSINESSMAIL X.400 WEB INTERFACE SMTP MTA V2.9 V2.9 User information (1) In addition to X.400 MTA (P1 Connection) the MailGate service now also supports a SMTP MTA (Message- Gate SMTP) to bind an X.400 Domain to worldwide X.400 network. While using

More information

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the

More information

Tuxedo in a SOA World An Oracle White Paper March Tuxedo

Tuxedo in a SOA World An Oracle White Paper March Tuxedo Tuxedo in a SOA World An Oracle White Paper March 2010 Tuxedo Tuxedo in a SOA World Tuxedo is one of the original SOA platforms adopting SOA principals as part of its original design and development in

More information

To start the project, launch your Visual Studio, and then Open Project FrediAppEdifact_Solution.sln

To start the project, launch your Visual Studio, and then Open Project FrediAppEdifact_Solution.sln The FrediAppEdifact is a Visual Studio C# solution of an end-to-end EDI program. Its purpose is to give programmers a framework of a working EDI solution that they can build on or simply get inspiration

More information

Transport Layer Security

Transport Layer Security Transport Layer Security TRANSPORT LAYER SECURITY PERFORMANCE TESTING OVERVIEW Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL), are the most popular cryptographic protocols

More information

TAS Network FOCUS ON. Ready for SWIFTNet 7.0!

TAS Network FOCUS ON. Ready for SWIFTNet 7.0! 01 TAS Network Gateway Ready for SWIFTNet 7.0! With effect from the 31st March 2012 it is mandatory for all SWIFT network users to adopt SWIFTNet 7.0 for the management of their network connections and

More information

BusinessMail X.400 Web interface AS2 Gateway V3.0

BusinessMail X.400 Web interface AS2 Gateway V3.0 Web interface AS2 Gateway V3.0 User information (1) In the past it was necessary to use special forms or Excel sheets for the administration of your partners and trading relations. You had to send this

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Oracle Developer Day

Oracle Developer Day Oracle Developer Day Sponsored by: Track # 1: Session #2 Web Services Speaker 1 Agenda Developing Web services Architecture, development and interoperability Quality of service Security, reliability, management

More information

MD Link Integration MDI Solutions Limited

MD Link Integration MDI Solutions Limited MD Link Integration 2013 2016 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY

More information

Configuring SSL Security

Configuring SSL Security CHAPTER9 This chapter describes how to configure SSL on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains the following sections: Overview Configuring SSL Termination

More information

Security Fundamentals

Security Fundamentals COMP 150-IDS: Internet Scale Distributed Systems (Spring 2015) Security Fundamentals Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah Copyright 2012 & 2015 Noah

More information

OFTP2 kurs Odette File r Transfer ansfer Pr otocol

OFTP2 kurs Odette File r Transfer ansfer Pr otocol OFTP2 kurs Odette File Transfer Protocol 2 Version 0.8 Main data flows in between Trading Partners in various Business structures Bilateral Value chain Value network Flow of files in B2B EDI, sketch EDI

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Presented by. GoAnywhere.com

Presented by. GoAnywhere.com Presented by Bob Luebbe Chief Architect Steve Luebbe Software Development Mgr. About Linoma Software File Transfer Challenges What is Managed File Transfer (MFT)? 10 Ways to Make File Transfers easier

More information

SMart esolutions Information Security

SMart esolutions Information Security Information Security Agenda What are SMart esolutions? What is Information Security? Definitions SMart esolutions Security Features Frequently Asked Questions 12/6/2004 2 What are SMart esolutions? SMart

More information

WAP/ WML : Wireless Protocol wireless protocol

WAP/ WML : Wireless Protocol wireless protocol Device Connectivity Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity

More information

Final Report ebms Interoperability Test Fourth Quarter 2018 (4Q18)

Final Report ebms Interoperability Test Fourth Quarter 2018 (4Q18) Final Report ebms Interoperability Test Fourth Quarter 2018 (4Q18) Feb 4, 2019 Prepared & Administered By: DRUMMOND GROUP, LLC http://www.drummondgroup.com/ Copyright Drummond Group, LLC 2018 ebms 4Q18

More information

B2B STRATEGIES FOR COMPETITIVE ADVANTAGE. ebxml TRP.

B2B STRATEGIES FOR COMPETITIVE ADVANTAGE. ebxml TRP. B2B STRATEGIES FOR COMPETITIVE ADVANTAGE ebxml TRP Goal The ebxml goal: To accomplish cross-industry XML-based business process integration. Business events are building blocks that must be understood.

More information

Polling Sucks. So what should we do instead?

Polling Sucks. So what should we do instead? Polling Sucks So what should we do instead? Should we use XMPP? What about AMQP? What about plain old HTTP push? Should it be peerto-peer? Intermediated? Disintermediated? 1 Messaging The answer is banal:

More information

novem car interior design gmbh Electronic Data Interchange (EDI) COMMUNICATION SHEET

novem car interior design gmbh Electronic Data Interchange (EDI) COMMUNICATION SHEET novem car interior design gmbh Electronic Data Interchange (EDI) COMMUNICATION SHEET Table of Content 1. Introduction 3 2. General Information Novem Car Interior Design 4 2.1 Address Headquarter 4 2.2

More information

TECHED USER CONFERENCE MAY 3-4, 2016

TECHED USER CONFERENCE MAY 3-4, 2016 TECHED USER CONFERENCE MAY 3-4, 2016 Jithesh Melepurackal AGENDA webmethods Architecture Component View Event Driven Architecture and a Use case High Availability and Use cases High Availability Options

More information

4.1 DESIGN ISSUES OF TRANSPORT LAYER 4.2 DESIGN ISSUES OF SESSION LAYER 4.3 DESIFN ISSUES OF PRESENTATION LAYER 4.5 TCP WINDOW MANAGEMENT

4.1 DESIGN ISSUES OF TRANSPORT LAYER 4.2 DESIGN ISSUES OF SESSION LAYER 4.3 DESIFN ISSUES OF PRESENTATION LAYER 4.5 TCP WINDOW MANAGEMENT UNIT-4 4.1 DESIGN ISSUES OF TRANSPORT LAYER 4.2 DESIGN ISSUES OF SESSION LAYER 4.3 DESIFN ISSUES OF PRESENTATION LAYER 4.4 CONNECTION MANAGEMENT & THREE WAY HANDSHAKE 4.5 TCP WINDOW MANAGEMENT 4.6 REMOTE

More information

Tunneling and Secure Data Transfer via OPC UA Clients and Servers

Tunneling and Secure Data Transfer via OPC UA Clients and Servers Tunneling and Secure Data Transfer via OPC UA Clients and Servers KEPServerEX OPC UA Server Free with KEPServerEX KEPServerEX OPC UA Client: $995.00 Application Connectivity Support: Native Interfaces:

More information

An Overview of Secure and Authenticated Remote Access to Central Sites

An Overview of Secure and Authenticated Remote Access to Central Sites Workshop on Data Access to Micro-Data (WDA) Nuernberg, August 20-21 An Overview of Secure and Authenticated Remote Access to Central Sites Dr Milan Marković Banca Intesa ad Beograd, Serbia milan.markovic@bancaintesabeograd.com

More information

Despite a number of newer and more complex file transfer requirements, we sometimes lose track of the basic needs for managing file transfers.

Despite a number of newer and more complex file transfer requirements, we sometimes lose track of the basic needs for managing file transfers. GoAnywhere Director is a managed file transfer solution that manages basic file transfers and automates data movement, translation, encryption and compression processes. Despite a number of newer and more

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

Final Report AS4 Interoperability Test 2018

Final Report AS4 Interoperability Test 2018 Final Report AS4 Interoperability Test 2018 Nov 18, 2018 Prepared & Administered By: DRUMMOND GROUP http://www.drummondgroup.com/ Copyright Drummond Group 2018 AS4-2018 Final Report page 1 Table of Contents

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

BP115 Best Practices for Secure Messaging with S/MIME Marc Luescher IBM Technical Support Switzerland Daniel Nashed Nash!

BP115 Best Practices for Secure Messaging with S/MIME Marc Luescher IBM Technical Support Switzerland Daniel Nashed Nash! BP115 Best Practices for Secure Messaging with S/MIME Marc Luescher IBM Technical Support Switzerland Daniel Nashed Nash!Com Germany Please come meet and talk with us in the labs. Performance and TCO lab

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

Spoilt for Choice Which Integration Framework to choose? Mule ESB. Integration. Kai Wähner

Spoilt for Choice Which Integration Framework to choose? Mule ESB. Integration.  Kai Wähner Spoilt for Choice Which Integration Framework to choose? Integration vs. Mule ESB vs. Main Tasks Evaluation of Technologies and Products Requirements Engineering Enterprise Architecture Management Business

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Internet 3.0: Ten Problems with Current Internet Architecture and a Proposal for the Next Generation

Internet 3.0: Ten Problems with Current Internet Architecture and a Proposal for the Next Generation Internet 3.0: Ten Problems with Current Internet Architecture and a Proposal for the Next Generation Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Indiana University

More information

How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners

How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners Offloading XML processing to the ACE XML Gateway improves service performance and simplifies

More information

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide SonicWALL 6.2.0.0 Addendum A Supplement to the SonicWALL Internet Security Appliance User's Guide Contents SonicWALL Addendum 6.2.0.0... 3 New Network Features... 3 NAT with L2TP Client... 3 New Tools

More information

J2EE APIs and Emerging Web Services Standards

J2EE APIs and Emerging Web Services Standards J2EE APIs and Emerging Web Services Standards Session #4 Speaker Title Corporation 1 Agenda J2EE APIs for Web Services J2EE JAX-RPC APIs for Web Services JAX-RPC Emerging Web Services Standards Introduction

More information

SAP Pharma Network Onboarding Guide

SAP Pharma Network Onboarding Guide Onboarding Guide - Final Review SAP Pharma Network Document Version: 0.18 2016-08-10 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field

More information

Etlworks Integrator cloud data integration platform

Etlworks Integrator cloud data integration platform CONNECTED EASY COST EFFECTIVE SIMPLE Connect to all your APIs and data sources even if they are behind the firewall, semi-structured or not structured. Build data integration APIs. Select from multiple

More information