Chiffry. Secure smartphone communication Statustext eingeben. Chiffry-Zertifikat: Chiffry-Zertifikat: Statustext eingeben

Size: px
Start display at page:

Download "Chiffry. Secure smartphone communication Statustext eingeben. Chiffry-Zertifikat: Chiffry-Zertifikat: Statustext eingeben"

Transcription

1 Chiffry Secure smartphone communication 09:41 Profil Statustext eingeben Chiffry-Zertifikat: Profil Einladen Chats Gruppe Einstellungen Profil Einladen Chats Gruppe Einstellungen Chiffry-Zertifikat: Statustext eingeben

2 Our team 2 Chiffry GmbH is a composite company of the DIGITTRADE Group DIGITTRADE GmbH Managing Director: Manuela Gimbut Head of R&D: André Gimbut 16 employees including 10 software developers since 2005 development and production of external encrypted hard drives to protect business and personal data hard drive HS256S is developed and certified in accordance to the requirements of the BSI (German Federal Office for Information Security) and it s the only hard disk in Europe which is permitted to storage personal data of authorities 03-03/2013 / Valid till

3 Awards and associations 3 DIGITTRADE hard drives and Chiffry were awarded with several innovation awards and other awards DIGITTRADE is a member of BITKOM, TeleTrust and BISG Chiffry GmbH is a member of TeleTrusT products of DIGITTRADE and Chiffry were awarded with the quality seal IT Security made in Germany INNOVATIONSPREIS-IT SIEGER 2012 SACHSEN-ANHALT INNOVATIONSPREIS-IT SIEGER 2015 TK / VOIP

4 IT Security made in Germany 4 The quality seal IT Security made in Germany confirms that: The corporate headquarters are located in Germany The company is offering confidential IT solutions The products have no hidden access The research and development of the IT security takes place in Germany The company fulfills the requirements of the German data protection law

5 What is Chiffry? 5 Simply secure communicating: Chiffry is the first app with the quality seal IT Security made in Germany which ensures a secure and comprehensive communication for every smartphone user. Thanks to its newest encryption standards users are able to: send secured messages share confidentially pictures, videos, contacts and locations make secure phone calls

6 Most common communication apps Million user Messages 650 Million user Messages + Phone calls 200 Million user Messages + Phone calls 1 Billion. user Social Network

7 Most common communication apps Million user Messages 650 Million user 200 Million user Messages + Phone calls Messages + Phone calls 1 Billion. user Social Network

8 Messenger Comparison 8 Messenger Chiffry WhatsApp Viber Telegram Threema Country of origin Germany USA Japan Russia Schwitzerland Text / voice messaging yes yes yes yes yes Pictures and Videos yes yes yes yes yes Phone calls yes yes yes no no End-to-endencryption yes no no no yes Messages deleted on server after delivery yes no no no yes IT Security made in Germany yes no no no no

9 Chiffry: Security features 9 Client-to-serverencryption (256-Bit AES-GCM) Internet End-to-end encryption (256-Bit AES-GCM) Chiffry Communication Server Information write encode send Counterfeit protection through secure signatures (512-Bit ECDSA) Highly secure key exchange (512-Bit ECDH) Information receive decode see

10 Chiffry: Security features 10 Maximum security by: orientation on the BSI guidelines data encryption 256 bit AES-GCM mode (ensures confidentially and integrity of your communication) highly secure key exchange based on modern elliptic-curve cryptography (512 bit ECDH) counterfeit protection of all messages by secure signatures (512 bit ECDSA) and user identification via Chiffry certificates Comparison: For online banking a RSA encryption with 2048 bit up tp 4096 bit is used. The encryption of 512 bit EC which we are using is similar to a 15,500 bit RSA encryption. The effort to guess this key is higher for 3.4*10 38 times. (Sources: BSI TR , TR-03111)

11 Explanation of the security functions 11 Clearly identification of Chiffry users: by assigning a security certificate during registration by using the telephone number and device information End-to-end encryption: allows secure data transmission channel all messages and phone calls are encrypted on the device of the sender and decrypted on the recipient s device Encryption key: before sending a message or making a call, a new encryption key will be transmitted to the recipient according to the mailbox principle using the elliptic curve cryptography (512 bit ECDH)

12 Explanation of the security functions 12 Secure data transmission: via the Chiffry communication server which is located in Germany in a certified data center messages will be remain encrypted on the server until they are delivered to the recipient and will be deleted after transmission but not later than 21 days Chiffry administrators will not have access to the content of this messages because only the sender and recipient got the encryption key Chiffry server delete the message from the server: immediately after delivery or at the latest after 21 days

13 Explanation of the security functions 13 Chiffry server: Chiffry servers are located at the high performance computing center of envia TEL, which is one the most secure in Germany, this allows a very high standard of security, accessibility and availability and it s certified with the IT security standard ISO & the management standard ISO 9001 Chiffry rack Fire protection system Burglar alarm system Safety fence Video surveillance Access control Double bottom Oxygen-reduction system Electrical power supply Internet connection

14 Versions of Chiffry 14 Functions / Version Basic Premium Business Phone calls Messages Pictures and Videos Contacts Locations Documents - Additional security features - Secure hardware - - Own customer server - - Target group Private Private / Business Business / Authorities Price for free starting at 12 / year after request

15 Versions of Chiffry 15 Basic version: includes all basic features like encrypted transfer of text and voice messages, images, videos, locations, contacts and tap-proof telephone calls suitable for all smartphone users (40 million in GER, 600 million worldwide) allows a rapid growth of the number of users because getting started is easier and the basic functions are free

16 Versions of Chiffry 16 Premium version: significantly includes more security and comfort functions provides extension of the basic functions (larger file sizes, more group members, etc.) suitable for private and business users: -- which pay more attention to security -- which are dependent on additional features available in premium version or -- would like to use them

17 Versions of Chiffry 17 Business version: for government and companies includes specific solutions like: -- communication within a government or company across their own Chiffry server -- optional integration of a own company design -- optional use of special hardened operating systems for smartphones of all or selected users -- optional integration of other hardware components

18 Group chat 18 Privacy justified decentralized group chat: the decentralized Chiffry group chat enables a privacy friendly communication within a group all messages are only stored on the smartphones of the group members, other companies are storing all group chat messages on their servers a) Chiffry group chat b) group chat of other developers information are only stored on the smartphone of the users who are in the group all information are stored on the server

19 Comprehensive solution 19 Comprehensive communications solution on the same smartphone 1. The business- and basic versions can be installed and used on the same Smartphone at the same time 2. With the business version employee of an authority or of a company can communicate within a closed group on the company s own server 3. The basic and premium versions allow a privacy-friendly information exchange with other contacts outside the company, such as Customers, family and friends

20 Comprehensive solution 20 Comprehensive communications solution on the same smartphone Closed (business version) Public (basic version + premium version) friends Chiffry Business Version Chiffry family customers free time communication within a closed network (Company / authority public privacy-compliant communication (outside the closed network)

21 Application field 21 Application field for schools: First level of communication (director to teachers) a) individually b) group chat director director group of teachers teachers

22 Application field 22 Application field for schools: Second level of communication (teacher to students and parents within a class) a) individually b) group chat teacher teacher group of parents group of students students parents

23 Application field 23 application field examples for schools can be used as well for government, companies, associations, organizations, day-care centres etc. example for business: CEO communicates within the board of directors and in groups with different departments CEO group sales group development group marketing

24 Chiffry: Premium features Emoji lock screen Broadcast funktion 24 Group chat with up to 50 participants

25 Get Chiffry 25 Chiffry is available for Android, BlackBerry and ios 09:41 Profil Statustext eingeben Chiffry-Zertifikat: Profil Einladen Chats Gruppe Einstellungen Profil Einladen Chats Gruppe Einstellungen Chiffry-Zertifikat: Statustext eingeben

26 Chiffry outlook 2016 Chiffry on Windows Phone Download from Windows Phone Store

27 Thank you! 27 Thank you for your support. Chiffry GmbH represented by the Managing Director Manuela Gimbut Ernst-Thälmann-Straße Teutschenthal Tel.: +49/345/ Fax: +49/345/ Germany

The messenger for organizations

The messenger for organizations The messenger for organizations Table of contents 2 - Instant messaging an opportunity for companies 3 - Communication in business contexts 4 - The dangers of instant messaging 5 - Threema Work The messenger

More information

Skype and Other Free Alternatives. By Ben Eggler Digital Literacy Specialist

Skype and Other Free Alternatives. By Ben Eggler Digital Literacy Specialist Skype and Other Free Alternatives By Ben Eggler Digital Literacy Specialist What is Skype? Skype is a way of sending phone calls across the internet and because it s the internet calls are FREE Skype uses

More information

TeamViewer Security Statement

TeamViewer Security Statement TeamViewer Security Statement 2017 TeamViewer GmbH, Last update: 05/2017 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical

More information

Introducing COI: Chat over IMAP Modern Messaging over

Introducing COI: Chat over IMAP Modern Messaging over Introducing COI: Chat over IMAP Modern Messaging over Email Robert Virkus 2018-10-29 1 Vision 2 What s the Problem? Messaging silos lock us in Proprietary services operated by a single company, several

More information

Short Public Report. 2. Manufacturer or vendor of the IT product / Provider of the IT-based service:

Short Public Report. 2. Manufacturer or vendor of the IT product / Provider of the IT-based service: Short Public Report 1. Name and version of the IT product or IT-based service: DIGITTRADE High Security HDD HS256S 2. Manufacturer or vendor of the IT product / Provider of the IT-based service: Company

More information

SIMSme Management Cockpit Documentation

SIMSme Management Cockpit Documentation Introduction SIMSme Management Cockpit Documentation Version 2.1 February 2018 Table of Contents 1 INTRODUCTION... 2 2 USERS... 3 3 LICENSES... 5 4 GROUPS... 7 5 CHANNELS... 8 6 DASHBOARD...10 7 APP SETTINGS...12

More information

TopSec Mobile Secure voice encryption for smartphones and laptops

TopSec Mobile Secure voice encryption for smartphones and laptops Secure Communications Product Brochure 02.00 TopSec Mobile Secure voice encryption for smartphones and laptops TopSec Mobile At a glance The TopSec Mobile is a mobile encryption device for secure worldwide

More information

The secure remote support, remote access and online meeting software that the world relies on.

The secure remote support, remote access and online meeting software that the world relies on. The secure remote support, remote access and online meeting software that the world relies on. TeamViewer, the market leader activated by users on 1.3 billion devices worldwide. The Right Solution for

More information

Viber Service Messaging

Viber Service Messaging Viber Service Messaging GMS Viber s official partner since 2015 Global market overview Every company today struggles to reach their customers. With more and more communication channels streaming thousands

More information

CryptoEx: Applications for Encryption and Digital Signature

CryptoEx: Applications for Encryption and Digital Signature CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server

More information

Mobile Payment in a cashless future Trends/Benefits/Solutions

Mobile Payment in a cashless future Trends/Benefits/Solutions Mobile Payment in a cashless future Trends/Benefits/Solutions Carol Wan 20 th September 2018 Company Overview Headquartered in Hong Kong Founded in 1925 HKT Trust was listed on the Hong Kong Stock Exchange

More information

The Secret Of Unconditional Security COMPANY

The Secret Of Unconditional Security COMPANY The Secret Of Unconditional Security COMPANY CONTENTS THE COMPANY... 1 THE TEAM...2 OUR CLIENTELE...2 OUR HISTORY...3 UNCONDITIONAL SECURITY... 4 HOW DOES IT WORK?...4 PRODUCT OVERVIEW... 5 SECURE MESSAGING

More information

Electron Progress EAD

Electron Progress EAD Electron Progress EAD Systems for early warning of the population with end - acoustic devices Sofia 2011 1 Who we are A Bulgarian company established in 1976 as Institute for Defense Electronics, which

More information

Developing an End-to-End Secure Chat Application

Developing an End-to-End Secure Chat Application 108 IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.11, November 2017 Developing an End-to-End Secure Chat Application Noor Sabah, Jamal M. Kadhim and Ban N. Dhannoon Department

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

IoT/M2M Policy Roadmap

IoT/M2M Policy Roadmap ITU COE training program on IOT Technologies & Application for Smart Cities IoT/M2M Policy Roadmap Reena Malhotra Dir (Networks & Technologies), DoT HQ 30th October, 2018 IoT Projections India is fast

More information

CONSUMERS USE MESSAGING

CONSUMERS USE MESSAGING Every night, President Obama reads 10 letters that were sent to him by UNDERSTAND HOW ordinary citizens. This is a Presidential tradition going back to Thomas Jefferson. Recently, the White House announced

More information

Message from Ajit Patel CEO n-gage

Message from Ajit Patel CEO n-gage Why you will love n-gage messenger Message from Ajit Patel CEO n-gage With five friends I started a pharmaceutical business in 1989 from the basement of my pharmacy in London. With the help and investment

More information

Utimaco OX Summit

Utimaco OX Summit Utimaco LIMS @ OX Summit Utimaco TS GmbH October 2017 Dirk Börgerding Key Account Manager Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 1 Utimaco Group Company Facts Founded 1983 HQ in Aachen, Germany

More information

The German IT Security Certification Scheme. Joachim Weber

The German IT Security Certification Scheme. Joachim Weber The German IT Security Certification Scheme Joachim Weber The German IT Security Certification Scheme 1. The role of the BSI 2. The German IT Certificate Scheme 3. Certification procedures in detail 4.

More information

IT security for energy infrastructures

IT security for energy infrastructures IT security for energy infrastructures Next-generation firewalls made in Germany Cybersecurity Because of a lack of security mechanisms at both application level and data link layer level, conventional

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

CardOS Secure Elements for Smart Home Applications

CardOS Secure Elements for Smart Home Applications Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.

More information

Storage and Retrieval - Systematic Indexing in Document Pool

Storage and Retrieval - Systematic Indexing in Document Pool Filing Email with DocuWare Solution Info Storage and Retrieval - Systematic Indexing in Document Pool Email has become a core communication medium in the business world and is well on its way to replacing

More information

Demystifying Industrial Security

Demystifying Industrial Security October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 1 Demystifying Industrial Security CodeMeter Security with integrated Industrial Flash Memory Oliver Winzenried CEO WIBU-SYSTEMS

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

CC withinthe Context of the EU Privacy Seal - EuroPriSe

CC withinthe Context of the EU Privacy Seal - EuroPriSe CC withinthe Context of the EU Privacy Seal - EuroPriSe TÜV Informationstechnik GmbH -TÜViT - Overview 1. Motivation 2. Data Privacy 3. European Privacy Seal EuroPriSe 4. CC and EuroPriSe 5. Conclusion

More information

HID Mobile Access. Simple. Secure. Smart.

HID Mobile Access. Simple. Secure. Smart. HID Mobile Access Simple. Secure. Smart. Physical Access for a Modern Mobile World Physical Access the Smart Way With Mobile Mobile connectivity has changed the way we live, work and play. From smartphones

More information

Utimaco HSM Introduction JIPDEC Seminar June 2017

Utimaco HSM Introduction JIPDEC Seminar June 2017 Utimaco HSM Introduction JIPDEC Seminar June 2017 Joerg Horn Director Business Development Utimaco HSM Business Unit Aachen, Germany 2016 hsm.utimaco.com Page 1 Part 1 Introduction Utimaco History HSM

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation

More information

simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12

simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12 simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12 Contents 1 Introduction... 3 2 Basic principles... 3 3 Connection types... 4 3.1 Mail Gateway Integration

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

Workshop #10 Wifi & WhatsApp

Workshop #10 Wifi & WhatsApp Workshop #10 Wifi & WhatsApp What is Wi-Fi exactly, what s the big deal & how do I connect to it? WhatsApp Messenger explained Terms you will hear today What is WhatsApp? How do I send a message on WhatsApp

More information

TopSec Mobile Tap-proof phone calls

TopSec Mobile Tap-proof phone calls TopSec Mobile Tap-proof phone calls iphone Android smartphone PC Fixed network Satellite Secure Communications Product Brochure 03.00 TopSec Mobile At a glance The TopSec Mobile is a mobile encryption

More information

Executive Summary on. Privacy Awareness Survey on Smartphones. and Smartphone Apps

Executive Summary on. Privacy Awareness Survey on Smartphones. and Smartphone Apps Executive Summary on Privacy Awareness Survey on Smartphones and Smartphone Apps Submitted to Office of the Privacy Commissioner for Personal Data By Centre for the Advancement of Social Sciences Research

More information

Electricity Meters Residential. Industrial & Commercial. Landis+Gyr E750 ZMK 300/400. Maximum flexibility at lowest total cost of ownership

Electricity Meters Residential. Industrial & Commercial. Landis+Gyr E750 ZMK 300/400. Maximum flexibility at lowest total cost of ownership Electricity Meters Residential Industrial & Commercial Landis+Gyr E750 ZMK 300/400 Maximum flexibility at lowest total cost of ownership E750 (ZMK 300/400) - Unique multi-modular metering system provides

More information

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers 1 BRIDGE TO GLOBAL MARKET FOR MVNOs Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers How to compete with big MNOs on equal terms 2 Your

More information

The professional IT management platform

The professional IT management platform The professional IT management platform Total Control of Your IT Infrastructure Whether you are administrating your own IT, or providing services to your clients, with ITbrain you amaze with proactivity.

More information

Castle View Primary School Data Protection Policy

Castle View Primary School Data Protection Policy Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff

More information

End-to-End Encryption for Everybody?

End-to-End  Encryption for Everybody? White paper End-to-End Email Encryption for Everybody? Why private individuals and corporations need different solutions White paper End-to-End Email Encryption for Everybody? Why private individuals and

More information

WhatsApp Encryption Overview. Technical white paper

WhatsApp Encryption Overview. Technical white paper WhatsApp Encryption Overview Technical white paper July 6, 2017 Originally published April 5, 2016 Contents Introduction................................... 3 Terms......................................

More information

Feature Notes LCOS 9.20 RC2.

Feature Notes LCOS 9.20 RC2. Feature Notes LCOS 9.20 RC2 www.lancom-systems.com LCOS 9.20 Best Wi-Fi & maximum security for your network! The new LCOS version 9.20 is a massive package that offers secure networking and top-quality

More information

White paper. Combatant command (COCOM) next-generation security architecture

White paper. Combatant command (COCOM) next-generation security architecture Combatant command () next-generation security architecture using NSA Suite B Table of Contents Combatant command () next-generation security architecture using NSA Suite B NSA Commercial Solution for Classified

More information

* 1. By typing my name below I affirm I am the Kiwanis International Foundation district chair for my district.

* 1. By typing my name below I affirm I am the Kiwanis International Foundation district chair for my district. Pre-qualifiying question * 1. By typing my name below I affirm I am the Kiwanis International Foundation district chair for my district. Pre-qualifying question * 2. I certify that I read the program guidelines

More information

VoIP/SIP: Economy and Mobility

VoIP/SIP: Economy and Mobility Nowadays VoIP-services become more and more popular all over the world. VoIP stands for Voice Over Internet Protocol, a communications protocol that allows for telephonic communication via the Internet.

More information

Intelligent Solutions for the most Rigorous IT Security Requirements

Intelligent Solutions for the most Rigorous IT Security Requirements Intelligent Solutions for the most Rigorous IT Security Requirements 1 2 1 2 3 Information Security from the Architects of Modern Encryption Systems SINA (Secure Inter-Network Architecture) enables the

More information

Examining the Reasons of Choosing Mobile Instant Messaging Applications

Examining the Reasons of Choosing Mobile Instant Messaging Applications Examining the Reasons of Choosing Mobile Instant Messaging Applications Cumhur Aydinli 1 1 School of Information, Technology University of Cincinnati, Cincinnati, USA Email: cumhur_a@hotmail.com Received:

More information

WhatsApp Chat Modification

WhatsApp Chat Modification e-issn 2455 1392 Volume 2 Issue 7, July 2016 pp. 38 42 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com WhatsApp Chat Modification SUJAY RAMDAS AGUNDE 1, VIVEK TUKARAM WALNEKAR 2 1,2 LBHSSTICA

More information

TopSec Product Family Voice encryption at the highest security level

TopSec Product Family Voice encryption at the highest security level Secure Communications Product Brochure 01.01 TopSec Product Family Voice encryption at the highest security level TopSec Product Family At a glance The TopSec product family provides end-to-end voice encryption

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

USER PERCEPTION OF DELETING INSTANT MESSAGES EuroUSEC 18, London, UK, 23 April 2018

USER PERCEPTION OF DELETING INSTANT MESSAGES EuroUSEC 18, London, UK, 23 April 2018 OVERVIEW Instant Messaging New WhatsApp feature introduced October 2017 Delete messages for everyone Do users delete messages? How do other messengers do this? Do users know what happens? What do users

More information

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner Management and Information Technology Solutions Decker Consulting GmbH Training Catalog Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz Revision 9.1 05.12.2018 public Authorized Training Partner

More information

HIPAA / HITECH Overview of Capabilities and Protected Health Information

HIPAA / HITECH Overview of Capabilities and Protected Health Information HIPAA / HITECH Overview of Capabilities and Protected Health Information August 2017 Rev 1.8.9 2017 DragonFly Athletics, LLC 2017, DragonFly Athletics, LLC. or its affiliates. All rights reserved. Notices

More information

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you

More information

FAQ about the General Data Protection Regulation (GDPR)

FAQ about the General Data Protection Regulation (GDPR) FAQ about the General Data Protection Regulation (GDPR) 1. When does the GDPR come into force? The GDPR was promulgated 25 May 2016 and comes into effect 25 May 2018. 2. Is there a transition period? We

More information

NEXT KEYLESS GENERATION. NOW. The finest in keyless security

NEXT KEYLESS GENERATION. NOW. The finest in keyless security 01 NEXT KEYLESS GENERATION. NOW. AX.Advanced Xchange New application 2018 The finest in keyless security 02 THE NEXT KEYLESS GENERATION. NOW. Our digital locking solutions have been replacing mechanical

More information

Contents. Privacy Settings Contents...2. VoIP Calls AstraChat Mobile Overview...3. What makes AstraChat different...4. Add Friends...

Contents. Privacy Settings Contents...2. VoIP Calls AstraChat Mobile Overview...3. What makes AstraChat different...4. Add Friends... Contents AstraChat Quick Guide Android Contents...2 AstraChat Mobile Overview......3 What makes AstraChat different......4 Reliable and Secure....5 Simple UI..........6 Fast Picture Sharing....7 Privacy

More information

Cryptographic Mechanisms: Recommendations and Key Lengths

Cryptographic Mechanisms: Recommendations and Key Lengths Technical Guideline TR-02102-4 Cryptographic Mechanisms: Recommendations and Key Lengths Part 4 Use of Secure Shell (SSH) (Version 2018-01) Federal Office for Information Security P.O.B. 20 03 63 D-53133

More information

Sustained success through reliability and efficiency

Sustained success through reliability and efficiency Sustained success through reliability and efficiency Klaus Helmrich CEO Siemens Industry, Drive Technologies Division Press Conference SPS/IPC/Drives, November 23, 2010 In tough times Drive Technologies

More information

Data Compromise Notice Procedure Summary and Guide

Data Compromise Notice Procedure Summary and Guide Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or

More information

eidas compliant Trust Services with Utimaco HSMs

eidas compliant Trust Services with Utimaco HSMs eidas compliant Trust Services with Utimaco HSMs March 15, 2018 Dieter Bong Product Manager Utimaco HSM Business Unit Aachen, Germany 2018 eidas-compliant Trust Services with Utimaco HSMs Page 1 eidas

More information

COMMUNICATION SERVER INTEGRAL 55 LX

COMMUNICATION SERVER INTEGRAL 55 LX IP Telephony Contact Centers Mobility Services OVERVIEW COMMUNICATION SERVER INTEGRAL 55 LX As a leading supplier of communication systems and services, Avaya designs, builds and manages communication

More information

Radio Research and Development Institute (NIIR) Moscow, Russian Federation

Radio Research and Development Institute (NIIR) Moscow, Russian Federation Radio Research and Development Institute (NIIR) Moscow, Russian Federation Proposals to ITU CWG-Internet open consultations on "Public Policy considerations for OTTs" September, 2017 In accordance with

More information

Privacy and Security in Smart Grids

Privacy and Security in Smart Grids Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012

More information

Kodiak Broadband PTT for Public Safety

Kodiak Broadband PTT for Public Safety Kodiak Broadband PTT for Public Safety An Application Brief MOTOROLA SOLUTIONS and KODIAK are trademarks or registered trademarks of Motorola Trademark Holdings, LLC. This document is not an offer, commitment,

More information

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD Service description & additional terms and conditions VERSIEGELTE CLOUD Last revised: March 19, 2018 Page 1 of 10 PUBLICATION DETAILS Published by Telekom Deutschland GmbH Landgrabenweg 151 53227 Bonn

More information

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER 1 The Background to the WIZZIT Authenticator THE EVOLUTION OF AUTHENTICATION At its most basic level, bank grade authentication is built around a simple concept

More information

Trusted National Identity Schemes. Coralie MESNARD

Trusted National Identity Schemes. Coralie MESNARD Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Electronic ID in Germany. Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event

Electronic ID in Germany. Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event Electronic ID in Germany Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event Table of Contents Authentication in Germany Infrastructure (Client, Hardware, Participants) Authentication

More information

Encrypted Phone Configuration File Setup

Encrypted Phone Configuration File Setup This chapter provides information about encrypted phone configuration files setup. After you configure security-related settings, the phone configuration file contains sensitive information, such as digest

More information

Broadcast Notification solutions

Broadcast Notification solutions Broadcast Notification solutions Fast, accurate group communication to enhance your security response security.gallagher.com Broadcast Notification solutions Mobile Network Provider Staff in building 2

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré

More information

The Application of Elliptic Curves Cryptography in Embedded Systems

The Application of Elliptic Curves Cryptography in Embedded Systems The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography

More information

Mobile Commerce via Smartphone & Co

Mobile Commerce via Smartphone & Co November 2012 Mobile Commerce via Smartphone & Co Analysis and outlook of the future market from the user s point of view Summary Franz Büllingen, Peter Stamm WIK Wissenschaftliches Institut für Infrastruktur

More information

Introduction of SureM, Inc.

Introduction of SureM, Inc. 19 Years Messaging Specialized Company Introduction of SureM, Inc. SureM, Inc. Contents 1. Company Introduction 2. Major History and Awards List 3. Financial Statement 4. Organization 5. Business Introduction

More information

Beyond Payment: Secure NFC applications and their relation to RFID

Beyond Payment: Secure NFC applications and their relation to RFID Powering the trusted identities of the world s people, places & things Beyond Payment: Secure NFC applications and their relation to RFID Richard Aufreiter, Director Product Management - IDT June 27, 2017

More information

Chapter 8 Information Technology

Chapter 8 Information Technology CRIM 2130 Introduction to Critical Infrastructure Protection Spring 2016 Chapter 8 Information Technology School of Criminology and Justice Studies University of Massachusetts Lowell Enterprise systems

More information

Team Advanced VC Services. Cisco WebEx Services

Team Advanced VC Services. Cisco WebEx Services Team Advanced VC Services Cisco WebEx Services People Want to Collaborate Their Way More Technology Choices Are Available Than Ever Before They want mobility. They want applications that make them more

More information

WHITEPAPER Rewrite Services. Power365 Integration Pro

WHITEPAPER  Rewrite Services. Power365 Integration Pro WHITEPAPER Email Rewrite Services Power365 Integration Pro Table of Contents The Challenge... 3 The Binary Tree Solution... 3 What to Expect... 3 Day 1 Email Rewrite Services... 3 Day 2 Email Rewrite Services...

More information

Solution. Imagine... a New World of Authentication.

Solution. Imagine... a New World of Authentication. A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure

More information

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability

More information

The friendly All-In-One solution for. Remote Maintenance, Support, Remote Access and Home Office. Simple, fast and secure over the Internet

The friendly All-In-One solution for. Remote Maintenance, Support, Remote Access and Home Office. Simple, fast and secure over the Internet The friendly All-In-One solution for Remote Maintenance, Support, Remote Access and Home Office Simple, fast and secure over the Internet 1 Simple and Fast over the Internet Control any computer remotely

More information

Biometric Technology

Biometric Technology Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to

More information

Secure Messaging Buyer s Guide

Secure Messaging Buyer s Guide Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com December 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered

More information

HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone

HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone News Release 7 February 2017 HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone HSBC today announced PayMe, a simple and secure social payment app that allows HSBC

More information

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017 Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware

More information

Setting Up KidiConnect : Unlock KidiConnect

Setting Up KidiConnect : Unlock KidiConnect Setting Up KidiConnect : Unlock KidiConnect With KidiConnect, kids can use their KidiBuzz to send messages to a parent-approved list of contacts. But you have to unlock KidiConnect on your child's device

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Contents. Enterprise Solution 04. Why Samsung? 05 WLAN 06. Voice Solution 08. Mobile Unified Communications 09. Enterprise Security 10

Contents. Enterprise Solution 04. Why Samsung? 05 WLAN 06. Voice Solution 08. Mobile Unified Communications 09. Enterprise Security 10 Contents Enterprise Solution 04 Why Samsung? 05 WLAN 06 Voice Solution 08 Mobile Unified Communications 09 Enterprise Security 10 3 Enterprise Solution Why Samsung? Mobile devices are increasingly at the

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

Full Name of Centre:... Date of establishment:... Address: Telephone No:... Fax No: (Please include area codes)

Full Name of Centre:... Date of establishment:... Address: Telephone No:... Fax No: (Please include area codes) APPLICATION for AIES CENTRE REGISTRATION 2017/18 2512 Chambers Road, Tustin CA 92780, USA Tel: 949-501-3701 Email: info@aiesus.org Website: www.aiesus.org Please read the instructions and terms of contract

More information

Verification of Identity made simple.

Verification of Identity made simple. Verification of Identity made simple. Simple. Secure. Fast. Available on Apple IOS & Android. ios & Android app MSA now provides an easy-to-use mobile application that allows you to verify your customer

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

Security Using Digital Signatures & Encryption

Security Using Digital Signatures & Encryption Email Security Using Digital Signatures & Encryption CONTENTS. Introduction The Need for Email Security Digital Signatures & Encryption 101 Digital Signatures & Encryption in Action Selecting the Right

More information

Reviewer Reviewer Guid Guide e Last Las t update update Nov Nov

Reviewer Reviewer Guid Guide e Last Las t update update Nov Nov Reviewer Guide Last Last update update Nov 2018 Nov 2018 Contents Contents...2 AstraChat Mobile Overview......3 What makes AstraChat different......4 Reliable and Secure....5 Simple UI..........6 Picture

More information

La certificazione ISO27001

La certificazione ISO27001 13 August 2010 La certificazione ISO27001 Driver di crescita e caso di successo di una PMI italiana LUIGI BRUSAMOLINO CISM, CRISC Managing Director Southern EMEA - BSI NICOLA MASSERONI Responsabile GRC

More information

Data Security Double Package Sexy & Fresh: The new Steganos Safe 11 and Steganos Privacy Suite 11 are out!

Data Security Double Package Sexy & Fresh: The new Steganos Safe 11 and Steganos Privacy Suite 11 are out! PRESS RELEASE APPROVED FOR RELEASE Data Security Double Package Sexy & Fresh: The new Steganos Safe 11 and Steganos Privacy Suite 11 are out! Steganos, the Frankfurt based expert on encryption and anonymization

More information