Utimaco OX Summit
|
|
- Horatio Mathews
- 5 years ago
- Views:
Transcription
1 Utimaco OX Summit Utimaco TS GmbH October 2017 Dirk Börgerding Key Account Manager Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 1
2 Utimaco Group Company Facts Founded 1983 HQ in Aachen, Germany 170 employees 40 Mio revenue (FY 15/16) Private company MBO (Oct 2013) with top-tier investors EQT Mid Market PINOVA Capital BIP Investment Partners Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 2
3 The Data Security Company Providing high-end security solutions for more than 30 years Utimaco GmbH Utimaco TS GmbH Lawful Interception Data Retention Utimaco IS GmbH Strong Encryption Digital Signatures Hardware Security Security cleared staff Certified products Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 3
4 Utimaco TS Competence in Regulatory Compliance Solutions Utimaco has been providing Lawful Interception solutions since 1994 Worldwide operations: more than 300 installations in 90 countries Lawful Interception and Data Retention Systems scalable from 10 thousands to millions of subscribers Strong partnerships with leading telecom vendors Compliant to international LI standards of ETSI, 3GPP, ANSI /ATIS, CableLabs and active member of ETSI TC LI Conform to numerous national telecommunication laws Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 4
5 23 years LIMS Track Record 2009 LTE Interception 2008 Umbrella LIMS 2007 WIMAX, WLAN Interception 2006 IMS & NGN Interception G High Speed DF 2015 Content filtering 2014 LIMS 64 bit 2013 VoLTE, RCS interception 2012 X86 platform migration 2011 IPv Deep Packet Inspection Monitoring of Cable networks (Packetcable) 1st managed LI Solution VoIP & Push-to-Talk Interception Interception ETSI Compliance Fixed Voice & Internet Access Interception 1st OEM Version of Utimaco LIMS 1st Mobile Interception Systems in Germany Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 5
6 Worldwide Deployments Eastern Europe Western Europe North America 9% South Amercia & Caribbean 7% 26% Africa 10% 7% Middle East 17% Asia Pacific 25% Regional split of systems deployed by Utimaco Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 6
7 Partners Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 7
8 Utimaco TS Solutions and Products Data Retention (DR) offline analysis call detail records subscriber data af all subscribers Lawful Interception (LI) realtime monitoring of call detail records call content of targeted subscribers Past Future Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 8
9 Lawful Interception Definition Lawful Interception (LI) refers to the legally approved surveillance of public telecommunication services Important tool for law enforcement agencies (LEAs) around the world for investigating and prosecuting crime and terrorism National laws commonly oblige telecom operators to support LI for public telecom services Telecom services under surveillance are defined by national laws, e.g. Telephone calls Fax Voic s SMS, MMS Internet access s VoIP eventually also other Internet services like Instant Messaging, file sharing, etc. Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 9
10 Lawful Interception Regulatory Framework National Legislation International Technical Standards Constitution ETSI Telecommunications Laws Lawful Interception ANSI, ATIS Code of Criminal Procedure Telecommunications CableLabs Customs and Police Laws 3GPP National Regulations Organization Technology Data protection Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 10
11 Lawful Interception General Requirements Hard requirements Compliance with national laws Compliance with national technical regulations Compliance with international technical standards Transparent for users No negative impact on telecom services Highest security demands (privacy, integrity, unimpeachable results, protection against misuse, transparent to persons under surveillance) High reliability of service (24x7) Soft requirements Cost-efficient solution (CAPEX, OPEX) Future-proof system Technical and legal expertise Quality Timely delivery Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 11
12 Lawful Interception Utimaco LIMS Overview INI: Internal Network Interface IRI: Interception Related Information CC: Content of Communication x1,x2,x3: Internal Network Interfaces for LI Provisioning, IRI and CC exchange H1,H2,H3: Standard handover interface to the Law Enforcement Agency for LI Provisioning, IRI and CC exchange Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 12
13 Requirements on Interception What needs to be captured Login on system by the user (authentication) Receipt and storing of s in a mailbox by the system Transmissions of s by the user (send) Storing of templates or drafts by the user (save) Configuration of the mailbox concerning the communication (e.g. Forwarding, List, Reporting Services). Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 13
14 Typical project implementation Steps Project implementation time Already known vendor? New vendor? Interface specification IOT Pre-config Shipment Implementation Testing Acceptance Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 14
15 Lawful Interception OX project Active intercept Voice or data is intercepted by active network elements (e.g. switches, routers, servers) Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 15
16 Lawful Interception Interception Methods Passive intercept Voice or data is intercepted by a passive network probe which is connected to the service provider s network via taps. Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 16
17 Thank you for your attention! Utimaco TS GmbH Germanusstraße Aachen, Germany Phone Web info@utimaco.com Copyright 2016 Utimaco TS GmbH All trademarks are trademarks of the particular copyright holder. Specifications are subject to change without notice. Utimaco TS GmbH Aachen, Germany OX Summit 2017 Page 17
Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1
Utimaco IS GmBH Teo Poh Soon Director CryptoServer Products Aachen, Germany June 2014 Page 1 Utimaco Overview 100 % ownership by Utimaco GmbH Corporate Headquarter in Aachen, Germany Offices in USA, UK,
More informationUtimaco LIMS. Lawful Interception of Telecommunication Services
Lawful Interception of Telecommunication Services 2 LIMS worldwide Lawful Interception Lawful Interception (LI) is the legally approved surveillance of telecommunication services, and has become an important
More informationDATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION
DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION 2 Data Retention Data Retention has become a buzzword in intense debates between data protectors and law makers over the last few years. It refers
More informationUtimaco LIMS TM. Techpaper. Lawful Interception with Umbrella Systems
Techpaper Lawful Interception with Umbrella Systems Table of contents 1 The Challenge... 3 2 Umbrella Systems... 4 3 Abbreviations... 7 25. Aug 2010 Copyright Utimaco Safeware AG 2 of 8 1 The Challenge
More informationAlcatel-Lucent 1357 ULIS
Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement
More informationMonitoring obligations. DataBridge : Fulfil CSP requirements for communcations monitoring
Monitoring obligations DataBridge : Fulfil CSP requirements for communcations monitoring DataBridge Flexible communications monitoring 2 Meeting your obligations flexibly As terrorists and organised criminals
More informationETSI LI Standards Overview
http://eustandards.in/ ETSI LI Standards Overview Alex Leadbeater - Chairman 3GPP SA3LI What is LI/DR/DD Lawful Interception (LI) is the real-time capture of a Target s use of communications (including
More informationMONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.
MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. DataBridge Flexible communications monitoring Meeting your obligations flexibly As terrorists and organized criminals take
More informationTrends in Lawful Interception and Its Applications in National Security
Vol.1 No. 2, 95-99 (2012) Received Aug.2012; Accepted Nov.2012 Trends in Lawful Interception and Its Applications in National Security Abstract Namita Saxena and Mansi Singh Electronics and Communication
More informationPartner Program Overview
Partner Program Overview Utimaco TS GmbH November 2014 Utimaco TS GmbH Aachen, Germany Nov 2014 Page 1 Utimaco s goal is. to implement a successful and trustworthy partnership with our partners leading
More informationIntegrating Communications Compliance into the Next Generation 4G LTE Network
SS8 : WHITEPAPER : INTEGRATING CC INTO THE NEXT GENERATION 4G LTE NETWORK Integrating Communications Compliance into the Next Generation 4G LTE Network All telecommunication providers that currently or
More informationEAGLE EYE MC. 1. Introduction
1. Introduction Worldwide explosion of communication technologies creates a significant challenge for law enforcement agencies, national security organizations and enterprise security responsible for battling
More informationGerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved
ETSITC TC LI STANDARDS OVERVIEW Gerald McQuaid, Chairman ETSI TC LI ETSI 2014. All rights reserved 9 th ETSI Security Workshop, 15 16 January 2014 Lawful Interception (LI) & Data Retention (DR) Delivery
More informationETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4
ETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4 Plugtests 2007 Test Cases page 1 of 53 Table of contents 1 Introduction...3 1.1 Scope of the tests... 4 1.2 Test Environment and Setup...
More informationLawful Intercept Overview
CHAPTER 1 This chapter provides information about Lawful Intercept and contains the following sections: Information About Lawful Intercept, page 1-1 Network Components Used for Lawful Intercept, page 1-3
More informationWireless Network Infrastructure Market (2G, 3G, LTE, WiMAX, WiFi):
Wireless Network Infrastructure Market (2G, 3G, LTE, WiMAX, WiFi): 2012 2017 November 2012 Overview: The wireless network infrastructure market will grow by nearly 8% between 2012 and 2013, representing
More informationWHITE PAPER. The Growing Impact of Social Networking Trends on Lawful Interception
WHITE PAPER The Growing Impact of Social Networking Trends on Lawful Interception www.ixiacom.com 915-6913-01 Rev. A, July 2014 2 Table of Contents How Bin Laden Evaded Lawful Interception... 4 A Fast-Changing
More informationTraffic Management Solution: Allot NetEnforcer and Juniper Networks Session and Resource Control (SRC) Platform
Solution Brief Traffic Management Solution: Allot NetEnforcer and Juniper Networks Session and Resource Control (SRC) Platform 2007 Allot Communications Ltd. Allot Communications, NetEnforcer and the Allot
More informationSolution Highlights. Supports all major signaling protocols. Widely deployed multi-national SS7 solution. NEBS3 certified standard server platform
TELES Class 4 NGN Solution Highlights Standard based, high performance & scalable NGN solution Supports all major signaling protocols Widely deployed multi-national SS7 solution NEBS3 certified standard
More informationISO in the world today
ISO 27001 in the world today 1 Agenda ISO 27001 worldwide Why ISO 27001 Framework to implement ISO 27001 2 ISO 27001 worldwide Source: ISO Annual Survey 3 ISO 27001 worldwide Number of Certificates Year
More informationOdin. SMB Cloud InsightsTM GLOBAL
Odin 2015 SMB Cloud InsightsTM GLOBAL DEFINITIONS SMBs Defined We define SMBs also known as small and medium enterprises (SMEs) as companies with one to 250 employees. SMB categories include micro (1-9
More informationElectronic evidence: Worth it!s weight in gold?
Electronic evidence: Worth it!s weight in gold? endace power to see all europe P +44 1223 370 176 E eu@endace.com americas P +1 703 964 3740 E usa@endace.com asia pacific P +64 9 262 7260 E asia@endace.com
More informationSubscriber Data Correlation
Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service
More informationOver the Top (OTT) Provision of Telecoms Services in Nigeria
Over the Top (OTT) Provision of Telecoms Services in Nigeria Presentation Delivered at the Bicsi Conference & Exhibition 2017 By Engr. Gbenga Adebayo ALTON Chairman August 17, 2017 Introduction The Association
More informationIP multimedia in 3G. Structure. Author: MartinHarris Orange. Understanding IP multimedia in 3G. Developments in 3GPP. IP multimedia services
IP multimedia in 3G Author: MartinHarris Orange slide 1 Structure Understanding IP multimedia in 3G Developments in 3GPP IP multimedia services IMS challenges and open issues IP multimedia roadmap slide
More informationEMERG IOT / M2M regulation and autonomous driving
EMERG IOT / M2M regulation and autonomous driving Workshop Massimo Morganti Ericsson BTEB IoT 27-09-2018 Ericsson Connected Vehicle Cloud Commercial Presentation 1/221 09-FGD 101 432 Uen, Rev C 2018-05-18
More informationNetApp Private Storage for Cloud: Solving the issues of cloud data privacy and data sovereignty
SOLVING BUSINESS ISSUES NetApp Private Storage for Cloud: Solving the issues of cloud data privacy and data sovereignty How the combination of NetApp and Equinix ensures your data remains safe, secure
More informationThe Voice over Mobile Broadband (VoMBB) Market:
Brochure More information from http://www.researchandmarkets.com/reports/2155773/ The Voice over Mobile Broadband (VoMBB) Market: 2012 - Description: A relatively new term, Voice over Mobile Broadband
More information2nd ETSI Security Workshop Future Security. Lawful Interception standardisation, Retained Data
2nd ETSI Security Workshop Future Security Activities in ETSI/TC LI Lawful Interception standardisation, Retained Data Peter van der Arend Royal KPN Netherlands; Chairman ETSI/TC LI 1 Why Lawful Interception
More informationStreamlining Lawful Intercept for WiMAX Networks
White Paper Streamlining Lawful Intercept for WiMAX Networks f f Meet stringent lawful intercept requirements for monitoring WiMAX IP-based voice, data and multimedia traffic f f Comply with lawful intercept
More informationUtimaco LIMS TM. Lawful Interception in the Digital Age: Vital Elements of an Effective Solution
TM Lawful Interception in the Digital Age: Vital Elements of an Effective Solution TM Table of contents 1 Challenges to Lawful Interception... 3 2 Lawful Interception in the 21st Century... 4 2.1 An Increasing
More informationBlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet
Datasheet BlackBerry WorkLife Persona The Challenge An increasing number of employees today are using their own devices for work purposes, blurring the line between personal and business usage. This demand
More informationIMS Adoption Fueled by the Open IMS Core Project and MySQL
IMS Adoption Fueled by the Open IMS Core Project and MySQL Overview The project was launched in 2006 to promote IMS (IP Multimedia Subsystem) technology adoption in next-generation telecommunications networks,
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationETSI TS V ( ) Technical Specification
TS 133 106 V10.0.0 (2011-05) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Lawful interception requirements (3GPP TS 33.106 version 10.0.0 Release 10) 1 TS 133 106 V10.0.0
More informationStarflow Token Sale Privacy Policy
Starflow Token Sale Privacy Policy Last Updated: 23 March 2018 Please read this Privacy Policy carefully. By registering your interest to participate in the sale of STAR tokens (the Token Sale ) through
More informationICT Market and Regulatory Trends
The views expressed in this presentation are those of the author and do not necessarily reflect the opinions of the ITU or its Membership. ICT Market and Regulatory Trends Planning Meeting for the HIPCAR
More informationBuilding a Global VoIP Network. Michael Burrell, Senior Manager Orange Business Services. August 22, 2006
Building a Global VoIP Network Michael Burrell, Senior Manager Orange Business Services August 22, 2006 Service Provider relationships > what service provider relationships and types of carrier services
More informationLTE in Industry Verticals: Market Opportunities and Forecasts
LTE in Industry Verticals: Market Opportunities and Forecasts 2013 2018 January 2013 Overview: There is a rapidly growing demand for broadband-enabled data applications within certain vertical market segments
More informationMobile Banking in Europe and potentials for MNOs
Mobile Banking in Europe and potentials for MNOs CME Sharing Initiative Authors: Sylvain Chevallier, Olivier Darondel and Christophe Gandillot 29.06.2017 Mobile Payment/Transfer are the most common services,
More informationAcceptable Use Policy
Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications
More informationMOTOROLA. Beyond Mobile Broadband. Anil Barot Director of Strategy & Portfolio Mgmt
MOTOROLA Beyond Mobile Broadband Anil Barot Director of Strategy & Portfolio Mgmt CDMA Meeting Subscriber Data Needs Today Music Downloads Push-to-Talk Enterprises Video Downloads/ Podcasts Video Video
More informationTaking Back Control of Your Network With SD-LAN
IHS TECHNOLOGY SEPTEMBER 2016 Taking Back Control of Your Network With SD-LAN Matthias Machowinski, Senior Research Director, Enterprise Networks and Video TABLE OF CONTENTS Access Networks Are Under Pressure...
More informationEUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA
Ref. Ares(2011)514527-12/05/2011 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Electronic Communications Policy Implementation of Regulatory Framework (I) Brussels, 6th May 2011
More informationIntel Network Builders Solution Brief. Etisalat* and Intel Virtualizing the Internet. Flexibility
Intel Network Builders Solution Brief Etisalat* and Intel Virtualizing the Internet Gateway Gi-LAN for Service Flexibility Introduction Etisalat Group* is one of the world s leading telecom groups in emerging
More informationINCREASING TRUST IN CALLING LINE IDENTIFICATION AND ORIGINATING IDENTIFICATION
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) INCREASING TRUST IN CALLING LINE IDENTIFICATION AND ORIGINATING IDENTIFICATION
More informationSensor networks. Ericsson
Sensor networks IoT @ Ericsson NETWORKS Media IT Industries Page 2 Ericsson at a glance Organization & employees CEO Börje Ekholm Technology & Emerging Business Finance & Common Functions Marketing & Communications
More informationBalancing energy and environmental demands
Balancing energy and environmental demands Solutions that optimise the safety and performance of conventional power plants and power station systems. TÜV SÜD South Asia Meet global energy demands As demand
More informationViber Service Messaging
Viber Service Messaging GMS Viber s official partner since 2015 Global market overview Every company today struggles to reach their customers. With more and more communication channels streaming thousands
More informationVOIP in the TAL group. June 15 th, 2005 Buenos Aires, Argentina
VOIP in the TAL group June 15 th, 2005 Buenos Aires, Argentina IP Telephony: IP Telephony shall be defined as the SERVICE and PROTOCOL suite associated with the transport of voice communication over the
More informationCompliance. Peter Oosthuizen Partner Service Team Leader
Compliance Peter Oosthuizen Partner Service Team Leader Contents Overview of Compliance. Telecommunications Regulations. Data Protection Act. Payment Card Industry (PCI) Compliance. Financial Conduct Authority
More informationAllot Virtual TDF/PCEF Drives Real Data Monetization. Solution Brief
Allot Virtual TDF/PCEF Drives Real Data Monetization Solution Brief Contents 1 Virtualization to Save Costs; Generate Revenue...1 2 Allot Virtual TDF/PCEF...2 2.1 Compliant with ETSI...2 2.2 Enabling Smooth
More informationCompeting with OTT Services: RCS e without IMS. November 15, 2011
Competing with OTT Services: RCS e without IMS November 15, 2011 An Introduction to Interop All Gen Short Message Service Center (SMSC) 4 Series Message Personalization & Control (MPAC) Multimedia Message
More informationAccelerate Your Cloud Journey
Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension
More informationWiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic
0 0 Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic WMF Approved 0-0- WMF-T-0-v0 0 Proprietary Copyright 0. All Rights Reserved. WiMAX FORUM PROPRIETARY WMF-T-0-v0 0 0 0 0 0 Copyright
More informationSyed Ismail Shah, PhD Chairman, PTA,
Preparing for the Changing Rules of the Game Syed Ismail Shah, PhD Chairman, PTA, e-mail: ismail@pta.gov.pk Sequence Presentation Outline 2 Paradigm Shift in Telecom Sector-OTT Services Difference Between
More informationTelecommunication Regulatory Reform and the WTO Process
Telecommunication Regulatory Reform and the WTO Process Dr Tim Kelly, ITU Session 1: Course on Telecom Policy, Regulation and Management, University of Witwatersrand, 6-7 May, 1999 * The views expressed
More informationNG112 Transition Models - Implementation Activities
EENA NG112 Technical Committee Document NG112 Transition Models Implementation Activities Title: NG112 Transition Models - Implementation Activities Version: 2.0 Revision Date: 15/07/2015 Status of the
More informationKeysight E6966B IMS-SIP Network Emulator. Technical Overview
Keysight E6966B IMS-SIP Network Emulator Technical Overview 02 Keysight E6966B IMS-SIP Network Emulator - Technical Overview Accelerate Performance Testing of Cellular User Equipment in an All-IP IMS-SIP
More information14th Edition. Global Macrocell Radio Transceiver (TRx) Unit Market Analysis and Forecast, April 2018
Market Analysis Earl J. Lum +1-650-430-2221 elum@ejlwireless.com 14th Edition Global Macrocell Radio Transceiver (TRx) Unit Market Analysis and Forecast, 2018-2022 April 2018 Entire contents. Reproduction
More informationNext Level Remote Access
Next Level Remote Access Next Generation Network Access Technology www.ncp-e.com Next Level Remote Access VPN Since the company was founded in 1986, NCP has been committed to making deploying, using and
More informationM2M device connections and revenue: worldwide forecast
Research Forecast Report M2M device connections and revenue: worldwide forecast 2013 2023 August 2013 Morgan Mullooly and Steve Hilton 2 Contents Slide no. 5. About this report 6. Executive summary 7.
More informationETSI TS V1.1.1 ( )
Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Requirements of the NGN network to support Emergency Communication from Citizen
More informationWIRELESS NETWORK DATA TRAFFIC: WORLDWIDE TRENDS AND FORECASTS
RESEARCH FORECAST REPORT WIRELESS NETWORK DATA TRAFFIC: WORLDWIDE TRENDS AND FORECASTS 2016 2021 STEPHEN WILSON Analysys Mason Limited 2017 analysysmason.com About this report This report presents 5-year
More informationBalancing energy and environmental demands
Balancing energy and environmental demands Solutions that optimise the safety and performance of conventional power plants and power station systems. TÜV SÜD South Asia Meet global energy demands As demand
More informationThe Future Outlook and Business Advantage of 3G Broadband and All-IP The Vision of Seamless Mobility
The Future Outlook and Business Advantage of 3G Broadband and All-IP The Vision of Seamless Mobility José Geraldo A. de Almeida New Business Development Networks and Enterprise Business Motorola, Inc.
More informationYour Last Mile Enabler
Your Last Mile Enabler Africa and Middle East Secure Links to Remote Places Secure and Reliable Connectivity Solutions Serving clients in Africa, the Middle East and the United States. C O R P O R A T
More informationLPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS
RESEARCH FORECAST REPORT LPWA NETWORKS FOR IoT: WORLDWIDE TRENDS AND FORECASTS 2015 2025 MICHELE MACKENZIE Analysys Mason Limited 2016 analysysmason.com About this report Low-power, wide-area (LPWA) is
More informationC O M P E T E A T Y O U R P E A K
COMPETE AT YOUR PEAK WHY Businesses with a Silver Peak SD-WAN solution lower costs, increase business agility and accelerate the value of using the cloud and broadband links to connect users WHAT AT LAST,
More informationCisco Lawful Intercept Security Best Practices
White Paper Cisco Lawful Intercept Security Best Practices Cisco Systems, Inc. 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10 Contents Target Audience...
More informationSimplify Hybrid Cloud
Simplify Hybrid Cloud Innovate With Cloud Agility and Economics BEST PRACTICES GUIDE Organizations Are Looking To Embrace Hybrid IT for Improved Business Agility and Lower TCO In this digital age, leaders
More informationBuilding a profitable wireless network to deliver an exceptional customer experience
MENA Summit 2013: Enabling innovation, driving profitability Building a profitable wireless network to deliver an exceptional customer experience 6 November 2013 Franck Chevalier EVENT PARTNERS: 2 Operators
More informationNSP Software Summit: IMS: An Industry Perspective. Iain Gillott igillottresearch, Inc.
NSP Software Summit: IMS: An Industry Perspective Iain Gillott igillottresearch, Inc. 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
More informationEnd-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration
End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration Dr. Andreas Hauser Director Digital Service, TÜV SÜD Tokyo, 21 February 2017 Corporate Profile Slide 2 Our heritage: 150
More informationTynTec a VASCO Solution Partner Virtual Digipass / SMS Back-Up for Digipass March 2007
TynTec a VASCO Solution Partner Virtual Digipass / SMS Back-Up for Digipass March 2007 1 TynTec Positioning For financial service providers who wish to eliminate the risk of delays and poor data security
More informationHOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA
HOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA Ksenia Andreeva Anastasia Dergacheva Vasilisa Strizh November 27, 2018 2018 Morgan, Lewis & Bockius 2017 Morgan, Lewis & Bockius Contents News from the Russian
More informationEnabling Smart Lighting for Smart Cities. How Cheen Ng 18 August 2017
Enabling Smart Lighting for Smart Cities How Cheen Ng 18 August 2017 Infineon at a glance Business Segments Automotive 17% (ATV) 31% 41% 11% Revenue FY 2016 Industrial Power Control (IPC) Power Management
More informationProduct Brief: SDC-PC10AG a/g Compact Flash Module with Antenna Connectors
Product Brief: SDC-PC10AG 802.11a/g Compact Flash Module with Antenna Connectors The SDC PC10AG PC Card (PCMCIA) radio module from Summit Data Communications combines a high performance 802.11a/g radio
More informationOpenText Fax Servers and Microsoft Office 365
OpenText Fax Servers and Microsoft Office 365 Integrating Fax with Office 365 E N T E R P R I S E I N F O R M A T I O N M A N A G E M E N T 1 Abstract Cloud-based information technologies promise a number
More informationStatement by the President of the European Council. The Hague Nuclear Security Summit. Let me begin by thanking Prime Minister Rutte and the Dutch
Statement by the President of the European Council The Hague Nuclear Security Summit Let me begin by thanking Prime Minister Rutte and the Dutch Government for hosting the third Nuclear Security Summit
More informationT-Systems company profile
T-Systems company profile With a footprint in more than 20 countries, 43,700 employees, and external revenue of 7.9 billion euros (2016), T-Systems is one of the world's leading vendor independent providers
More informationProduct Brief: SDC-PE15N n PCIe Module with Antenna Connectors
Product Brief: SDC-PE15N 802.11n PCIe Module with Antenna Connectors The SDC-PE15N PCI Express Mini Card (PCIe) radio module from Summit Data Communications combines a high-performance, dual-band 802.11n
More informationPolicy Management & On-line Charging - Standards Based or Proprietary Solutions?
Policy Management & On-line Charging - Standards Based or Proprietary Solutions? Today there is huge hype around policy management, and most notably around data traffic policy management. In its simple
More informationEntire contents 2013 Mobile Experts LLC. Reproduction of this publication in any form without prior written permission is strictly forbidden and will
Table of Contents Entire contents 2013 Mobile Experts LLC. Reproduction of this publication in any form without prior written permission is strictly forbidden and will be prosecuted to the fully extent
More informationWe manage network capacity
We manage network capacity LIMA NETWORK PROTECT ARCHITECTS IN SAFETY AND INTELLIGENCE Overload Protection. Make your network more resilient against disasters. Perimeter Control. Manage service availability
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationAAA Authentication: New Use Cases
AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf
More informationICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region
ICAO Seminar/workshop on the Implementation of ground/ground and air ground data link applications in the SAM region An overview on Pan European Network Service - PENS Lima, Peru 10 to 12 Septiembre de
More informationApplication Note for Open Text Fax Server (RightFax v9.4) and 3COM VCX platform
Page 1 of 26 Application Note for Open Text Fax Server (RightFax v9.4) and 3COM VCX platform Issue: 1.0 Date: January 28, 2009 Authors: Abstract: Michael Hamlin (Open Text) and Ciaran O Shaughnessy (3Com)
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More informationSpending on Service Provider Routers Begins to Grow in EMEA
Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a
More informationInsights Into the SMS Industry and Market Trends
Insights Into the SMS Industry and Market Trends Stewart A. Skomra Director Business Development Qualcomm Enterprise Services E-Mail: sskomra@qualcomm.com Mobile: 858-740-4643 February 29, 2008 Wireless
More informationVISTRA NETHERLANDS PRIVACY NOTICE
Effective Date: from 25 May 2018 VISTRA NETHERLANDS PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights
More informationToken Sale Privacy Policy
Token Sale Privacy Policy PRIVACY POLICY LAST UPDATED ON: [11 SEP 2018] A. OVERVIEW You must read the entirety of this Privacy Policy carefully before making any decision to purchase Tokens. You must also
More informationSAP PartnerEdge Program Guide for Authorized Resellers
SAP PartnerEdge Program Guide for Authorized Resellers Table of Contents 3 SAP PartnerEdge Program: Accelerating Your Growth Gain an Edge on Your Competition 5 Program Requirements: How to Become an Authorized
More informationWHITEPAPER. Security overview. podio.com
WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features
More informationThe UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC
The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime
More informationChina and International Governance of Cybercrime
China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of
More informationFerdinand Kayser President and CEO, SES ASTRA S.A. 29th April French Senate Civil Protection
Ferdinand Kayser President and CEO, SES ASTRA S.A. 29th April French Senate Civil Protection SES GLOBAL Group Structure 100.0% 100.0% North America Europe 28.7% 19.9% Latin America 75.0% 34.1% Nordic Area
More informationThe Technical Interconnect Model for IP-based voice services
The Technical Interconnect Model for IP-based voice services Alessandro Forcina Chairman WS Technical Aspects Telecom Italia Sparkle I3 Forum, 1st Technical Workshop Warsaw, June 15th 16th 2010 Ver. 1
More information