LUCOM & exceet. Enlarged Product, Service & Consulting Portfolio. Düsseldorf/Zirndorf, December 8, 2014

Size: px
Start display at page:

Download "LUCOM & exceet. Enlarged Product, Service & Consulting Portfolio. Düsseldorf/Zirndorf, December 8, 2014"

Transcription

1 LUCOM & exceet Enlarged Product, Service & Consulting Portfolio Düsseldorf/Zirndorf, December 8, 2014

2 At a word LUCOM developed itself since establishment in 1991, to one of the leading European supplier of industrial router and VPN service. Our market of the remote service and the networked products is developing rapidly. At the same time we experience the strong trend towards digitization and miniaturization of products and services of our customers. These facts led me to search for a strong partner for further business developments. I am pleased to have found this strong partner in exceet that will support LUCOM on the further growth and can offer my customers a lot more added values. Mr. Gerhard Galsterer, Founder & Managing Director LUCOM GmbH

3 exceet a strong group exceet is a technology holding that operates with developing, manufacturing and services in the area of smart electronics in the markets of health, industry & security. We combine high-tech sensor with advanced security solutions and help our customers with the digital transformation of business models. Since 2011, listed on the Frankfurt Stock Exchange, with more than a dozen locations in Europe and around 1,000 employees, we belong in many of our core segments to one of the leading companies in the market. In Mill. EUR 2013 Net Sales 190,8 EBITDA 18,3 FTE 954 Mr. Uli Reutner, CEO of exceet group

4 Markets and Applications of exceet 47% Components, e.g. highly flexible printedcircuit board Certified Box- Building Health Highly sophisticated sensor Innovative miniaturized electronics Industry 29% Services, e.g. personalization of smart cards Holistic solutions Security / ID GRC, 24% compliance, data Secure protection, data Communication security

5 exceet offers in addition to individual hardware developments, a variety of additional services for M2M projects from a single source!

6 Segments of exceet Secure Solutions AG Machine-to-Machine (M2M) Internet of Things (IoT) End-to-End Solutions IoT/M2M : Hardware (Standard to Individual) IOT/M2M Platform (Software or Cloud) Supplier Independent global Connectivity Integration in individual Applications and Business Processes Secure Solutions IT Security Consulting, Products & Solutions: Data Security, Data Safety, Compliance & Penetration-Testing Signatures & Timestamps Cryptographical Solutions Individual Software Development Hardware Security Modules (HSMs) e-health Networked Health Care Launch of the egk/hba: Development of the central Public Key Infrastructure (PKI) for Telematicinfrastructures e. g. for the launch of the electronic health card Multi ID- & Access Solutions (emis) Multi ID- & Access Solutions: Multi-Level Access- and Authorization Management OS Independent (ios, Android, Windows) Contactless (RFID/NFC, Bluetooth) Secure Identification & Authentication Encryption and Decryption of Data

7 A big win for our customers M2M projects require a high degree of flexibility. Our customers are fascinated by the diversity of variants and experiences of LUCOM. Together we can cover all hardware requirements: We can combine optimized individual developments for large field operations with standard products - even within one project. With the holistic services of exceet Secure Solutions, we have a wide-ranging portfolio, that is valued by our customer in todays rapidly growing market around "IoT" and "Secure Smart Connected Products. Mr. Christian Methe, CEO of exceet Secure Solution AG

8 M2M services of exceet INNVOATION DEVICE CONNECTIVITY PLATFORM SECURITY COMPLIANCE INTEGRATION Transformation innovation to business for digitized business models Value engineering methodology and -team Hardware optimized for field service Global permission Device test in laboratory environment Multi-carrier platform for global connectivity White-label SIM Global availability / second source Accounting & billing Cloud or on premise (plus location) Business model of the platform providers (openness) Scalability Developing an infrastructure of ECO-systems Trusted Managed Services Digital signatures timestamp GRC Protecting products, processes and environment Data protection, Data security Penetration test Certification ISO 27001, Application integration Visualizing the results Data migration Benefits study Device catalogue Multi-carrier platform Comparison of platforms Secure infrastructure ISMS secure infrastructure COBOX Tableau

9 Benefits at a glance Specific Hardware / large volume Development and production of Individual sensors and hardware Scaling Competence Global Operational Capabilities Platform and Carrier independend Services from one source Security Competence End-to-end encryption Global Delivery Device / Connectivity / Application Governance, Risk & Compliance Data Protection / Data Security Business Analysis & Project Management End-2-End responsibility if necessary

10 Together, we support you: From the innovation consulting to the transformation of business models

11 LUCOM GmbH Components and Systems Ansbacher Str. 2a Zirndorf Mr. Gerhard Galsterer Managing Director Phone : gg@lucom.de Web: exceet Secure Solutions AG Rethelstraße Düsseldorf Mr. Björn Peters Head of M2M/IoT Phone: björn.peters@exceet.de Web:

exceet Secure Solutions Smart & Secure Network From Vision to Reality

exceet Secure Solutions Smart & Secure Network From Vision to Reality exceet Secure Solutions Smart & Secure Network From Vision to Reality Agenda 1. About exceet 2. Entering the World of Smart Connected Products 3. exceet s Transformation Developing New Competencies 4.

More information

New Business Fields Thanks to M2M

New Business Fields Thanks to M2M New Business Fields Thanks to M2M Christian Methe, CEO of exceet Secure Solutions AG, in an interview on the economic potentials of M2M Mr. Methe, are mistaken in the impression that there is something

More information

What is the Right Security Solution for Mobile Computing? #RSAC

What is the Right Security Solution for Mobile Computing? #RSAC SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for

More information

Investor and Analyst Call

Investor and Analyst Call Investor and Analyst Call 28 May 2015 Dr. Stefan Hofschen President, Chip Card & Security (CCS) Infineon Technologies AG Agenda Infineon CCS Division Overview Growth Drivers Summary Disclaimer: This presentation

More information

Protect Identities for people, workstations, mobiles, networks

Protect Identities for people, workstations, mobiles, networks ot Corporate ID Protect Identities for people, workstations, mobiles, networks Address your security needs with the leader in the corporate identity market Corporate security challenges The security of

More information

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2. Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions

More information

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services Market Data + Services Advanced outsourcing solutions IT Hosting and Managed Services Table of Contents 3 Table of Contents Introduction Market Data + Services powers the financial community with a range

More information

Applying Common Criteria to a cloud type payment service

Applying Common Criteria to a cloud type payment service 1 Applying Common Criteria to a cloud type payment service Kenji Yamaya ECSEC Laboratory Inc. 2 Evaluation of a cloud system Tablet internet cloud Newly developed terminal products Mobile POS Smart Phone

More information

Digitisation of Industry

Digitisation of Industry Digitisation of Industry Lunch Debate at the 7. European Innovation Summit December 8, 2015 Dr. Thomas Rettich, Head of Research Coordination TRUMPF GmbH + Co. KG (Ditzingen, Germany) Member of Photonics21

More information

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved The global leader in cellular M2M communication Cinterion Wireless Modules GmbH 2011, All rights reserved is a Gemalto company Company History Gemalto The company was founded in 1995 as a business unit

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

Advanced Card Systems Ltd.

Advanced Card Systems Ltd. Issue Date: 17 Jan 2007 Publication: Frost & Sullivan (http://www.frost.com/prod/servlet/market-insight-top.pag?docid=92710322) By Jafizwaty Ishahak, Program Manager, Smart Cards and Auto ID, APAC Mr.

More information

Sierra Wireless Corporate Overview. February 2015

Sierra Wireless Corporate Overview. February 2015 Sierra Wireless Corporate Overview February 2015 1 Safe harbor statement Certain statements and information in this presentation are not based on historical facts and constitute forward-looking statements

More information

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation CELTIC Day, Berlin, June 25 th 2014 Gemalto at a glance 2.4bn revenue 2013 2bn+ end-users benefit from our solutions

More information

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of

More information

Two factor strong authentication. Complex solution for two factor strong authentication

Two factor strong authentication. Complex solution for two factor strong authentication Two factor strong authentication Complex solution for two factor strong authentication Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe

More information

TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI Mark B. Cooper President & Founder PKI Solutions Inc. @PKISOLUTIONS Level: Intermediate [ About PKI Solutions Inc. 10 years as

More information

Strong data protection. Strategic business value. www.thales-esecurity.com

Strong data protection. Strategic business value. www.thales-esecurity.com Someone is stalking your sensitive data. Coveting your intellectual property. Waiting for the slightest crack in the window of opportunity to hack it, misuse it, and run. How can you best protect and control

More information

Smart Meter PKI - Make or Buy?

Smart Meter PKI - Make or Buy? ID WORLD Frankfurt 20.11.2014 11:15 11:45 Uhr Smart Meter PKI - Make or Buy? Dr.-Ing. Lutz Martiny achelos GmbH Paderborn Why PKI? Legal Background: Energiewirtschaftsgesetz Technical Background: Technical

More information

congatec AG How to come around the IoT data security challenges

congatec AG How to come around the IoT data security challenges congatec AG How to come around the IoT data security challenges Christian Eder Director Marketing We simplify the use of embedded technology fast, dedicated and reliable Technology Driven Products Customer

More information

mcard CPK Supported Solutions

mcard CPK Supported Solutions mcard CPK Supported Solutions Century Longmai White Paper All rights reserved Contents 1. MTOKEN CPK CARD INTRODUCTION... 2 PRODUCT INTRODUCTION... 2 Product appearance... 3 Hardware parameters... 4 2.

More information

Fujitsu Dynamic Cloud Bridging today and tomorrow

Fujitsu Dynamic Cloud Bridging today and tomorrow Fujitsu Dynamic Cloud Bridging today and tomorrow Contents Cloud Computing with Fujitsu 3 Fujitsu Dynamic Cloud: Higher Dynamics for Enterprises 4 Fujitsu Dynamic Cloud: Our Offering 6 High Security Standards

More information

Investor and Analyst Call

Investor and Analyst Call Investor and Analyst Call 11 June 2013 Dr. Stefan Hofschen Division President Chip Card & Security (CCS) Table of Contents Infineon Chip Card & Security Overview Differentiation and Technology Growth Drivers

More information

KURA M2M/IoT Gateway. reducing the distance between embedded and enterprise technologies. Tiziano Modotti, October 28 th, 2014

KURA M2M/IoT Gateway. reducing the distance between embedded and enterprise technologies. Tiziano Modotti, October 28 th, 2014 KURA M2M/IoT Gateway reducing the distance between embedded and enterprise technologies Tiziano Modotti, October 28 th, 2014 IoT Architecture @ M2M/IoT Integration Platform on Cloud Business Applications

More information

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved. Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password

More information

WE ENGINEER THE FUTURE INVESTOR PRESENTATION AUGUST, 2015

WE ENGINEER THE FUTURE INVESTOR PRESENTATION AUGUST, 2015 WE ENGINEER THE FUTURE INVESTOR PRESENTATION AUGUST, 2015 FIRST SENSOR COMPANY PROFILE First Sensor AG is one of the world's leading suppliers in the field of sensor systems. Our company develops and manufactures

More information

Best Practices for Integrating Mobile into the Access Control Architecture

Best Practices for Integrating Mobile into the Access Control Architecture Best Practices for Integrating Mobile into the Access Control Architecture Merging Security and Convenience with Mobile Mobile Access Using a mobile device to gain access to different buildings is not

More information

2014 Global Healthcare Information Interoperability 2013 North American SSL Certificate Customer Value Leadership Award Product Leadership Award

2014 Global Healthcare Information Interoperability 2013 North American SSL Certificate Customer Value Leadership Award Product Leadership Award 2013 2014 INSERT COMPANY LOGO HERE 2014 Global Healthcare Information Interoperability 2013 North American SSL Certificate Customer Value Leadership Award Product Leadership Award 2014 Frost & Sullivan

More information

Security Services and Solutions. Full security, from planning through implementation to operation.

Security Services and Solutions. Full security, from planning through implementation to operation. Security Services and Solutions. Full security, from planning through implementation to operation. Security Services and Solutions. Seamless end-to-end service provision. T-Systems supports its customers

More information

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999 Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

Product Overview: Software Update Management for Automotive. Wireless software update & management service for Automotive manufacturers

Product Overview: Software Update Management for Automotive. Wireless software update & management service for Automotive manufacturers B L A C K B E R R Y M 2 M S O L U T I O N S Product Overview: Software Update Management for Automotive Wireless software update & management service for Automotive manufacturers Product Overview BlackBerry

More information

Putting Operators at the Centre of

Putting Operators at the Centre of Putting Operators at the Centre of Enterprise Mobile Security Introduction Small and Medium Enterprises make up the majority of firms and employees in all major economies, yet are largely unidentified

More information

MIT M2M ZU INDUSTRIE 4.0

MIT M2M ZU INDUSTRIE 4.0 MIT M2M ZU INDUSTRIE 4.0 Jürgen Hase Juergen.Hase@telekom.de Darmstadt, May 23, 2014 M2M // IMPACT ALONG MANY INDUSTRIES M2M ECOSYSTEM 8 5 4 7 6 2 1 9 3 1. Transport & Logistics 2. Vehicle Telematics 3.

More information

Cloud services @ Romtelecom

Cloud services @ Romtelecom Cloud services @ Romtelecom Date: Feb. 2014 RoCloud Conference Dr. Vasile Voicu Product Management Core Cosmote&Romtelecom Business Segment AGENDA 1. Cloud market overview 2. Cloud Services @ Romtelecom

More information

Internet of Things Driving a Revolutionary Business Model For the Next Generation Embedded Market

Internet of Things Driving a Revolutionary Business Model For the Next Generation Embedded Market Internet of Things Driving a Revolutionary Business Model For the Next Generation Embedded Market Miller Chang Vice President, Embedded Core Group, Advantech The world is moving through an Internet of

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Fred Yentz President & CEO ILS Technology, a Telit company. Richard Shepherd Director of Sales Industrial IOT Solutions Group, AT&T

Fred Yentz President & CEO ILS Technology, a Telit company. Richard Shepherd Director of Sales Industrial IOT Solutions Group, AT&T Carriers, software developers, and hardware makers are increasingly offering M2M platform services designed to get solutions to market more cost effectively, more quickly and at reduced risk. This session

More information

Verizon Applications and Cloud

Verizon Applications and Cloud Verizon Applications and Cloud Mobilizing Business Applications, Efficiently and Affordably Mobile connectivity has become a way of life and an expectation for much of today s workforce. With pervasive

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

How To Create A Global Signer For The Internet Of Everything

How To Create A Global Signer For The Internet Of Everything Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions. Mission To provide enterprises with end-to-end identity services for the

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE. About Identiv Identiv is a global security technology company that establishes trust in the connected world, including premises, information, and everyday items. Global organizations in the government,

More information

BBM Protected: Secure enterprise- GrAde MoBIle MeSSAGING

BBM Protected: Secure enterprise- GrAde MoBIle MeSSAGING BBM Protected: Secure ENTERPRISE- GRADE mobile messaging All the benefits of BBM with the security of enterprise-grade encryption BBM Protected allows employees to take advantage of the speed, reliability

More information

THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET

THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET STRATEGIC WHITE PAPER The machine-to-machine (M2M) industry is focused on extending its reach beyond niche

More information

M2M The Next Industrial Revolution & Energy Transition Driver. M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo

M2M The Next Industrial Revolution & Energy Transition Driver. M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo M2M The Next Industrial Revolution & Energy Transition Driver M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo MarComSo Short Profile Founded in 1997 Focus on M2M/IoT-, IT

More information

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and

More information

End-to-End Email Encryption for Everybody?

End-to-End Email Encryption for Everybody? White paper End-to-End Email Encryption for Everybody? Why private individuals and corporations need different solutions White paper End-to-End Email Encryption for Everybody? Why private individuals and

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

IoT Business Solutions

IoT Business Solutions IoT Business Solutions Re-thinking Re-shaping Business Good Reasons for Businesses and Organizations to look into M2M / IoT now Become more efficient Actions based on real data from the field Avoid cost

More information

Unleashing the Power of the Internet of Things

Unleashing the Power of the Internet of Things Gemalto M2M Make an M2M wish! Unleashing the Power of the Internet of Things Our M2M portfolio is enabling secure solutions in industries ranging from healthcare, retail services, smart energy, transportation,

More information

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper. EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple

More information

PRIVATE, TRUSTWORTHY AND SCALEABLE Providing Secure Remote Service and Support. white paper

PRIVATE, TRUSTWORTHY AND SCALEABLE Providing Secure Remote Service and Support. white paper PRIVATE, TRUSTWORTHY AND SCALEABLE Providing Secure Remote Service and Support white paper EXECUTIVE SUMMARY A Methodology for Providing a Secure Connected Products Service Security is a primary concern

More information

IoT/M2M Monetization. Dimitrios Paschalis M2M Monetization Evangelist

IoT/M2M Monetization. Dimitrios Paschalis M2M Monetization Evangelist IoT/M2M Monetization Dimitrios Paschalis M2M Monetization Evangelist Intracom S.A. Telecom Solutions 19.7 km Markopoulou Ave., GR 19002 t.: +30 2106671000 f: +30 2106671001 www.intracom-telecom.com ...from

More information

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group PReynolds@ARCweb.com Twitter @PeterDReynolds The Hardware Layer

More information

SAFEAPP TECHNOLOGY PROGRAM

SAFEAPP TECHNOLOGY PROGRAM SAFEAPP TECHNOLOGY PROGRAM Join our dynamic community of technology application developers that recognize the advantages of SafeNet security solutions. SafeNet Overview................. 3 Partnering with

More information

IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY

IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY Security Services Identify and reduce risks The reliable protection of your assets information, workforce,

More information

Security Solution Vendors 2015 Suppliers and solutions for network, data & storage, and endpoint security

Security Solution Vendors 2015 Suppliers and solutions for network, data & storage, and endpoint security Security Solution Vendors 2015 Suppliers and solutions for network, data & storage, and endpoint security German specialist for site connectivity LANCOM emerges as Champion in the techconsult audit: Security

More information

Telco s role in Smart Sustainable Cities

Telco s role in Smart Sustainable Cities Telco s role in Smart Sustainable Cities Turin, May 6th 2013 TILAB G. Rocca Introduction Smart Sustainable City is a great concept but needs to be supported by infrastructures and enabling platforms to

More information

Building Connected Businesses with Internet of Things Services

Building Connected Businesses with Internet of Things Services Building Connected Businesses with Internet of Things Services Connecting systems, assets, and users is the starting point for creating new services and optimising enterprise processes. The rapidly evolving

More information

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

Seedling Internet of Things (IoT) and Wearables Platform

Seedling Internet of Things (IoT) and Wearables Platform Seedling Internet of Things (IoT) and Wearables Platform WHITE PAPER Hitseed Oy Version 4.9.2014 HitSeed Introduction HitSeed Oy (www.hitseed.com) was founded and incorporated in 2012 in Finland to focus

More information

Short range low power wireless devices and Internet of Things (IoT)

Short range low power wireless devices and Internet of Things (IoT) Short range low power wireless devices and Internet of Things (IoT) White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract This paper discusses

More information

How To Get Smart Cards From Atos

How To Get Smart Cards From Atos secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through

More information

Transaction Security. Training Academy

Transaction Security. Training Academy Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart

More information

TAKE OFF FOR YOUR CLOUD virtual private networks (vpn)

TAKE OFF FOR YOUR CLOUD virtual private networks (vpn) INFRASTRUCTURE & NETwORK SERVICES TAKE OFF FOR YOUR CLOUD virtual private networks (vpn) Infrastructure & Network Services from T-Systems comprises all solutions that are critical to a business IT and

More information

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Secure Authentication for the Development of Mobile Internet Services Critical Considerations Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s

More information

Horizontal IoT Application Development using Semantic Web Technologies

Horizontal IoT Application Development using Semantic Web Technologies Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges

More information

The new role of billing systems in the Internet of Things

The new role of billing systems in the Internet of Things The new role of billing systems in the Internet of Things The Internet of Things (IoT) can be described as a multitude of connections between various computing devices connected to the Internet. A new

More information

MACHINE-TO-MACHINE (M2M) THE 4 TH INDUSTRIAL REVOLUTION?

MACHINE-TO-MACHINE (M2M) THE 4 TH INDUSTRIAL REVOLUTION? MACHINE-TO-MACHINE (M2M) THE 4 TH INDUSTRIAL REVOLUTION? Jürgen Hase Juergen.Hase@telekom.de Springe, March 20, 2014 DEUTSCHE TELEKOM FROM TELCO TO TELCO PLUS MY FIRST CHOICE FOR CONNECTED LIFE & WORK

More information

Mobile Payments in the Cloud

Mobile Payments in the Cloud Mobile Payments in the Cloud Peter Landrock - patents pending Mobile / Digital Cloud Wallets Opportunity & Challenge in the Market EMV / Payments MOBILE CLOUD Immediate Benefits Decrease Fraud Decrease

More information

Secure your data. Security Made in Germany

Secure your data. Security Made in Germany Secure your data Security Made in Germany At a glance. The security solution you have been waiting for. Security solutions have to be transparent; easy, but flexible. DriveLock offers comprehensive security

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

M2M For industrial and automotive

M2M For industrial and automotive M2M For industrial and automotive Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is

More information

Announcement date: 9 th September 2009 Effective Date: 9 th November 2009 IP Office 412 End of Sale Regional Availability: Global

Announcement date: 9 th September 2009 Effective Date: 9 th November 2009 IP Office 412 End of Sale Regional Availability: Global End of Sale Notice Announcement date: 9 th September 2009 Effective Date: 9 th November 2009 Subject: IP Office 412 End of Sale Regional Availability: Global Summary As part of its on-going program of

More information

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document

More information

Nokia Siemens Networks Cumulocity The key to the world of machine-to-machine opportunity

Nokia Siemens Networks Cumulocity The key to the world of machine-to-machine opportunity Nokia Siemens Networks Cumulocity The key to the world of machine-to-machine opportunity Machine-to-machine communication is a game-changing prospect The Internet of Things is expected to connect 50 billion

More information

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number

More information

SAP HANA Cloud Platform Frequently Asked Questions - Business

SAP HANA Cloud Platform Frequently Asked Questions - Business SAP HANA Cloud Platform Frequently Asked Questions - Business SAP HANA Cloud Platform 1. What is SAP HANA Cloud Platform? SAP HANA Cloud Platform, the in-memory Platform-as-a-Service offering from SAP,

More information

OpenScape Web Collaboration

OpenScape Web Collaboration OpenScape Web Collaboration The quickest and easiest way to collaborate, share and support online Performance-boosting collaboration and secure support from anywhere Issues raised, ideas shared and decisions

More information

Realizing the Big Data potential - from data to business intelligence

Realizing the Big Data potential - from data to business intelligence Cloud and the Internet of Things Realizing the Big Data potential - from data to business intelligence Brett Frische RSS m2mair Cloud EMEA May 19, 2015 794 Employees Worldwide 100 Million+ Modules Shipped

More information

Running Mission-Critical Enterprise Applications in Private and Hybrid Cloud Environments

Running Mission-Critical Enterprise Applications in Private and Hybrid Cloud Environments Running Mission-Critical Enterprise Applications in Private and Hybrid Cloud Environments Working in Partnership Today s Presenters Working in Partnership Paul Calvert IT Services Solution Line Director

More information

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST

More information

IT Risk Management for Energy Companies

IT Risk Management for Energy Companies IT Risk Management for Energy Companies Lars Neupart, Founder & CEO of Neupart, www.neupart.de Robert Bursy, Account Manager Neupart D-A-CH About Neupart ISO 27001 certified company. IT GRC management

More information

Interagency Advisory Board Meeting Agenda, Wednesday, February 22, 2012

Interagency Advisory Board Meeting Agenda, Wednesday, February 22, 2012 Interagency Advisory Board Meeting Agenda, Wednesday, February 22, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Generic Identity Command Set (GICS): Leveraging PIV to Build a Standard Platform

More information

M2M. Machine-to-Machine Intelligence Corporation. M2M Intelligence. Architecture Overview

M2M. Machine-to-Machine Intelligence Corporation. M2M Intelligence. Architecture Overview M2M Machine-to-Machine Intelligence Corporation M2M Intelligence Architecture Overview M2M Intelligence - Essential platform for the M2M and IoT Economy Architecture Overview Revised styles and edits 6/3/2016

More information

TeamViewer Security Information

TeamViewer Security Information TeamViewer Security Information 2015 TeamViewer GmbH, Last update: 06/2015 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical

More information

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission Secure Communications Product Brochure 01.01 R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission R&S MKS9680 Modular Encryption Device At a glance The R&S MKS9680 is a highly

More information

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services Thales Service Definition for UK IL3 Encrypted Overlay Thales Service Definition for IL3 Encrypted Overlay for Cloud Services April 2014 Page 1 of 11 Thales Service Definition for UK IL3 Encrypted Overlay

More information

Security Is a Matter of Trust.

Security Is a Matter of Trust. Security Is a Matter of Trust. Dear Readers: Data protection and data security are a top priority. In these times of tougher and tougher global competition, employees, partners and suppliers must be committed

More information

Brochure More information from http://www.researchandmarkets.com/reports/3197610/

Brochure More information from http://www.researchandmarkets.com/reports/3197610/ Brochure More information from http://www.researchandmarkets.com/reports/3197610/ Global Mobile Security Market (Solution, Types, OS, End Users and Geography) - Size, Share, Global Trends, Company Profiles,

More information

Security of smart grid communication protocols

Security of smart grid communication protocols Security of smart grid communication protocols C-DAX is funded by the European Union's Seventh Framework Programme (FP7-ICT-2011-8) under grant agreement n 318708 Erik Poll Radboud University Nijmegen

More information

EMV in India: Giesecke & Devrient India. Mastering Successful Implementations with G&D

EMV in India: Giesecke & Devrient India. Mastering Successful Implementations with G&D EMV in India: Giesecke & Devrient India Mastering Successful Implementations with Agenda 1. Indian Payment Card Industry Brief overview 2. Synopsis 3. Key initiatives for EMV Issuance 4. Future Plans Indian

More information

Intelligent Platform as a Service (PaaS) solutions for Mobile Virtual Network Operators (MVNO s)

Intelligent Platform as a Service (PaaS) solutions for Mobile Virtual Network Operators (MVNO s) Intelligent Platform as a Service (PaaS) solutions for Mobile Virtual Network Operators (MVNO s) Luminet 2015 22 Southampton Place, Holborn, London, WC1A 2BP Phone: 0207 400 6300 Email: enquiries@luminet.co.uk

More information

Android for the Enterprise Ge#ng from Here to There

Android for the Enterprise Ge#ng from Here to There Android for the Ge#ng from Here to There 1 Overview addresses enterprise needs: security and device management. 2 Overview pla6orm server so4ware 3 Overview 4 Use cases 5 Use cases Loss Remediation Minimize

More information

DilRoom. Improving, accelerating and simplifying the sharing of sensitive information. www.oodrive.com

DilRoom. Improving, accelerating and simplifying the sharing of sensitive information. www.oodrive.com Improving, accelerating and simplifying the sharing of sensitive information. www.oodrive.com Securing, accelerating and simplifying the sharing and viewing of sensitive or confidential documents. WHEN

More information

Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities

Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities Smart Devices @ Givaudan From BYOD experience to new mobile opportunities 2 Givaudan What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials

More information