14:30 18:15 Private Equity Focus - Estrela HIGH TECH AND TELECOM COMPANIES: INVEST IN THE FRENCH EXPERTISE

Size: px
Start display at page:

Download "14:30 18:15 Private Equity Focus - Estrela HIGH TECH AND TELECOM COMPANIES: INVEST IN THE FRENCH EXPERTISE"

Transcription

1 14:30 18:15 Private Equity Focus - Estrela 1 HIGH TECH AND TELECOM COMPANIES: INVEST IN THE FRENCH EXPERTISE

2 2 CODASYSTEM You shoot, You prove. Frederic LEVAUX, Chief Executive Officer, Codasystems

3 What do we do? 3 Our solution creates «Original Digital Pictures», these originals cannot be modified and are stored in optimal security conditions. These Pictures are watermarked, encrypted, time-stamped, localized and signed. These Picture have legal value in court, They can be taken with a regular digital camera and PC or with a Mobile phone The solution is patented and protected worldwide since 2002 The solution is composed of a capture software on the mobile, a secured storage infrastructure and a web platform for picture integrity checking and reporting The solution is used by a lot of different sectors (retail, construction, real estate, field service..), basically any sector where proof of service can be made with a picture The company currently has more than 250 mobiles in operation for approx. 10 major clients acquired since Q1 06 Capturing devices Sample pictures Web service

4 The Value Proposition 4 CodaSystem creates certified digital pictures Pictures taken are localized, timestamped and signed by the author These picture are the only costeffective alternative to long and costly legal procedures Pictures are encrypted and watermarked at the time of capture These picture have legal value in court because they are in total conformity with all norms and laws in Europe and have had their first legal victories Most of our clients don t need to go to court, but using Codasystem Pictures adds credibility and professionalism to their activity / service / performance

5 Markets 5 Targeted sectors Retail Advertising and Billboards Cleaning Services Field Service Companies Security Real Estate Construction operators Engineering companies Detectives Express delivery / Transporters / Movers Law enforcement / Civil servants Insurance companies Independent experts in Insurance, construction Bailiffs / Legal experts / Attorneys, lawyers Graffiti Advertising / billboards Retail / Merchandising, Construction / real Estate ANY SECTOR WHERE PROOF OF SERVICE CAN BE MADE WITH A PICTURE

6 How does it work? GPS localization 2 GSM localization Picture Transfer GSM/EDGE/3G/WIFI/ LAN/xDSL ), encryption 3 Picture Integrity Testing Checking for any modification 4 Picture Archiving For Future reference and legal value 6 Tablet PC & camera or Smartphone / mobile phone 1 Picture Capture Localization (GPS/GSM/Wifi), Time stamping, Watermarking & encryption CodaSystem Servers CodaSystem archiving 5 Duplicate Picture Delivery to end user To use in their reporting / data mgmt system End user End User

7 Legal Value, How? 7 By conformity to norms and laws Electronic Signature: conformity with electronic signature law of March and related decrees By the Legal Audits of our solution Legal Audit have been performed by independent legal firms specialized in dematerialization issue (report available upon request ) Numerical Archiving : Conformity with French and European Norm NFZ Integrity : conformity to the European recommendation RSC 3029 Time Stamping : Use of Time Stamping authority in conformity to European recommendation RSC 3161 Confidentiality : conformity with the norm ISO Network Security : conformity with the norm ISO TR System Security : ISA Certified (in process) By the Technical Audits performed Codasystem has been technically audited by experts of the FNTC (fédération nationale des tiers de confiance) and is currently undergoing Different ISO certifications Regular Intrusion Audits By the results obtained in court First cases have been taken to court and produced in CodaSystem s client success (referral available upon request) By professional recognition CodaSystem has been awarded the innovation award for 2005 by the FNTC And the Orange Syntec Innovation Trophy in 2006

8 Positioning 8 Our Job CodaSystem is the first industrialized technological solution to instantly capture digital proof, of what you want, where you want and when you want. WHO - WHAT WHEN WHERE Legal Benefits CodaSystem, offers you and instantaneous and unlimited legal protection Quality Benefits With CodaSystem, provide your clients with the proof of you professionalism Other concrete Benefits : Productivity : The capture of the evidence, the creation of a report and the distribution of theses documents can be made on the spot in minutes Physical : Digital document archiving helps gain valuable square meters Financial : Avoiding expensive intervention by experts, officials to create evidence, systematically generating opposable documents saves costly judicial fees and reduces potential loss (payables..) Quality : Having digital evidence of work performed helps securing a higher quality perception Optimization : Have your resources allocated to real value added tasks

9 CodaSystem Products 9 PC Software All types of Tablet PC Itronix, HP, Acer, Flybook + Canon Digital Cameras

10 CodaSystem Product 10 Mobile Software Mobile with integrated GPS receivers or A-GPS support (WM, Symbian* / Java*) Mobiles without-gps but with localization through operator service (WM, Symbian* / Java)*) *dispo Q4 2006

11 The Web Service 11 Ludendo Example

12 The Web Service 12

13 The company 13 Time line Created in 2002, R&D for 3 years First prototype in Q First field test with clients Q First client signed in Q Finished product on mobile phones in Q3 05 Early stage funding round in Q3 05 (< 1M ) Won Innovation Trophy (Security Federation) First major client sign-up, Q2 06 First Sales in 05, up 150% as of Q2 06 Won Innovation Trophy (Orange) New Funding round closing in Q3 06 (> 2 M ) Team of 11 people More then 10 Active Accounts More then 200 mobiles currently active Partnership agreement with Microsoft (startup program), all major telecom operators, and mobile manufacturers

14 Assets 14 Key Technical Skills Cryptography Proprietary watermarking algorithms development adapted to mobile platforms Audio, video signal treatment Embedded devices development Network Security maintenance Transmission protocol security Device Security management Legal implication of IT security Security Value chain management Key Certification ISO (IT Security) Certification Microsoft (people, platform, applications..) European norms and laws on IT security Legal Victories Patent Owner of a Invention patent (Inspection apparatus) delivered in France and extended Worldwide

15 Strategy 15 A 2 step Strategy 1. Independent Development and positioning as a complete certification value chain Keeping control of two major aspects of our business : Capturing software and secured infrastructure Independent from telecom operators, and multi-device, Audio and videos developments International Development Objective : sign-up key accounts and have the solution recognized as a unique cost-effective professional tool 2. Start OEM Relations (licensing) and positioning as a certification «authority» Sell API license for capturing digital audio, video and image to devices manufacturers (phones, camcorder, cameras, webcam, CCTV..). Eventually keep control of certain sensitive elements or capture (steganography algorithms) Keep control of security and legal conformity Manage and maintain security infrastructure and storage Objective : Install the company as an independent authority for original numerical documents.

16 Shoot & Proof 16 Shoot & Proof Strategy With our APIs developed for integrators, editors and device manufacturer, the shoot & Proof label will take over the CodaSystem products.

17 Business Model 17 Product Business Model has two components Software license For our standard application we charge a flat license fee per mobile device For client-specific application we charge e flat license fee + integration and development fees API and SDK for systems integrators: we sell our certified photo capture for SDK to system integrators to add legally valid pictures to the application the develop for their clients Monthly subscription In all cases we charge a monthly subscription for each mobile device in activity We store all picture for the legal period asked by the clients ( years) Mobile devices are bought directly by the client, GSM/GPRS subscription are paid by the client

18 Distribution 18 Double approach Direct : We directly attack large accounts to create interest around legally valid pictures and their associates benefits to top management. The Target being to sign-up 2 to 3 large clients in each targeted sector Indirect : CodaSystem set up a distribution network through different kinds of partner (System integrators, independent mobile distributors, mobile operators, MVNO ).

19 Status 19 Mobile Fleet Status We more than double our fleet every Quarter since commercial launch Q Q Q Q Q3 2006

20 Status 20 Sales We are currently above our forecasts Forecast Actual Q Q Q Q Year 06

21 Clients 21 Construction / Engineering Distribution, retail Local Authorities Real Estate Security Field Marketing Media

22 US Market Potential 22 United States Market The American Market is one of our primary target for the following reasons : High penetration level of Smartphone High availability of location system (GPS, mobile, wifi..) Major carriers looking to offer value-added services to increase ARPU Highly competitive Business Environment leading to heavy use of legal services and / or binding contractual agreements in B to B We offer for these market a cost-competitive way to create undisputable «proof of work done» with their mobile phones. Penetration Strategy CodaSystem makes available to telecom operators, mobile phone manufacturers and mobile integrators a piece of software that adds legal capabilities to mobile phone. Therefore we will rely on partners to enter the US market, these partners can be global (operators, manufacturers) or specialized in different sectors (construction, real estate, retail..) Competitive Landscape No direct competition has been identified worldwide Partial competition on pieces of the value chain (watermarking, secured exchanges ) Main competition comes from «normal» use of photographs that we have to convert to our «shoot and prove» photographs. The concept and the value chain is protected by a worldwide patent since 2002

23 US Market Strategy and Timing 23 Strategy & Timing We are looking to make our first contact with potential partners in Q4 06 or Q1 07 Start Legal validation and field test in Q2 or Q3 07 Probable new funding round for international expansion (Asia also big market potential) in Q3 or Q4 07 Team and Resources Frédéric Levaux : CEO, BBA + MBA (HEC). Ex -entrepreneur and Strategy consultant Worked for 4 years for the U.S. Government and Department of Commerce, very good knowledge of the American Market 1 additional resource, probably non-french will join the international development team in Q2 07

24 References 24 Technology Winner of «Best Innovation» by the FNTC in 2005 Selected as one of the «BEST INNOV» at Capital IT 2006 Winner of Innovation trophy in 2006 by SYNTEC and France Telecom Strong Partnership with Microsoft (IDEES program)

25 Contacts 25 Frédéric Levaux Président CodaSystem France - S.A.S. Paris Cyber Village Boulevard MacDonald Paris Tél : Fax : CodaSystem Luxembourg S.A. Technoport Schlassgoart 66, rue de Luxembourg L-4221 Esch-sur-Alzette LUXEMBOURG Tel : Fax :

26 New York, Monday, October 23,

SAVINGS MADE EASY. SHERPA Purchasing Presentation

SAVINGS MADE EASY. SHERPA Purchasing Presentation SAVINGS MADE EASY SHERPA Purchasing / 11, rue Tronchet - 75008 Paris FRANCE / +33 (0)1 40 56 00 30 / www.sherpa-purchasing.eu Executive Summary SHERPA proposes a new approach for sustainable savings An

More information

PIKTRAKK GENERAL CONDITIONS OF SUBSCRIPTION TO THE MONITORING SERVICE FOR PUBLICATINONS ON THE INTERNET WITH THE DEBT RECOVERY SERVICE

PIKTRAKK GENERAL CONDITIONS OF SUBSCRIPTION TO THE MONITORING SERVICE FOR PUBLICATINONS ON THE INTERNET WITH THE DEBT RECOVERY SERVICE PIKTRAKK GENERAL CONDITIONS OF SUBSCRIPTION TO THE MONITORING SERVICE FOR PUBLICATINONS ON THE INTERNET WITH THE DEBT RECOVERY SERVICE P ixw a y s SA 1 9 r u e B é r a n g e r 7 5 0 0 3 P a r i s - F r

More information

PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs

More information

SMALL BUSINESS. the basics. in telecommunications solutions

SMALL BUSINESS. the basics. in telecommunications solutions SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses

More information

FORM 51-102F1 EMPOWER TECHNOLOGIES CORPORATION MANAGEMENT DISCUSSION AND ANALYSIS FOR THE THREE MONTH PERIOD ENDED MARCH 31, 2014

FORM 51-102F1 EMPOWER TECHNOLOGIES CORPORATION MANAGEMENT DISCUSSION AND ANALYSIS FOR THE THREE MONTH PERIOD ENDED MARCH 31, 2014 FORM 51-102F1 EMPOWER TECHNOLOGIES CORPORATION MANAGEMENT DISCUSSION AND ANALYSIS FOR THE THREE MONTH PERIOD ENDED MARCH 31, 2014 The following discussion and analysis, prepared as of May 30, 2014, should

More information

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge

More information

Telematics & Wireless M2M

Telematics & Wireless M2M www.lairdtech.com Telematics & Wireless M2M DEVICE PORTFOLIO About Laird Technologies Laird Technologies designs and manufactures customized, performance-critical products for wireless and other advanced

More information

Press Conference 28 February 2011

Press Conference 28 February 2011 Press Conference 28 February 2011 This presentation and information included herein constitute a communication of a promotional nature and not a prospectus in the sense of the Directive 2003/71/CE of the

More information

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions

More information

Online Proctoring Services

Online Proctoring Services Online Proctoring Services Observing test takers online using webcams and microphones. It sounds simple, yet for educational institutions, it is no simple task. Kryterion is leading the industry in providing

More information

Case Study: Mobile Device Forensics in Texting and Driving Cases

Case Study: Mobile Device Forensics in Texting and Driving Cases Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge

More information

BUSINESS JET SECURITY SYSTEM

BUSINESS JET SECURITY SYSTEM BUSINESS JET SECURITY SYSTEM WHAT HAPPENS IF...? A business jet can be subject to a variety of risks, usually when it is parked, often at minor airfields where security can be rudimentary. These risks,

More information

Case Study: Smart Phone Deleted Data Recovery

Case Study: Smart Phone Deleted Data Recovery Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics

More information

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn

More information

smartphone users stay social & save money with voice over data Stephen Duke, co-founder 604 626-5037

smartphone users stay social & save money with voice over data Stephen Duke, co-founder 604 626-5037 smartphone users stay social & save money with voice over data Stephen Duke, co-founder 604 626-5037 how does your wireless carrier make you feel? gotta do this differently your smartphone was made for

More information

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST Thibault.devalroger@opentrust.com

More information

Technical Proposition. Security

Technical Proposition. Security Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net info@adamsoftware.net Why Read this Technical Proposition?

More information

A feature on one of the exciting companies in our network

A feature on one of the exciting companies in our network N 01 décembre 2004 - janvier 2005 Bimonthly newsletter dedicated to innovative entrepreneurship in Luxembourg N 23 August September 2008 Background information The high-tech business incubator Technoport

More information

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS

More information

security changes with Orange focus on your business, we focus on your security

security changes with Orange focus on your business, we focus on your security security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a

More information

TrustWay: the high security solution

TrustWay: the high security solution TrustWay: the high security solution Industrial spying, eavesdropping, hacking... it has never been so vital to communicate securely in our networked world... and the threats have never been so great.

More information

Presented Talk : PoC(k)ET, les détails d'un rootkit pour Windows Mobile 6. Sogeti - ESEC R&D

Presented Talk : PoC(k)ET, les détails d'un rootkit pour Windows Mobile 6. Sogeti - ESEC R&D Presented Talk : PoC(k)ET, les détails d'un rootkit pour Windows Cédric Halbronn, Sogeti - ESEC R&D Keywords : Rootkit, Mobile, Windows Quentin Pernier : quentin.pernier@ensimag.fr Kévin Gellenoncourt

More information

TERMS AND CONDITIONS OF USE OF THE WEBSITE GENERAL TERMS AND CONDITIONS

TERMS AND CONDITIONS OF USE OF THE WEBSITE GENERAL TERMS AND CONDITIONS TERMS AND CONDITIONS OF USE OF THE WEBSITE GENERAL TERMS AND CONDITIONS Preamble Touscoprod, an EURL with capital of 7,500 Euros, listed on the Paris Companies Registry as number 510 096 365, with registered

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

Data Transfer Technology to Enable Communication between Displays and Smart Devices

Data Transfer Technology to Enable Communication between Displays and Smart Devices Data Transfer Technology to Enable Communication between Displays and Smart Devices Kensuke Kuraki Shohei Nakagata Ryuta Tanaka Taizo Anan Recently, the chance to see videos in various places has increased

More information

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE

IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict

More information

We Believe in Security with a Capital S

We Believe in Security with a Capital S Security Consulting by arvato Systems We Believe in Security with a Capital S The number of attacks on IT systems has increased dramatically in recent years, with the style and approach of such attacks

More information

security peace of mind can drive your business forward

security peace of mind can drive your business forward security peace of mind can drive your business forward a new paradigm is transforming the security requirement In recent years, you ve seen profound changes in information systems and usage patterns. New

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT This Webview Livescope Software Development Kit Developer License ("Agreement") between you, the "Developer" and the

More information

Introduction to HIPAA Compliance Checklist:

Introduction to HIPAA Compliance Checklist: Introduction to HIPAA Compliance Checklist: HIPAA Compliance Checklist The following is a comprehensive HIPAA Compliance Checklist created to provide guidance to treatment providers utilizing voice and

More information

Jeff Edwards Head of Global Hotels Group June 2013

Jeff Edwards Head of Global Hotels Group June 2013 Jeff Edwards Head of Global s Group June 2013 Agenda Why? Industry context and business opportunity Distribution strategy and business proposition IT Competitive environment Our strategy Our product offering

More information

LEGAL BRANDSTOCK LEGAL EXPERT ADVICE FOR ALL IP MATTERS

LEGAL BRANDSTOCK LEGAL EXPERT ADVICE FOR ALL IP MATTERS BRANDSTOCK LEGAL EXPERT ADVICE FOR ALL IP MATTERS The Brandstock Group of companies is one of the world s leading and fastest-growing providers of Intellectual Property services that harnesses innovative

More information

Computer/IT Project LIST. Contact: 9860171201 8796142757

Computer/IT Project LIST. Contact: 9860171201 8796142757 Computer/IT Project LIST Contact: 9860171201 8796142757 1. Detecting E Banking Phishing Websites Using Associative Classification 2. Vehicle Tracking Using Driver Mobile Gps Tracking 3. Sentiment Analysis

More information

Egyptian Best Practices Securing E-Services

Egyptian Best Practices Securing E-Services Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats

More information

Integrated global lubricant data solutions

Integrated global lubricant data solutions O Integrated global lubricant data solutions 0W-30 & 75W-80 ACEA 5W-30? 0W-20 API SAE! 15W-40 85W-90 10W-40 www.oats.co.uk OIntegrated global lubricant data solutions Glocal lubricant data solutions OATS

More information

TOGETHER WE CAN DO MORE

TOGETHER WE CAN DO MORE B3System S.A. is a leading provider of IT system and service management solutions ensuring optimized IT infrastructure performance, availability and security within businesses. The company has been operating

More information

3 Reasons Xamarin is Best for Mobile App Development

3 Reasons Xamarin is Best for Mobile App Development Mobility Series The Quick Guide: 3 Reasons Xamarin is Best for Mobile App Development Sales Solutions 1 800 443 5210 www.aajtech.com So you ve decided to strengthen your organization s mobile strategy

More information

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011 W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

COURTESY TRANSLATION

COURTESY TRANSLATION PREMIER MINISTRE Secrétariat général de la défense nationale Paris, 7 April 2003 872 /SGDN/DCSSI/SDR Reference : SIG/P/01.1 Direction centrale de la sécurité des systèmes d information PROCEDURE CERTIFICATION

More information

VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. ENISA/TA/AD/2007/13

VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. ENISA/TA/AD/2007/13 VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. Applications are invited for the position of Senior Expert in Security Tools and Architecture at the European Network

More information

Trust the Connectivity Experts

Trust the Connectivity Experts Trust the Connectivity Experts Simplified, Proven Connection Management Mobile operators, cable operators, and device OEMs require a dynamic solution to keep subscribers online across every possible combination

More information

Mobile 2D Barcode/BIM-based Facilities Maintaining Management System

Mobile 2D Barcode/BIM-based Facilities Maintaining Management System Mobile 2D Barcode/BIM-based Facilities Maintaining Management System Yu-Cheng Lin, Yu-Chih Su, Yen-Pei Chen Department of Civil Engineering, National Taipei University of Technology, No.1.Chung-Hsiao E.

More information

eform Suite for TeleForm Create and Process Intelligent eforms in PDF and HTML

eform Suite for TeleForm Create and Process Intelligent eforms in PDF and HTML eform Suite for TeleForm Create and Process Intelligent eforms in PDF and HTML Double the Value of your TeleForm Solution The product eform Suite extends your TeleForm solution with the ability to create

More information

About Reltronics Technologies, Inc. Secure & Track Anything, Anywhere, Anytime

About Reltronics Technologies, Inc. Secure & Track Anything, Anywhere, Anytime Reltronics Technologies, Inc. specializes in Security and Tracking Solutions. The company focuses in manufacturing, deploying, and monitoring Security & Tracking systems that include radio frequency identification,

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

Terms and Conditions of Use and Sale as at 1 st January 2009

Terms and Conditions of Use and Sale as at 1 st January 2009 Terms and Conditions of Use and Sale as at 1 st January 2009 The present standard terms and conditions of use and sale, also called the Contract, are concluded between the following parties: - with capital

More information

Engagements: Terrace Cloud Projects

Engagements: Terrace Cloud Projects Engagements: Terrace Cloud Projects Our company byline is 'Software Done Right'. We think this phrase precisely describes our mission. It's simple. We work closely with clients, listen to their vision,

More information

WHITE PAPER. Telecom industry the expatriate consumer segment

WHITE PAPER. Telecom industry the expatriate consumer segment WHITE PAPER Telecom industry the expatriate consumer segment Summary The telecom industry, keeping pace with the leaps in this global digital era, is undergoing an immense transformation. It has been affected

More information

Is Your Mobile Application Ready For Business?

Is Your Mobile Application Ready For Business? Is Your Mobile Application Ready For Business? It is clear that mobile technologies will transform the enterprise. The simple math is that if information and communications are available at any place and

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Ryerson Digital Media Zone Online Resources Patent Essentials

Ryerson Digital Media Zone Online Resources Patent Essentials Maya Medeiros Lawyer, Patent Agent, Trademark Agent T: +1 416.216.4823 maya.medeiros@nortonrosefulbright.com http://www.nortonrosefulbright.com/people/99601/maya- medeiros PATENT ESSENTIALS WHAT IS A PATENT?

More information

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0 PowerKey Conditional Access System Phase 1.0 System Overview Revision 1.0 Scientific-Atlanta, Inc, Unpublished Works of Scientific-Atlanta, Inc. Copyright 1997 Scientific-Atlanta, Inc. All Rights Reserved

More information

INTERNATIONAL BUSINESS PLANNING CHECKLIST. For Development of Overall International Business Plan

INTERNATIONAL BUSINESS PLANNING CHECKLIST. For Development of Overall International Business Plan INTERNATIONAL BUSINESS PLANNING CHECKLIST For Development of Overall International Business Plan Thomas B. McVey 1 Introduction: The following Checklist is designed to be used by a Company s senior management

More information

Voltage's Encrypted Email

Voltage's Encrypted Email Voltage's Encrypted Email October 2004. Report #471 Ferris Research Product Brief Sponsored by Ferris Research, Inc. 408 Columbus Ave., Suite 1 San Francisco, Calif. 94133, USA Phone: +1 (415) 986-1414

More information

Definition of Mobile Instant Messaging (MIM) Systems

Definition of Mobile Instant Messaging (MIM) Systems J son & Partners Consulting Company presents the results of the research Mobile instant messaging systems as a direct threat to SMS. Definition of Mobile Instant Messaging (MIM) Systems MIM (Mobile Instant

More information

On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com

On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com About iviz Security Information Security company with industry s first on-demand penetration testing solution using unique

More information

a leading UK law firm Technology Big decisions about the future

a leading UK law firm Technology Big decisions about the future a leading UK law firm Technology Big decisions about the future 01 Technology Specialists We understand your business because our approach is as focused on the technology as it is the law. A number of

More information

Hosted Video in Cloud Computing

Hosted Video in Cloud Computing Hosted Video in Cloud Computing Future of IP Surveillance Juber Chu CEO, ACTi Corporation May, 2010 1 Agenda What is cloud computing? Market Trend ACTi s Strategy Case Study Why ACTi 2 Cloud! 3 Application

More information

e911 Marketing Plan Executive Abstract

e911 Marketing Plan Executive Abstract e911 Marketing Plan Medical Intelligence Leader of the mobile tele-security industry Executive Abstract We define our marketing problem to sell the new product Columba 2 facing the mobile tele-security

More information

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert While updating the two-day seminar Chris Grillo and

More information

Revenue increase of 21% in the first half of 2015

Revenue increase of 21% in the first half of 2015 Press release: 2015 First Half Results Igny, August 7, 2015 First half results of 2015 Consolidated Profit & Loss (in M) Revenue increase of 21% in the first half of 2015 From January 1, 2015 to June 30,

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

market development Vincent Poulbere, Senior Consultant

market development Vincent Poulbere, Senior Consultant How to Operate The story of SMS SMS global market development By Vincent Poulbere, Ovum Vincent Poulbere, Senior Consultant Vincent Poulbere is a Senior Consultant at Ovum, specialising in radio communications

More information

Flash Storage Solutions For Mobile Network Operators

Flash Storage Solutions For Mobile Network Operators msystems has been transforming raw flash into smart storage solutions since 1989. From embedded flash drives for millions of mobile handsets to the creation of USB smart drives designed for leading global

More information

Secure access provided to sensitive documents - anytime, anywhere. Quick setup and easy administration of data room, documents and users

Secure access provided to sensitive documents - anytime, anywhere. Quick setup and easy administration of data room, documents and users Eliminate the Paper Chase V-Rooms Virtual Data Rooms is an Internet-based, on demand hosted service designed to speed the completion of financial transactions which may involve hundreds of participants

More information

Mastering the Mobile Challenge

Mastering the Mobile Challenge Enterprise Device Enablement Mastering the Mobile Challenge How enterprises and vendors can improve viability, applicability, and security of mobile deployments Introduction Welcome to the post-pc world,

More information

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12. Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents

More information

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45 Transcription Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage Media Duration: 28:45 Feel free to quote any passage from this interview for your articles. Please reference cloudwards.net

More information

Digital identity: Toward more convenient, more secure online authentication

Digital identity: Toward more convenient, more secure online authentication Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based

More information

inaccess Networks Microelectronics in Telecom Applications

inaccess Networks Microelectronics in Telecom Applications inaccess Networks Microelectronics in Telecom Applications Christos Georgopoulos, Managing Director, inaccess Networks Member of the Board, Hellenic-SIA November 2007 - Thessaloniki 1 Company Profile Founded

More information

The Conference Room of Today. Easy & Secure. Instant Meeting

The Conference Room of Today. Easy & Secure. Instant Meeting The Conference Room of Today. Easy & Secure. Instant Meeting Instant Meeting - The Conference Room of Today Set up and attend meetings easily - from anywhere and at any time Whether for online meetings,

More information

AT&T Digital Life. Home Security and Automation Service. Overview. Service Innovation EXECUTIVE SUMMARY

AT&T Digital Life. Home Security and Automation Service. Overview. Service Innovation EXECUTIVE SUMMARY Customer Case Study AT&T Digital Life Home Security and Automation Service EXECUTIVE SUMMARY COMPANY OVERVIEW AT&T is the largest telecom services provider in the world and has a wide range of offerings,

More information

Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries

Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries White Paper No 01 I December 2010 Implementation of 21 CFR Part 11 in the epmotion Software Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device

More information

European Chamber of Commerce BUSINESS & IDEAS FAIR WESTIN SHANGHAI 2 July 2pm 6pm

European Chamber of Commerce BUSINESS & IDEAS FAIR WESTIN SHANGHAI 2 July 2pm 6pm OFFICIAL SPONSOR OF THE FAIR: ICSME is the one-stop shop for professional support for small and medium-sized enterprises (SMEs) to facilitate market entry and expansion in China: Serviced Offices, Start-up

More information

Location is Putting Mobile Advertising on the Map

Location is Putting Mobile Advertising on the Map Location is Putting Mobile Advertising on the Map Our History 2008 2009 2003 2007 Nokia acquires Enpocket Nokia acquires NAVTEQ Nokia Interactive Advertising joins NAVTEQ Media Solutions Enpocket launches

More information

cloud computing by Orange séminaire Aristote 17/12/2009

cloud computing by Orange séminaire Aristote 17/12/2009 cloud computing by Orange séminaire Aristote 17/12/2009 Orange and the cloud vision and strategy cloud computing - what is it about? cloud computing is a model for enabling convenient on-demand network

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Specialist service and maintenance partner for fire, security and integrated building technologies

Specialist service and maintenance partner for fire, security and integrated building technologies Specialist service and maintenance partner for fire, security and integrated building technologies Consultancy Engineering Commissioning Service & Support 0800 542 3333 www.reflexsystems.co.uk Why choose

More information

The Graphosign signature

The Graphosign signature Environment prot SpA Information Technology Graphosign signature with legal validity Saving in time and money Graphosign signature with legal No risks of signature counterfeiting Online and offline operation

More information

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America 1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:

More information

IT Requirements for the Eyelation Kiosks

IT Requirements for the Eyelation Kiosks Internet access & power at the kiosk site IT Requirements for the Eyelation Kiosks We prefer a wired network port and standard 120v power outlet at the physical kiosk location for the best speed and reliability.

More information

Virtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty

Virtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty Virtual Data Room Transactions are becoming increasingly more complicated. Deals involve numerous participants who need access to an increasing number of documents at all stages of the deal. This creates

More information

Terms and Conditions

Terms and Conditions Terms and Conditions The following Terms and Conditions define the conditions of use of the website http://www.adbuddiz.com/ (hereinafter the Website ), edited by SAS PURPLE BRAIN, registered at the Paris

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

2.2 The Security of Electronic Medical Records (EMR) DOH, the Executive Yuan August 19, 2009

2.2 The Security of Electronic Medical Records (EMR) DOH, the Executive Yuan August 19, 2009 Topic 2: Privacy Protection and Ensuring Security of Network Applications or Services 2.2 The Security of Electronic Medical Records (EMR) DOH, the Executive Yuan August 19, 2009 1 Agenda 1. The Vision

More information

The Power of the Platform

The Power of the Platform The Power of the Platform Cloud & Hosting Network Mobility 2 Technology Trends Reshaping Business Cloud Computing Amazing s That Change Our World Fast, Widespread Wireless/Wireline IP Networks Powerful

More information

Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.

Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system. 21 CRF 11 Electronic Records and Signatures Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system. By Todd Duell What does Title 21 of the Code of Federal

More information

Prospectus. E-Business Enablement: The Future of Professional Photography. Photographer and Consumer Perspectives. Business Drivers & Models

Prospectus. E-Business Enablement: The Future of Professional Photography. Photographer and Consumer Perspectives. Business Drivers & Models Focused Responsive Credible Visionary Prospectus Headquarters U.S. Libbey Industrial Parkway Weymouth, MA 02189 USA +1 781 616 2100 info@infotrends.com Europe Sceptre House 7-9 Castle Street Luton, Beds

More information

Tangoe Investor Overview. September 2012

Tangoe Investor Overview. September 2012 Tangoe Investor Overview September 2012 Notice to Investors This presentation contains forward-looking statements within the meaning of the U.S. federal securities laws, including, without limitation,

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

IP Video Surveillance

IP Video Surveillance IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access

More information

Service Provider Licensing Program

Service Provider Licensing Program Service Provider Licensing Program ABOUT THE SERVICE PROVIDER LICENSING PROGRAM The Service Provider License Agreement (SPLA) under the Service Provider Licensing Program enables an organization to license

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance Valerie J.M. Watzlaf, PhD, RHIA, FAHIMA, Sohrab Moeini, MS, and Patti Firouzan, MS, RHIA Department of Health Information

More information

France Telecom Orange investor day conquests 2015

France Telecom Orange investor day conquests 2015 France Telecom Orange investor day conquests 2015 France Delphine Ernotte Senior Executive Vice-President, France May 31 st, 2011 1 investor day Conquests 2015 cautionary statement This presentation contains

More information

Guidelines on Digital Forensic Procedures for OLAF Staff

Guidelines on Digital Forensic Procedures for OLAF Staff Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to

More information

SPONSORED CONTENT THE MARKETER S 2015 HOLIDAY FORECAST

SPONSORED CONTENT THE MARKETER S 2015 HOLIDAY FORECAST THE MARKETER S 2015 HOLIDAY FORECAST 2015 HOLIDAY FORECAST How Marketers Are Gearing Up Online and Offline The Black Friday-Cyber Monday weekend is the blockbuster sales period for marketers, not just

More information

Office 365 Adoption & Risk Report

Office 365 Adoption & Risk Report Office 365 Adoption & Risk Report 2016 Q2 Table of Contents INTRODUCTION...2 MICROSOFT S LAND AND EXPAND STRATEGY...3 A DEEPER LOOK AT CONSUMPTION BY APPLICATION AND INDUSTRY...7 INSIDER THREATS AND COMPROMISED

More information