TRUSTED ARCHIVE OVERVIEW

Size: px
Start display at page:

Download "TRUSTED ARCHIVE OVERVIEW"

Transcription

1 TRUSTED ARCHIVE OVERVIEW

2 ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES Enterprise communications have experienced explosive growth driven by the continuous shift to digital workflows and the pervasive use of social media, mobile and web channels for customer engagement. As increasingly complex record-keeping requirements are introduced by legal authorities, staying compliant across all communication channels continues to be a challenge for enterprises. One of the main components of compliance is record keeping, the process of ensuring that data is accessible in an archive for future use. To preserve the integrity of archived data, a mechanism must be in place to guarantee that data is not corrupted or lost. This mechanism is reconciliation, i.e., the process of establishing consistency among data from a source to a target store and vice versa. Reconciliation ensures that a set of records is authentic and correct versus a golden copy, i.e., that they match in digital signatures (e.g., checksums, fingerprints) and in record counts. The process must be efficient to be able to handle the hundreds of terabytes of data and hundreds of millions of records typically found in a compliance archive. The challenge is to find or develop a mechanism that both detects discrepancies in large datasets in a space- and time-efficient way and offers a means of resolving such discrepancies in a timely manner. The figure on the next page describes the Bloomberg Vault reconciliation process. This process employs a sophisticated data sequence and hash tree (Merkle Tree) technology to efficiently compare and synchronize a range of data objects between client and cloud.

3 The Bloomberg Vault Reconciliation Process WITHIN CLIENT 7 WITHIN CLOUD 4 COMPARE ROOT NODE COMPARE SUB-NODES 3 RETRANSMIT MISSING DATA 2 6 DATA 1 DATA 5 ARCHIVE 1. Transmit Data data local to the client is transmitted to the cloud-based archive and ingested and stored there. 2. Determine Range a range of data determined by count or time threshold is selected from the local store by the client to be reconciled with the cloud. 3. Create Sequence client uses the embedded sequence in the objects in the data range, i.e., brings the objects into a deterministic order. 4. Calculate Hash Tree a hash signature is calculated for each object. The hash signatures are used as leaf nodes to generate a tree of hashes. 5. Retrieve Data the cloud retrieves the objects for a given data range from its archive. 6. Determine Range, Use Sequence and Retrieve Data the cloud performs the same sequencing and hash tree calculation tasks as described in steps The Reconciliation Process starts with a comparison of the root value of the hash trees generated for a given data range. A match for a data range digitally certifies that the corresponding dataset is the same between client and cloud. If the values don t match, the process recursively traverses the hash tree to find the corrupted objects, i.e., those for which the hash signatures don t match. These objects are retransmitted in a subsequent step. TRUSTED ARCHIVE OVERVIEW 2

4 Bloomberg Vault reconciliation uses an efficient protocol between a client and the cloud-based archive to execute the reconciliation process. The protocol is implemented by a client component that runs as part of an enterprise communication or collaboration service and by a hosted service offered as part of Bloomberg s cloud. Clients that participate in the reconciliation process maintain a copy of all data that needs to be reconciled. This local copy can be a file share, a mail server inbox or a local store of a SMTP server; it is often called the golden copy. The size of the golden copy depends on the resiliency requirements of the customer, but once the data has been reconciled, it can be destroyed and the space reused. The example below depicts implementation and protocol using Microsoft Exchange Server and a plugin. Reconciliation Client Plugin in Exchange maintains the hash values and sequence numbers for all communications that are transmitted to the cloud for archiving purposes. At the end of a configurable time (e.g., end of day), the Plugin starts the reconciliation process for the range of data transmitted. The first step is to sequence the hash values for each of the individual s in the data range to be reconciled. After all s have been sequenced, digital signatures and the hash tree are generated, and the Plugin sends a Start Reconciliation message to the cloud service. The cloud service, once it receives the Start Reconciliation message, retrieves all messages that have been ingested, stored and indexed on behalf of the client for a given data range. It performs the same sequencing and hash tree generation as the Plugin and notifies the Plugin when it is ready to reconcile for a given data range. After the Start Reconciliation steps are completed, the Client Plugin and Hosted Service exchange hash tree nodes within a reconciliation process that efficiently compares data between the two systems. The process either digitally certifies that the transmission was correct the root hash nodes match or it progresses until the corrupted or missing messages are identified. Implementation and Protocol Example MICROSOFT EXCHANGE SERVER BLOOMBERG VAULT Reconciliation Client Plugin PROTOCOL ENGINE RECONCILIATION ENGINE Reconciliation Protocol Start Reconciliation Data Range Get Node Hash Reconciliation Service PROTOCOL ENGINE RECONCILIATION ENGINE Data Management Search Reporting Analytics HASH TREE GENERATOR Node Hash Value HASH TREE GENERATOR SEQUENCE GENERATOR ARCHIVING Stop Reconciliation Purge Records or Retransmit SEQUENCE GENERATOR RANGE GENERATOR Storage LOCAL STORE ADMIN Ingestion TRUSTED ARCHIVE OVERVIEW 3

5 Based on its configuration, the process either alerts the operator to the error condition or starts a retransmission of the missing or corrupted data. At the end of a successful reconciliation process, the client Plugin can safely remove all data stored locally. We have used the Trusted Archive technology to secure the ingestion of hundreds of terabytes of client data; it has proven invaluable in maintaining our 24x7 operation with automatic endto-end reconciliation and in helping our customers stay compliant. We can build a hash tree at a rate of about 2,840 documents/second on each side (enterprise and cloud); the actual tree comparison across a private line takes less than 10 seconds, including wire delay. For a typical dataset (500,000 messages across 2 machines at 3,000 messages/ second), the reconciliation process takes under 100 seconds. This compares favorably with the typical process employed in the industry, i.e., to transfer counts, IDs and fingerprints to the archive and loop over the stored objects to compare them a process, that, at best, takes days to complete and involves manual steps. TAKE THE NEXT STEP Learn more about Bloomberg Vault and archive reconciliation at massive scale using Merkel Trees. Contact us at , vaultsales@bloomberg.net or call your regional representative to schedule a personalized demonstration. = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = BEIJING FRANKFURT LONDON NEW YORK SÃO PAULO SYDNEY DUBAI HONG KONG MUMBAI SAN FRANCISCO SINGAPORE TOKYO bloomberg.com/vault The data included in these materials are for illustrative purposes only Bloomberg L.P. All rights reserved. S DIG

NFORMATION ONTROL OUR BLOOMBERG VAULT. An Enterprise Solutions Offering

NFORMATION ONTROL OUR BLOOMBERG VAULT. An Enterprise Solutions Offering > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > BLOOMBERG VAULT An Enterprise Solutions Offering ONTROL OUR NFORMATION

More information

TRADE ORDER MANAGEMENT SOLUTIONS (TOMS) A Bloomberg Trading Solutions Offering BE AGILE

TRADE ORDER MANAGEMENT SOLUTIONS (TOMS) A Bloomberg Trading Solutions Offering BE AGILE >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> TRADE ORDER MANAGEMENT SOLUTIONS (TOMS) A Bloomberg Trading Solutions Offering BE AGILE EXPAND YOUR REACH Bloomberg Trading Solutions

More information

ASSET AND INVESTMENT MANAGER (AIM) A Bloomberg Trading Solutions Offering BE AGILE

ASSET AND INVESTMENT MANAGER (AIM) A Bloomberg Trading Solutions Offering BE AGILE >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ASSET AND INVESTMENT MANAGER (AIM) A Bloomberg Trading Solutions Offering BE AGILE EXPAND YOUR REACH Bloomberg Trading Solutions delivers

More information

SELL-SIDE EXECUTION & ORDER MANAGEMENT SOLUTIONS (SSEOMS) A Bloomberg Trading Solutions Offering BE AGILE

SELL-SIDE EXECUTION & ORDER MANAGEMENT SOLUTIONS (SSEOMS) A Bloomberg Trading Solutions Offering BE AGILE >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> SELL-SIDE EXECUTION & ORDER MANAGEMENT SOLUTIONS (SSEOMS) A Bloomberg Trading Solutions Offering BE AGILE EXPAND YOUR REACH Bloomberg

More information

ASSET AND INVESTMENT MANAGER (AIM) A Bloomberg Trading Solutions Offering AIM OPERATIONS AUTOMATE THE POST-TRADE PROCESS

ASSET AND INVESTMENT MANAGER (AIM) A Bloomberg Trading Solutions Offering AIM OPERATIONS AUTOMATE THE POST-TRADE PROCESS A Bloomberg Trading Solutions Offering ASSET AND INVESTMENT MANAGER (AIM) AIM OPERATIONS AUTOMATE THE POST-TRADE PROCESS Bloomberg AIM Operations Investment managers frequently operate dispa rate and costly

More information

ENTERPRISE SOLUTIONS PTIMIZE UTURE

ENTERPRISE SOLUTIONS PTIMIZE UTURE ENTERPRISE SOLUTIONS PTIMIZE HE UTURE CONTENTS 03 BLOOMBERG ENTERPRISE PRODUCTS & SOLUTIONS 04 WHY BLOOMBERG EPS NOW? 05 OPTIMIZE DESKTOP, DATA FEEDS AND DISTRIBUTION-RELATED COSTS 07 STRATEGIC WORKFLOW-BASED

More information

THE VALUE OF TRUSTED DATA. How Asset Managers Use Technology To Turn Data Into Actionable Insight

THE VALUE OF TRUSTED DATA. How Asset Managers Use Technology To Turn Data Into Actionable Insight THE VALUE OF TRUSTED DATA How Asset Managers Use Technology To Turn Data Into Actionable Insight THE VALUE OF TRUSTED DATA HOW ASSET MANAGERS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT Faced with

More information

SMARTER GOVERNANCE. Capitalizing on enterprise data gives firms a head start on building and sustaining stronger, more strategic governance

SMARTER GOVERNANCE. Capitalizing on enterprise data gives firms a head start on building and sustaining stronger, more strategic governance How financial services firms use technology to turn data into actionable insight SMARTER GOVERNANCE Capitalizing on enterprise data gives firms a head start on building and sustaining stronger, more strategic

More information

MORE EFFICIENT WORKFLOW

MORE EFFICIENT WORKFLOW HOW FINANCIAL SERVICES FIRMS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT MORE EFFICIENT WORKFLOW The desire to capitalize on data is leading firms to streamline workflow through expert collaboration

More information

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> HEDGE FUNDS. A Bloomberg Professional Service Offering NITIATIVE

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> HEDGE FUNDS. A Bloomberg Professional Service Offering NITIATIVE >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> HEDGE FUNDS A Bloomberg Professional Service Offering AKE HE NITIATIVE THE UNPARALLELED HEDGE FUND PLATFORM ////////////////////////////////////////

More information

The Evolution of Media Workflows

The Evolution of Media Workflows The Evolution of Media Workflows 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com,

More information

TRADING SOLUTIONS CONNECTIVITY & INTEGRATION (TSCI) A Bloomberg Trading Solutions Offering BE AGILE

TRADING SOLUTIONS CONNECTIVITY & INTEGRATION (TSCI) A Bloomberg Trading Solutions Offering BE AGILE >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> TRADING SOLUTIONS CONNECTIVITY & INTEGRATION (TSCI) A Bloomberg Trading Solutions Offering BE AGILE EXPAND YOUR REACH Bloomberg Trading

More information

GET MORE VALUE FROM DATA

GET MORE VALUE FROM DATA HOW FINANCIAL SERVICES FIRMS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT GET MORE VALUE FROM DATA Data capitalization helps firms extract more value from data and technology to gain five critical

More information

EE ALL IDES A GLOBAL NETWORK OF FINANCIAL INFORMATION, BUSINESS INTELLIGENCE, PEOPLE AND IDEAS

EE ALL IDES A GLOBAL NETWORK OF FINANCIAL INFORMATION, BUSINESS INTELLIGENCE, PEOPLE AND IDEAS >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> A GLOBAL NETWORK OF FINANCIAL INFORMATION, BUSINESS INTELLIGENCE, PEOPLE AND IDEAS EE ALL IDES WELCOME / / / / / / / / / / / / / / / / / / / / /

More information

EXECUTION MANAGEMENT SYSTEM

EXECUTION MANAGEMENT SYSTEM EXECUTION MANAGEMENT SYSTEM Bloomberg s Execution Management System, EMSX, is a sophisticated, broker-neutral trading tool that allows you to route seamlessly to nearly 2,000 broker-dealer destinations,

More information

GSX Monitor & Analyzer for Exchange On premise. Performance, Reporting, Management

GSX Monitor & Analyzer for Exchange On premise. Performance, Reporting, Management GSX Monitor & Analyzer for Exchange On premise Performance, Reporting, Management 1 About GSX Solutions Founded in 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland, China 600

More information

For over 25 years, OpenText Cloud Fax Services has. OpenText Cloud Fax Services. The Market Leader in Cloud Fax Technology

For over 25 years, OpenText Cloud Fax Services has. OpenText Cloud Fax Services. The Market Leader in Cloud Fax Technology OpenText Cloud Fax Services The Market Leader in Cloud Fax Technology For over 25 years, OpenText Cloud Fax Services has helped many companies go paperless with solutions that integrate with both email

More information

THE VALUE OF TRUSTED DATA

THE VALUE OF TRUSTED DATA How financial services firms use technology to turn data into actionable insight THE VALUE OF TRUSTED DATA Faced with greater challenges and an expectation to do more with less, buy-side firms are figuring

More information

AWS for M&E. Bhavik Vyas / bhavikv@amazon.com Amazon Web Services M&E Partner Eco-System Manager DEG Up in the Clouds May 2015

AWS for M&E. Bhavik Vyas / bhavikv@amazon.com Amazon Web Services M&E Partner Eco-System Manager DEG Up in the Clouds May 2015 AWS for M&E Bhavik Vyas / bhavikv@amazon.com Amazon Web Services M&E Partner Eco-System Manager DEG Up in the Clouds May 2015 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied,

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

MANAGE RISK WITH CONFIDENCE

MANAGE RISK WITH CONFIDENCE >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ENTERPRISE RISK Bloomberg Trading Solutions MANAGE RISK WITH CONFIDENCE >>>>> SHARPEN YOUR VIEW Managing risk is more critical than ever. And more

More information

EASIER COMPLIANCE. Regulation-ready data and advanced technology are helping firms get out from under an increasingly heavy regulatory burden

EASIER COMPLIANCE. Regulation-ready data and advanced technology are helping firms get out from under an increasingly heavy regulatory burden HOW FINANCIAL SERVICES FIRMS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT EASIER COMPLIANCE Regulation-ready data and advanced technology are helping firms get out from under an increasingly heavy

More information

How To Use Syncplicity Panorama On A Mobile Device

How To Use Syncplicity Panorama On A Mobile Device On the Radar: Syncplicity Panorama New mobile content access tools for modern business work styles Publication Date: 11 Mar 2015 Product code: IT0021-000064 Richard Edwards Summary Catalyst The typical

More information

Peer-to-peer data storage software Specification and source code

Peer-to-peer data storage software Specification and source code GLORIA is funded by the European Union 7th Framework Programme (FP7/2007-2013) under grant agreement n 283783 Specification and source code CODE: DEL-050 VERSION: 01 DATE: November 28 th, 2012 Authors:

More information

CA Message Manager. Benefits. Overview. CA Advantage

CA Message Manager. Benefits. Overview. CA Advantage PRODUCT BRIEF: CA MESSAGE MANAGER CA Message Manager THE PROACTIVE MANAGEMENT OF EMAIL AND INSTANT MESSAGES IS INTEGRAL TO THE OVERALL STRATEGY OF INFORMATION GOVERNANCE. THERE ARE MANY COMPLEX CHALLENGES

More information

Mastering entity data with the LEM

Mastering entity data with the LEM ENTERPRISE Solutions HOW FINANCIAL SERVICES FIRMS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT Mastering entity data with the LEM Thought leaders believe that building an LEM could help firms gain

More information

Solutions That Drive Decisions

Solutions That Drive Decisions PARTNER WITH A LEADER / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /

More information

Document control for sensitive company information and large complex projects.

Document control for sensitive company information and large complex projects. Data sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control for sensitive

More information

Simple Storage Service (S3)

Simple Storage Service (S3) Simple Storage Service (S3) Amazon S3 is storage for the Internet. It is designed to make web-scale computing easier for developers. Amazon S3 provides a simple web services interface that can be used

More information

Migrate from Exchange Public Folders to Business Productivity Online Standard Suite

Migrate from Exchange Public Folders to Business Productivity Online Standard Suite Migrate from Exchange Public Folders to Business Productivity Online Standard Suite White Paper Microsoft Corporation Published: July 2009 Information in this document, including URL and other Internet

More information

Enterprise Content Management Suite 11g

Enterprise Content Management Suite 11g Introducing Oracle Enterprise Content Management Suite 11g Roberto Nogueras g Senior Principal Instructor Oracle Ibérica Agenda Enterprise Content t Management (ECM)

More information

Configuring Email Notification for Business Glossary

Configuring Email Notification for Business Glossary Configuring Email Notification for Business Glossary 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording

More information

The evolution of data archiving

The evolution of data archiving The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured

More information

BLOOMBERG ENTERPRISE SOLUTIONS NSIDE DATA OVERNANCE T WFIC 2013

BLOOMBERG ENTERPRISE SOLUTIONS NSIDE DATA OVERNANCE T WFIC 2013 BLOOMBERG ENTERPRISE SOLUTIONS NSIDE DATA OVERNANCE T WFIC 2013 EVENT SUMMARY The World Financial Information Conference (WFIC) is the only global event that focuses on financial data sourcing, compliance

More information

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests. THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance

More information

Electronic Document and Record Compliance for the Life Sciences

Electronic Document and Record Compliance for the Life Sciences Electronic Document and Record Compliance for the Life Sciences Kiran Thakrar, SoluSoft Inc. SoluSoft, Inc. 300 Willow Street South North Andover, MA 01845 Website: www.solu-soft.com Email: solusoftsales@solu-soft.com

More information

Premise vs. Hosted Contact Center: Total Cost of Ownership Analysis

Premise vs. Hosted Contact Center: Total Cost of Ownership Analysis vs. Contact Center: Total Cost of Ownership Analysis A White Paper Sponsored By TABLE OF CONTENTS Introduction... 3 TCO Analysis... 4 Background... 4 Systems and Applications... 4 Implementation... 4 Maintenance

More information

CMT Self-Service Archive Migrator 1.2.5.3. Release Notes

CMT Self-Service Archive Migrator 1.2.5.3. Release Notes CMT Self-Service Archive Migrator 1.2.5.3 Release Notes September 2015 Table of Contents What s New in Version 1.2.5.3... 3 Release Notes 1.2.5.3... 3 Previous Updates... 3 About Binary Tree... 5 CMT SELF-SERVICE

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Network Security Essentials:

Network Security Essentials: Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

Enabling Cloud Architecture for Globally Distributed Applications

Enabling Cloud Architecture for Globally Distributed Applications The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.

More information

NetIQ Identity Manager

NetIQ Identity Manager NetIQ Identity Manager Security Guide December 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON

More information

The Data Center of the Future: Creating New Jobs in Europe

The Data Center of the Future: Creating New Jobs in Europe The Data Center of the Future: Creating New Jobs in Europe New data centers will create hundreds of thousands of new jobs for Europe by 2020. But there is work to be done to capture this opportunity fully.

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

OpenText Fax Servers and Microsoft Office 365

OpenText Fax Servers and Microsoft Office 365 OpenText Fax Servers and Microsoft Office 365 Integrating Fax with Office 365 E N T E R P R I S E I N F O R M A T I O N M A N A G E M E N T 1 Abstract Cloud-based information technologies promise a number

More information

Cloud Services Catalog with Epsilon

Cloud Services Catalog with Epsilon Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these

More information

Service Organization Controls 3 Report

Service Organization Controls 3 Report Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security and Availability For the Period April 1, 2015 September 30, 2015 Ernst & Young LLP Suite 1600 560 Mission

More information

Cash, risk, trade execution, lifecycle management and accounting in a fully integrated treasury workflow

Cash, risk, trade execution, lifecycle management and accounting in a fully integrated treasury workflow BLOOMBERG TREASURY & A Bloomberg Professional Service Offering Cash, risk, trade execution, lifecycle management and accounting in a fully integrated treasury workflow SEE THE COMPLETE PICTURE // 02 TRM

More information

GFI White Paper: GFI FaxMaker and HIPAA compliance

GFI White Paper: GFI FaxMaker and HIPAA compliance GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax

More information

CONSULTING SERVICES Business & technology consulting and managed services

CONSULTING SERVICES Business & technology consulting and managed services CONSULTING SERVICES Business & technology consulting and managed services SUNGARD CONSULTING SERVICES Leveraging global delivery to help drive operational efficiency while reducing IT cost Companies face

More information

Virtualization in Enterprise Environment. Krisztian Egi

Virtualization in Enterprise Environment. Krisztian Egi Virtualization in Enterprise Environment Krisztian Egi Session Outline Virtualization technology overview Challenges in enterprise environment Q & A 2 Virtualization technology overview What s virtualization

More information

Addressing Enterprise Needs with a Software Defined Network Platform

Addressing Enterprise Needs with a Software Defined Network Platform Addressing Enterprise Needs with a Software Defined Network Platform Dynamic, customizable approach meets customer demand Date: December 2015 Author: Mike Sapien Ovum view Enterprise customers have virtualized

More information

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.

More information

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> BLOOMBERG. A Bloomberg Professional Service Offering FOR EDUCATION

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> BLOOMBERG. A Bloomberg Professional Service Offering FOR EDUCATION >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> BLOOMBERG A Bloomberg Professional Service Offering FOR EDUCATION Bloomberg for Education brings the pace and challenge

More information

RightFax Internet Connector Frequently Asked Questions

RightFax Internet Connector Frequently Asked Questions RightFax Internet Connector Frequently Asked Questions What is the RightFax Internet Connector? The RightFax Internet Connector is a connector within RightFax 10.5 which provides an Internet connection

More information

Architecture for ACSI33 email security requirements. Implementation using janusseal and Clearswift MIMEsweeper

Architecture for ACSI33 email security requirements. Implementation using janusseal and Clearswift MIMEsweeper Implementation using janusseal and Clearswift MIMEsweeper Greg Colla July 2005 This paper outlines the changes in the security policy for email within Australian Government agencies, specifically the email

More information

On the Radar: Pulse Secure

On the Radar: Pulse Secure Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure

More information

GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options

GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options An overview of how GFI FAXmaker works, and how to deploy it This white paper describes the different ways in

More information

Service Organization Controls 3 Report

Service Organization Controls 3 Report Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security For the Period April 1, 2013 March 31, 2014 Ernst & Young LLP Suite 1600 560 Mission Street San Francisco,

More information

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see Deploy Inbox Rules below. Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them

More information

Kenneth Schwartz Nielsen Global Channel Manager

Kenneth Schwartz Nielsen Global Channel Manager Kenneth Schwartz Nielsen Global Channel Manager The Email-Manager philosophy Email is a dominant factor in the way businesses interact with their customers An email is normally perceived as a personal

More information

F root anycast: What, why and how. João Damas ISC

F root anycast: What, why and how. João Damas ISC F root anycast: What, why and how João Damas ISC Overview What is a root server? What is F? What is anycast? F root anycast. Why? How does ISC do it? What is f.root-servers.net? One the Internet s official

More information

On the Radar: Tamr. Applying machine learning to integrating Big Data. Publication Date: Sept. 2014 Product code: IT0014-002934.

On the Radar: Tamr. Applying machine learning to integrating Big Data. Publication Date: Sept. 2014 Product code: IT0014-002934. Applying machine learning to integrating Big Data Publication Date: Sept. 2014 Product code: IT0014-002934 Tony Baer Summary Catalyst Traditional data integration approaches may not scale for Big Data.

More information

Enterprise Vault 10 Feature Briefing

Enterprise Vault 10 Feature Briefing Enterprise Vault 10 Feature Briefing Nirvanix Cloud Storage This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the

More information

How Exclaimer Mail Archiver Works

How Exclaimer Mail Archiver Works How Exclaimer Mail Archiver Works www.exclaimer.com How Exclaimer Mail Archiver Works In this document, you ll learn how email is archived, stored and searched by Exclaimer Mail Archiver. We ll look at

More information

A Control Framework for e-invoicing

A Control Framework for e-invoicing A Control Framework for e-invoicing White Paper by TWIST Dematerialisation of paper invoices and purchase orders may unleash greater efficiencies and cost savings in the order to pay process. Led by Steven

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

AIIM & ASSUREON AN ASSUREON BRIEF

AIIM & ASSUREON AN ASSUREON BRIEF SOLUTIONBRIEF AIIM & ASSUREON AN ASSUREON BRIEF AIIM (Association for Information and Image Management) is the global community of information professionals. Their mission is to help organizations thrive

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

One trusted platform. All your project information.

One trusted platform. All your project information. One trusted platform. All your project information. The most trusted and widely used online collaboration platform for engineering and construction projects. New York City Hall Reconstruction New York

More information

Veritas Enterprise Vault.cloud for Microsoft Office 365

Veritas Enterprise Vault.cloud for Microsoft Office 365 TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

GILE BLOOMBERG TRADING SOLUTIONS

GILE BLOOMBERG TRADING SOLUTIONS > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > BLOOMBERG TRADING SOLUTIONS E GILE ABOUT BLOOMBERG Bloomberg is the world

More information

Financial services perspectives on the role and real impact of cloud

Financial services perspectives on the role and real impact of cloud Financial services perspectives on the role and real impact of cloud Executive Summary Ovum has recently concluded an independent and in-depth survey of 400 senior CIOs within financial services institutions

More information

Meeting Management Solution. Technology and Security Overview. 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702

Meeting Management Solution. Technology and Security Overview. 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702 Meeting Management Solution Technology and Security Overview 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702 Technology SaaS Software as a Service is offered as well. Client may

More information

Online Learning 2.0: The Technologies and Trends Revolutionizing the Classroom

Online Learning 2.0: The Technologies and Trends Revolutionizing the Classroom 50 Years of Growth, Innovation and Leadership Online Learning 2.0: The Technologies and Trends Revolutionizing the Classroom Sponsored by www.frost.com Frost & Sullivan Online Learning 2.0: The Technologies

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

Computer Organization

Computer Organization Computer Organization and Architecture Designing for Performance Ninth Edition William Stallings International Edition contributions by R. Mohan National Institute of Technology, Tiruchirappalli PEARSON

More information

Desktop Virtualization for the Banking Industry. Resilient Desktop Virtualization for Bank Branches. A Briefing Paper

Desktop Virtualization for the Banking Industry. Resilient Desktop Virtualization for Bank Branches. A Briefing Paper Desktop Virtualization for the Banking Industry Resilient Desktop Virtualization for Bank Branches A Briefing Paper September 2012 1 Contents Introduction VERDE Cloud Branch for Branch Office Management

More information

REGULATORY & ACCOUNTING PRODUCTS THE NEW FAIR VALUE ACCOUNTING STANDARDS AND DISCLOSURE REQUIREMENTS

REGULATORY & ACCOUNTING PRODUCTS THE NEW FAIR VALUE ACCOUNTING STANDARDS AND DISCLOSURE REQUIREMENTS REGULATORY & ACCOUNTING PRODUCTS THE NEW FAIR VALUE ACCOUNTING STANDARDS AND DISCLOSURE REQUIREMENTS THE NEW FAIR VALUE ACCOUNTING STANDARDS AND DISCLOSURE REQUIREMENTS 2 Specific Accounting Requirements

More information

Opportunities for Action. Shared Services in Operations and IT: Additional Complexity or Real Synergies?

Opportunities for Action. Shared Services in Operations and IT: Additional Complexity or Real Synergies? Opportunities for Action Shared Services in Operations and IT: Additional Complexity or Real Synergies? Shared Services in Operations and IT: Additional Complexity or Real Synergies? In recent years, many

More information

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL PAYMENT CARD INDUSTRY COMPLIANCE (PCI) Effective June 1, 2011 Page 1 of 6 (1) Definitions a. Payment Card Industry Data Security Standards (PCI-DSS): A set of standards established by the Payment Card

More information

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy

More information

Merkle Hash Trees for Distributed Audit Logs

Merkle Hash Trees for Distributed Audit Logs Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan Karthikeyan.Bhargavan@inria.fr April 7, 2015 Modern distributed systems spread their databases across a large number

More information

BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE

BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE 1 1EDI Source: BEYOND THE INITIAL CONNECTION WHAT THE CHANGING B2B EXCHANGE ENVIRONMENT MEANS TO YOU. For anyone in charge of automating

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

Security Considerations

Security Considerations Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver

More information

AVANTGARD RECEIVABLES GETPAID Enterprise Edition

AVANTGARD RECEIVABLES GETPAID Enterprise Edition AVANTGARD RECEIVABLES GETPAID Enterprise Edition Comprehensive Order-to-Cash Management AvantGard Receivables GETPAID drives automation, workflow and collaboration across the order-to-cash cycle, with

More information

EOH Cloud Services - EOH Cloud Backup - Server

EOH Cloud Services - EOH Cloud Backup - Server EOH Cloud Services - EOH Cloud Backup - Server EOH Cloud Backup - Server Page 1 EOH Cloud Backup - Server Reliable backup and recovery is critical in today s information-driven business. Besides the sheer

More information

Processo Civile Telematico (On-line Civil Trial)

Processo Civile Telematico (On-line Civil Trial) Processo Civile Telematico (On-line Civil Trial) By Giulio Borsari Italian Ministry of Justice IT Department via Crescenzio 7/c Rome Phone +39 051 4200210 (alt. +39 06 68620209) Fax +39 051 4200200 giulio.borsari@giustizia.it

More information

GSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014

GSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014 GSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014 1 About GSX Solutions! Founded 1996, Headquartered in Switzerland! Offices in USA, UK, France, Switzerland, China! Indirect

More information

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60 EE 7376: Introduction to Computer Networks Homework #3: Network Security, Email, Web, DNS, and Network Management Maximum Points: 60 1. Network security attacks that have to do with eavesdropping on, or

More information

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Define your goals, we ll do the rest

Define your goals, we ll do the rest SUB-FUNDS OF GOLDMAN SACHS FUNDS, SICAV Define your goals, we ll do the rest The GS Wealthbuilder Multi-Asset Portfolios can help you achieve your goals, whether you are looking to preserve, enhance or

More information