SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Avoiding Data Breach Disasters
                            in Automotive Supply Chains
                            Brian Jolley | Senior IT Specialist, Automotive   Akram J. Yunas | Program Manager AIAG
                            SEEBURGER North America
- 1 - © SEEBURGER AG 2011
Objectives

       Share insight into the pervasiveness of Data Breach.

       Discuss the financial liability of Data Breach.

       Identify Data Security related business pressures.

       Point out how Data Breach risk is being elevated.

       AIAG Perspective - Global Supply Chain Network Connectivity.

       Highlight Automotive data exchange trends.

       Get control with Managed File Transfer solutions.

       Identify industry leading solutions to mitigate risks and protect data.




- 2 - © SEEBURGER AG 2011
Pervasiveness of Data Breach




         “When asked what keeps them up at night, 24 percent of CIO’s polled said
         that their top worry is keeping their organizations’ sensitive data out of the
         wrong hands – the most cited response.”

         In a survey of 1400 Technology Executives in the US 21% estimate the
         average company experiences 3 - 5 breaches in a year.




                                         “The CIO Insomnia Project” | Robert Half Technologies 2011

- 3 - © SEEBURGER AG 2011
Financial Liability of Data Breach




         “Symantec Corp. (Nasdaq: SYMC) and the Ponemon Institute today released
         the findings of the 2010 Annual Study:
         U.S. Cost of a Data Breach, which reveals data breaches grew more costly
         for the fifth year in a row. The average organizational cost of a data breach
         increased to $7.2 million and cost companies an average of $214 per
         compromised record, markedly higher when compared to $204 in 2009.“




                                                        Symantec Corporation | March 8, 2011

- 4 - © SEEBURGER AG 2011
Polling Question 1

                            Which of the following best describes your
                            company policies regarding data security?
                            A. Policies are clearly defined and strictly
                               enforced.
                            B. General guidelines exist but are loosely
                               enforced.
                            C. Policies vary from department to
                               department and application to
                               application.
                            D. I am unaware of policies regarding the
                               transfer of unstructured files.




- 5 - © SEEBURGER AG 2011
Data Security Related Business Pressures

       Regulatory Compliance Mandates
       Federal and State regulations have been enacted mandating that businesses securely
       manage the transfer of electronic data.

       Profit Leakage from SLA violations
       Using unreliable FTP connections in critical business processes creates a huge
       business impact when there are problems/failures/interruptions: Orders cannot be
       booked, Delivery cannot be initiated, Delivery times with customers are not met (SLA
       violation) which will directly lead to lost profit, penalties, etc.

       Brand & Image Protection
       Data Breach has a negative impact on the Brand and Image of the company where it
       has occurred. Customers ask, “This company is unable to keep confidential data
       confidential, should we continue to work with them?”.




- 6 - © SEEBURGER AG 2011
Data Security Related Business Pressures

       FTP “Spaghetti”
       Uncontrolled deployment of FTP connections between internal applications as well as
       transfer beyond the firewall is a tangled mess. No control on process, no security, no
       audit-trail.

       Partner & Customer Privacy Requirements
       Even without a legal mandate, customers may impose their security rules on their
       suppliers and expect that data coming from them is treated in a secure/controlled way.




- 7 - © SEEBURGER AG 2011
Polling Question 2

                            How often are reports or database queries
                            downloaded from your ERP environment
                            for distribution to other applications or
                            individuals?
                            A. Frequently – multiple times daily
                            B. A few times per week
                            C. Monthly processes
                            D. Rarely




- 8 - © SEEBURGER AG 2011
Raising Data Breach Risk

       Despite the costly liabilities, risky files transfer practices abound in the savviest of
       enterprises - users often download free trials of FTP software.
           − Without the knowledge of IT.
           − Violating compliance standards.
           − Inadequate content validation before and after file transfer.
           − Unsecure transfer.

       Without a unified view of files being transferred companies have no chance to control
       or stop unauthorized behavior.

        Dealing with a myriad of file transfer modes make forensic investigation after an
       incident cumbersome and costly.

        Additionally there is a movement away from proprietary networks to the public internet
       for communications.



- 9 - © SEEBURGER AG 2011
Global Supply Chain Network Connectivity-
Industry Collaborations Enabling Standards
                      Based Interoperability
                                  October 11, 2011
              Akram Yunas, Program Manager, AIAG
                        Automotive News Webinar
Automotive Industry Action Group…

    Message From J. Scot Sharland, AIAG Executive Director :

    “ In the past 15 years…our world and industry have changed
    dramatically. A new generation of automotive professionals and AIAG
    volunteers are now being tasked with eliminating cost and complexity in
    an even more challenging and unpredictable business environment.
    To successfully drive continuous improvement in global data connectivity…
    it is imperative that we fundamentally understand and thoroughly vet new
    technology options…challenge the logic with respect to current
    standards & the need for higher levels of performance in the areas of
    speed, security and reliability and…lastly…reaffirm our commitment to
    work together for our mutual benefit.”
                                                                                11
Board of Directors




                     1
                     2
Global Alliances




                   1
                   3
Project Introduction

       Collaborative Supply Chain Data Network
              Connectivity-2011 Project
Business Drivers:
•   What low cost alternatives exist for data exchange for the electronically-
    enabled supply chain?
•   Are the low cost alternatives as reliable as current approaches given that
    these solutions often take advantage of the Public Internet?
•   Can appropriate levels of security for legal, contractual, regulatory and
    product tracking information be maintained using a low cost alternative?
•   Is the current performance and scalability of trading partner information
    exchanges adversely impacted if a low cost alternative is implemented?
•   Can Automotive OEMs and Suppliers develop a means to offer cost
    effective alternatives in the transmission of business and technical
    information?
•   Can a common approach be identified and be recommended for the
    Automotive Industry?
                                                                                 1
Vision


Supplier Connectivity Project Launched: March 2010

• Automotive Industry supported open standards for communication
  and transport of Electronic Data

• Evaluate and review similar solutions from other industries

• Categorize Communication methods by Supply Chain Management
  business processes and CAD/CAE information requirements
   – Type
   – Volume
   – Security
   – Global, regional or country specific
   – Cost value/ROI


                                                                   1
Project Introduction

     Collaborative Supply Chain Data Network
             Connectivity-2011 Project
126 Automotive Companies Provided Resources

Project Leads:
•   Betty Young, Chrysler Group LLC, Chair
•   Jerry Finefrock, ANX, Co Chair
•   Doug Halliday, Trubiquity, Chair Technical Requirements
•   Henriette Douglas, Covisint, Document Coordinator
•   Deb Jablonski, Midway Products, Document Coordinator

Corporate Liaisons:
• Marilyn Smith, General Motors, AIAG Loaned Executive
• Monique Oxender, Ford Motor Company, AIAG Loaned Executive
• Morris Brown, Chrysler Group LLC, AIAG Chrysler Loaned Executive

                                                                     1
AIAG Project- Key Accomplishments

• Captured Industry Requirements for Connectivity

• Mapped Internet Solutions to Private Network – Pros and Cons

• Evaluated IP based solutions and provided implementation case
  studies

• Evaluated State of Connectivity in non-automotive industries via
  implementation case studies

• Captured OEM existing Connectivity Landscape

• Captured OEM moving forward connectivity strategies

• Captured OEM to Supplier future recommendations

Resulting in a renewed game changing supply chain connectivity landscape…
                                                                            17
OEM LANDSCAPE – 2011


         EDI                     Ford                GM                 Chrysler              Honda



                          1.Public Internet   1.Public Internet   1.Public Internet    1.Public Internet
    Standard EDI          2.ANX               2.ANX               2.ANX                2.ANX
( Machine to Machine)



       Web EDI
(low volume or non EDI      Public Internet     Public Internet      Public Internet      Public Internet
       capable)


    Engineering                  Ford                GM                 Chrysler              Honda
      & CAD



On-line Engineering       1.Public Internet   1.Public Internet   1.Public Internet            N/A
 (“Direct Connect”)       2.ANX               2.ANX               2.Private Circuit


 CAD File Exchange                                                   Public Internet
                            Public Internet     Public Internet                           Public Internet
 (off-line engineering)                                              Private Circuit
Global Challenges, Complexities and Opportunities




       Europe             Asia        South America



                   Where Are We ?




                                                      1
European OEM Connectivity Landscape

2011
Status
          BMW       Daimler       Fiat       Ford        GM         Jaguar       PSA        Renault      VW          Volvo
                                                                                                        Group

Access   1. ENX     1. ENX      1. ENX     1. ENX      1. ENX      1. ENX      1. ENX       1. ENX     1. ENX        1. ENX

         2. ISDN    2. ISDN     2.TCP/IP   2.TCP/IP    2. VAN      2.TCP/IP    2. VAN       2. VAN     2. Public     2.Public
                                                          (GSX,                   (GXS)        (GXS)   Internet      Internet
         Planning   Planning               3. ISDN     Covisint)   3. ISDN
          TCP/IP     TCP/IP                                                                            3.ISDN        3.ISDN

Proto-   1. OFTP    1. OFTP     1. FTP     1. OFTP     1. FTP      1. OFTP     1. OFTP      1.OFTP     1. OFTP       1. OFTP
         2. OFTP2   2. Web      2. OFTP    2. FTP      2. OFTP     2. FTP      2. OFTP2     2. FTP     2. OFTP2      2. OFTP2
cols     3. SFTP                           3. Web                              (Engineer)   3. Web     (Logistics)   3. SFTP
                                                                               3. FTP                  3. Web        4. FTP
                     Planning               Planning                Planning
                      OFTP2                  OFTP2                   OFTP2



EDI         VDA        VDA       ODETTE       VDA       EDIFACT       VDA       EDIFACT      EDIFACT      VDA        EDIFACT
          ODETTE     ODETTE      EDIFACT    EDIFACT                 EDIFACT     ODETTE       ODETTE     EDIFACT      ODETTE
          EDIFACT    EDIFACT                ANSIX12                 ANSIX12                             ODETTE
          ANSIX12    ANSIX12




                                                                                                                       20
Next Steps at AIAG:


                          Validation Pilot
   “Internet Based Solution For Global Supply
              Chain Connectivity”

Industry Sponsors:
• AIAG, Automotive Industry Action Group (N.A)
• Odette, European Standards Organization (Europe)
• JAMA, Japan Auto Manufacturers Association (Asia)




                                                      21
Conclusion & Take Away….


• Private Networks provide a valuable service in todays connectivity
  domain. They are current connectivity performance standard.

• Private Internet (PI) has matured to a point where it now meets
  automotive industry requirements in terms of security, reliability, speed
  and bandwidth.

• North American OEMs have endorsed PI based solutions as an “approved
  option” in their supplier connectivity toolkit.

• European OEMs are fast transitioning to PI as their preferred and or
  required “connectivity medium”.


                                                                              2
Conclusion & Take Away….


• Asia Pacific is in the planning stages of migrating to Private Internet for
  supply chain connectivity.

• OFTP 2, an industry developed open standard, is fast becoming the
  leading protocol which is enabling internet based connectivity. OFTP 2 is
  compliant to global auto industry connectivity requirements .

• Connectivity solutions are not one size fits all. Selection criteria is driven
  by enterprise specific requirements.

• The AIAG working Group projects that Internet based connectivity
  solutions are expected to save the automotive supply chain millions in
  direct costs, within the next 5 years.

                                                                                   23
Automotive Data Exchange Trends

        Movement from proprietary VAN„s to public internet based communications.
            − Business Driver – Cost

        Larger files are being exchanged.
            − Business Driver – Heavy payload, sensitive data – CAD, CAE,
              High Res Pictures, Video, Graphics,Test Data

        Compliance Regulation
            − Business Driver – Government and Trading Partner rules of exchange

        Strong focus on supplier integration
            − Business Driver – High diversity in infrastructure raises questions regarding
              small tier supplier readiness to securely handle data.


                     Increased Data Security Focus

- 24 - © SEEBURGER AG 2011
Polling Question 3

                             At your company, what is the most
                             commonly used method for moving large
                             files from one system or individual to
                             another?
                             A. E-mail
                             B. Shared Folders on an internal network
                             C. Managed File Transfer solution
                             D. Individual FTP processes
                             E. USB thumb drive device




- 25 - © SEEBURGER AG 2011
Getting Control with Managed File Transfer

    Managed File Transfer helps reduce the risk of Data Breach

        Providing Visibility of people, processes and systems affecting and being affected by
        messages, files, and transactions.

        Delivering Monitoring which enables companies to proactively/reactively track these
        messages, files and transactions as they flow through systems and among people.

        Establishing Security to address risk, identity, access and authentication issues.

        Providing Adaptability to connect systems and infrastructures.

        Delivers Provisioning which enables an enterprise to rapidly onboard systems,
        companies, individuals, and manage all aspects of change.

        Enabling automated Workflow which allows a company to design, test, and execute
        processes associated with a file transfer.


                                               Source: Gartner – “Key Issues for Managed File Transfer”
- 26 - © SEEBURGER AG 2011
What is MFT?

    Simple definition from the analyst community:



                                     Secure Communications

                                             Check Point/
                              Compression                   Encryption
                                               Restart


                                              Workflow


                                            Management


                                Repository with Auditing and Logging




- 27 - © SEEBURGER AG 2011
Comprehensive MFT/B2B Solution compared to FTP
                                                                   Features                FTP   MFT
        MFT Provides a Secure, Cross Platform File     ASCII / EBCDIC / Image / Binary      X     X
        Transfer Solution                              file transfers

           − Encryption                                Send/Receive files                   X     X

              − Guaranteed Delivery                    Point-to-point application links           X

                                                       Just-in-time processing                    X
              − End to end process automation
                                                       Non invasive                         X     X
              − Empower operations staff
                                                       Guaranteed delivery                        X

                                                       Once and only once delivery                X
        MFT is a complete solution set designed to     Logical Naming and Addressing              X
        support all of your file transfer needs        Full Error Handling                        X

              − One Common User Interface              Internet enabled                     X     X

              − Central Management and Control         Advanced Triggering                        X

                                                       Advanced Security                          X
              − Global Visibility – Intra and
                                                       Advanced Monitoring                        X
                Extra enterprise
                                                       Broadcasting                               X
              − Automation for file transfer related
                                                       End-to-end managed file transfers          X
                activities and processes.
                                                       Full Automation                            X
- 28 - © SEEBURGER AG 2011
From File Transfer spaghetti architecture…

                                            ERP

                               CRM                     Finance




                             Platform 6                  EAI

                                          Platform 5




                                             Partner
- 29 - © SEEBURGER AG 2011
…to Managed File Transfer (MFT)

                                              ERP

                               CRM                       Finance




                                            MFT Suite
                             Plattform 6                  EAI

                                           Plattform 5




                                              Partner
- 30 - © SEEBURGER AG 2011
SEEBURGER Approach – SEE MFT

    Adopt an MFT strategy that allows IT teams to centrally manage, monitor,
    audit and report on file transfers across all critical applications.

           SEE MFT consolidates and centralizes file transfers to enable oversight,
           proper management, data protection, and policy enforcement.



           SEE MFT technology is engineered to handle the changes in file transfer over time
           including file sizes and volume and the need for increased levels of protection.



           SEE MFT is a versatile technology that can be deployed as a stand-alone software,
           integrated into other business applications or delivered as a hosted service.




- 31 - © SEEBURGER AG 2011
SEEBURGER Managed File Transfer Solution – Components
                   SEE LINK                          SEE Adapter                               SEE FX
        End point client to connect                                                    Human to Human, Human
                                               Application and protocol
        any system in the network,                                                     to System and Ad Hoc large
                                               specific interface to integrate
        any file type, any operating                                                   file exchange. Integrated
                                               applications via various
        system and any file size                                                       with popular Email system
                                               standard protocols (ex. OFTP2)
        supported                                                                      for ease of use

          Systems                                Application




            SEE               SEE               Application
            LINK              LINK              Adapter




                                                  Base Functions
          Governance              End-to-End-Visibility        Event and Activity             End Point Provisioning
          Policy Management       Checkpoint and Restart       Management                     Secure multiprotocol
          Multi-OS and A2A        Content filtering            Reporting and Administration   communication
          support                                              Management and                 Process control and
                                                               measurement                    automation

- 32 - © SEEBURGER AG 2011
SEEBURGER at a Glance


              Leading – Ranked as Global leader for Business Integration by independent
              analysts (i. e. Gartner and Forrester).

              International – 19 worldwide offices.

              Successful – 8,500 customers from all industries, Solutions for Automotive since
              inception for small, mid, and enterprise businesses.

              Comprehensive – Solutions for B2B, MFT, A2A, BPM and Community Management

              Independent – profitable since 1986

              Focused on industries & standards




- 33 - © SEEBURGER AG 2011
Our Core Business: Business Integration focused on connecting
   people, processes and technology

        Scalable solutions for any size of
        company
        Compatible with all ERP Systems
        Supports all B2B Standards
        100 % Trading Partner Integration
        Packaged MFT Solutions
        Industry Solutions
        Solution extensions for SAP
        (Auto, Utilities)
        On Premise/Managed Services/
        Cloud Offering



- 34 - © SEEBURGER AG 2011
Contact Details



           Brian Jolley             Akram Yunas, Program
           SEEBURGER                Manager, AIAG
           (734) 634 - 9031         (248) 358-9758
           b.jolley@seeburger.com   ayunas@aiag.org

                                    Supplier Connectivity Project
                                    Report Available:
                                    www.aiag.org




- 35 - © SEEBURGER AG 2011
© Copyright 2011 SEEBURGER AG. All rights reserved.
    The information in this document is proprietary to SEEBURGER. Neither any part of this document, nor the whole of it may be reproduced, copied, or transmitted in
    any form or purpose without the express prior written permission of SEEBURGER AG. Please note that this document is subject to change and may be changed by
    SEEBURGER at any time without notice. SEEBURGER„s Software product, the ones of its business partners may contain software components from third parties.
    SAP®, SAP® R/3®, SAP NetWeaver®, SAP® Exchange Infrastructure, ABAP™ are registered trade marks of the SAP AG or the SAP AG Deutschland (Germany),
    as well as Microsoft®, Windows®, Outlook®, NT®, Word®, EXCEL® and PowerPoint® are the ones of the Microsoft Corporation.
    Oracle is a registered Mark of the Oracle Corporation as well as UNIX and X/Open are registered Marks of the Open Group.
    HTML, XML, XHTML and W3C are Marks or registered Marks of W3C®, World Wide Web Consortium, Massachusetts Institute of Technology.
    Java is a trade Mark of Sun Microsystems, Inc. JBOSS is a registered Mark of the JBOSS Inc.
    4avis®, 4classification®, 4everything®, 4invoice®, 4invoice WEBflow®, 4order®, BIS:explore®, BIS:open®, BIS:open UX®, BIS:pdx®, BIS:plm®, FAX2XML®,
    Free Form Interpreter Kontierung Dialog Workflow®, FreeFormation®, FreiForm®, iMartOne®, Paper2ERP®, SEEBURGER®, SEEBURGER Business-Integration-
    Server®, SEEBURGER DocumentSuite®, SEEBURGER Logistic Solution Professional®, SEEBURGER Web Supplier Hub®, SEEBURGER Workflow®,
    SEEBURGER-CASEengine®, SEEBURGER-invoiceCONSOLE®, SEEBURGER-WEBflow®, SmartRetailConnector®, TRAVELinvoice®, WebVERA®, WinELKE®
    and other products or services of SEEBURGER which appear in this document as well as the according logos are marks or registered marks of the SEEBURGER AG
    in Germany and of other countries worldwide.
    All other products and services names are marks of the mentioned companies. All contents of the present document are noncommittal and have a mere information
    intention. Produkts and services may be country-specific designed.
    All other mentioned company and software designations are trade marks or unregistered trade marks of the respective organisations and are liable to the
    corresponding legal regulations.

    The information in this document is proprietary to SEEBURGER. No part of this document may be reproduced, copied, or transmitted in any form or purpose without
      the express prior written permission of SEEBURGER AG.
    This document is a preliminary version and not subject to your license agreement or any other agreement with SEEBURGER. This document contains only intended
      strategies, developments, and functionalities of the SEEBURGER product and is not intended to be binding upon SEEBURGER to any particular course of
      business, product strategy, and/or development. Please note that this document is subject to change and may be changed by SEEBURGER at any time without
      notice.
    SEEBURGER assumes no responsibility for errors or omissions in this document. SEEBURGER does not warrant the accuracy or completeness of the information,
      text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but
      not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement.
    SEEBURGER shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the
      use of these materials. This limitation shall not apply in cases of intent or gross negligence.
    The statutory liability for personal injury and defective products is not affected. SEEBURGER has no control over the information that you may access through the
      use of hot links contained in these materials and does not endorse your use of third-party web pages nor provide any warranty whatsoever relating to third-party
      web pages.


- 36 - © SEEBURGER AG 2011

Weitere ähnliche Inhalte

Was ist angesagt?

Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
German IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexityGerman IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexitySolarWinds
 
Panorama IT Introduction V1.2
Panorama IT Introduction V1.2Panorama IT Introduction V1.2
Panorama IT Introduction V1.2sabrodiesel2000
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
Closing Compliance Gap
Closing Compliance GapClosing Compliance Gap
Closing Compliance GapSEEBURGER
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsFindWhitePapers
 
A view from above the clouds (14 Oct 2011)
A view from above the clouds (14 Oct 2011)A view from above the clouds (14 Oct 2011)
A view from above the clouds (14 Oct 2011)Freeform Dynamics
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemIron Mountain
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know Sarah Crabb
 
CYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATIONCYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATION3.com
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s smatele41
 
Zastafy Risk Management
Zastafy Risk ManagementZastafy Risk Management
Zastafy Risk ManagementAman Bandvi
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Pivotal Points Capabilities
Pivotal Points CapabilitiesPivotal Points Capabilities
Pivotal Points Capabilitiesdokmaiw
 

Was ist angesagt? (20)

Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
German IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexityGerman IT Pros Survey: Network Complexity
German IT Pros Survey: Network Complexity
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
Panorama IT Introduction V1.2
Panorama IT Introduction V1.2Panorama IT Introduction V1.2
Panorama IT Introduction V1.2
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
Closing Compliance Gap
Closing Compliance GapClosing Compliance Gap
Closing Compliance Gap
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
A view from above the clouds (14 Oct 2011)
A view from above the clouds (14 Oct 2011)A view from above the clouds (14 Oct 2011)
A view from above the clouds (14 Oct 2011)
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
 
CYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATIONCYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATION
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s s
 
Zastafy Risk Management
Zastafy Risk ManagementZastafy Risk Management
Zastafy Risk Management
 
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
 
Pivotal Points Capabilities
Pivotal Points CapabilitiesPivotal Points Capabilities
Pivotal Points Capabilities
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
The Cellular Business Model 2010
The Cellular Business Model 2010The Cellular Business Model 2010
The Cellular Business Model 2010
 

Andere mochten auch

Sensor Ubiquity: Automotive-Quantified Self Integrated Sensor Applications
Sensor Ubiquity:  Automotive-Quantified Self  Integrated Sensor ApplicationsSensor Ubiquity:  Automotive-Quantified Self  Integrated Sensor Applications
Sensor Ubiquity: Automotive-Quantified Self Integrated Sensor ApplicationsMelanie Swan
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsAndreas Mai
 
Data Marketing Automotive Premium + Performance 27 10 09
Data Marketing   Automotive Premium + Performance 27 10 09Data Marketing   Automotive Premium + Performance 27 10 09
Data Marketing Automotive Premium + Performance 27 10 093d interactive
 
Automotive data integration: An example of a successful project structure
Automotive data integration: An example of a successful project structureAutomotive data integration: An example of a successful project structure
Automotive data integration: An example of a successful project structureETLSolutions
 
Digital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive IndustryDigital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive IndustryÇukur & Yılmaz Law Firm
 
Case study - Automotive DMS Connection to Salesforce.com
Case study - Automotive DMS Connection to Salesforce.comCase study - Automotive DMS Connection to Salesforce.com
Case study - Automotive DMS Connection to Salesforce.comRodney Birch
 
Digitalizing the Automotive Customer Relationship – Changing Dynamics in Cus...
Digitalizing the Automotive Customer Relationship – Changing Dynamics in Cus...Digitalizing the Automotive Customer Relationship – Changing Dynamics in Cus...
Digitalizing the Automotive Customer Relationship – Changing Dynamics in Cus...Jong-Seo Thomas Kim
 
Preventative Maintenance of Robots in Automotive Industry
Preventative Maintenance of Robots in Automotive IndustryPreventative Maintenance of Robots in Automotive Industry
Preventative Maintenance of Robots in Automotive IndustryDataWorks Summit/Hadoop Summit
 
Blockchain in Corporate Banking: What’s Up?
Blockchain in Corporate Banking: What’s Up?Blockchain in Corporate Banking: What’s Up?
Blockchain in Corporate Banking: What’s Up?mercatoradvisory
 
Telematics and Big Data: Next Generation Automotive Technology
Telematics and Big Data: Next Generation Automotive TechnologyTelematics and Big Data: Next Generation Automotive Technology
Telematics and Big Data: Next Generation Automotive TechnologyHCL Technologies
 
Predictive Analytics Project in Automotive Industry
Predictive Analytics Project in Automotive IndustryPredictive Analytics Project in Automotive Industry
Predictive Analytics Project in Automotive IndustryMatouš Havlena
 
Big Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businessesBig Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businessesGopalakrishna Palem
 
The Power of Data in the Automotive Industry (CDK User Event)
The Power of Data in the Automotive Industry (CDK User Event)The Power of Data in the Automotive Industry (CDK User Event)
The Power of Data in the Automotive Industry (CDK User Event)Eslam Ahmed Hussein
 
EclipseCon Europe 2012 - Big Models
EclipseCon Europe 2012 - Big ModelsEclipseCon Europe 2012 - Big Models
EclipseCon Europe 2012 - Big ModelsChristof Hammel
 
Automotive Industry Analysis of the Big 3
Automotive Industry Analysis of the Big 3Automotive Industry Analysis of the Big 3
Automotive Industry Analysis of the Big 3Matt Blair
 

Andere mochten auch (15)

Sensor Ubiquity: Automotive-Quantified Self Integrated Sensor Applications
Sensor Ubiquity:  Automotive-Quantified Self  Integrated Sensor ApplicationsSensor Ubiquity:  Automotive-Quantified Self  Integrated Sensor Applications
Sensor Ubiquity: Automotive-Quantified Self Integrated Sensor Applications
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco Systems
 
Data Marketing Automotive Premium + Performance 27 10 09
Data Marketing   Automotive Premium + Performance 27 10 09Data Marketing   Automotive Premium + Performance 27 10 09
Data Marketing Automotive Premium + Performance 27 10 09
 
Automotive data integration: An example of a successful project structure
Automotive data integration: An example of a successful project structureAutomotive data integration: An example of a successful project structure
Automotive data integration: An example of a successful project structure
 
Digital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive IndustryDigital Transformation and Data Protection in Automotive Industry
Digital Transformation and Data Protection in Automotive Industry
 
Case study - Automotive DMS Connection to Salesforce.com
Case study - Automotive DMS Connection to Salesforce.comCase study - Automotive DMS Connection to Salesforce.com
Case study - Automotive DMS Connection to Salesforce.com
 
Digitalizing the Automotive Customer Relationship – Changing Dynamics in Cus...
Digitalizing the Automotive Customer Relationship – Changing Dynamics in Cus...Digitalizing the Automotive Customer Relationship – Changing Dynamics in Cus...
Digitalizing the Automotive Customer Relationship – Changing Dynamics in Cus...
 
Preventative Maintenance of Robots in Automotive Industry
Preventative Maintenance of Robots in Automotive IndustryPreventative Maintenance of Robots in Automotive Industry
Preventative Maintenance of Robots in Automotive Industry
 
Blockchain in Corporate Banking: What’s Up?
Blockchain in Corporate Banking: What’s Up?Blockchain in Corporate Banking: What’s Up?
Blockchain in Corporate Banking: What’s Up?
 
Telematics and Big Data: Next Generation Automotive Technology
Telematics and Big Data: Next Generation Automotive TechnologyTelematics and Big Data: Next Generation Automotive Technology
Telematics and Big Data: Next Generation Automotive Technology
 
Predictive Analytics Project in Automotive Industry
Predictive Analytics Project in Automotive IndustryPredictive Analytics Project in Automotive Industry
Predictive Analytics Project in Automotive Industry
 
Big Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businessesBig Data Predictive Analytics for Retail businesses
Big Data Predictive Analytics for Retail businesses
 
The Power of Data in the Automotive Industry (CDK User Event)
The Power of Data in the Automotive Industry (CDK User Event)The Power of Data in the Automotive Industry (CDK User Event)
The Power of Data in the Automotive Industry (CDK User Event)
 
EclipseCon Europe 2012 - Big Models
EclipseCon Europe 2012 - Big ModelsEclipseCon Europe 2012 - Big Models
EclipseCon Europe 2012 - Big Models
 
Automotive Industry Analysis of the Big 3
Automotive Industry Analysis of the Big 3Automotive Industry Analysis of the Big 3
Automotive Industry Analysis of the Big 3
 

Ähnlich wie How to Avoid Data Breach Disasters in Automotive Supply Chains

The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging ThreatsLumension
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityMelissa Luongo
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM
 
How to Select a Next-Generation Packet Broker to Manage Digital Transformation
How to Select a Next-Generation Packet Broker to Manage Digital TransformationHow to Select a Next-Generation Packet Broker to Manage Digital Transformation
How to Select a Next-Generation Packet Broker to Manage Digital TransformationEnterprise Management Associates
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Executive Leaders Network
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014Mūniū Karanja
 
Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Safe Software
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Arrowinsight Quarterly: IT Trends
Arrowinsight Quarterly: IT TrendsArrowinsight Quarterly: IT Trends
Arrowinsight Quarterly: IT TrendsEliot Arnold
 
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsessCite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsessIntralinks
 
Virtualization: Improve Speed and Increase Quality
Virtualization: Improve Speed and Increase QualityVirtualization: Improve Speed and Increase Quality
Virtualization: Improve Speed and Increase QualityTechWell
 
The Necessity of Network Modernization (Federal) - Full White Paper
The Necessity of Network Modernization (Federal) - Full White Paper The Necessity of Network Modernization (Federal) - Full White Paper
The Necessity of Network Modernization (Federal) - Full White Paper Sean Leslie
 
Cloud computing insights from110 implementation projects
Cloud computing insights from110 implementation projectsCloud computing insights from110 implementation projects
Cloud computing insights from110 implementation projectsIBM India Smarter Computing
 
Top 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptxTop 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptxDianaRAICU2
 
Cloud service providers survey breaking through the cloud adoption barriers- ...
Cloud service providers survey breaking through the cloud adoption barriers- ...Cloud service providers survey breaking through the cloud adoption barriers- ...
Cloud service providers survey breaking through the cloud adoption barriers- ...Christophe Monnier
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps.com
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersBroadridge
 

Ähnlich wie How to Avoid Data Breach Disasters in Automotive Supply Chains (20)

The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
 
How to Select a Next-Generation Packet Broker to Manage Digital Transformation
How to Select a Next-Generation Packet Broker to Manage Digital TransformationHow to Select a Next-Generation Packet Broker to Manage Digital Transformation
How to Select a Next-Generation Packet Broker to Manage Digital Transformation
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014
 
Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Arrowinsight Quarterly: IT Trends
Arrowinsight Quarterly: IT TrendsArrowinsight Quarterly: IT Trends
Arrowinsight Quarterly: IT Trends
 
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsessCite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
Cite conference from_cockpit_to_office_park_share_paradigm_in_modern_buinsess
 
Virtualization: Improve Speed and Increase Quality
Virtualization: Improve Speed and Increase QualityVirtualization: Improve Speed and Increase Quality
Virtualization: Improve Speed and Increase Quality
 
The Necessity of Network Modernization (Federal) - Full White Paper
The Necessity of Network Modernization (Federal) - Full White Paper The Necessity of Network Modernization (Federal) - Full White Paper
The Necessity of Network Modernization (Federal) - Full White Paper
 
Cloud computing insights from110 implementation projects
Cloud computing insights from110 implementation projectsCloud computing insights from110 implementation projects
Cloud computing insights from110 implementation projects
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
Top 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptxTop 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptx
 
Cloud service providers survey breaking through the cloud adoption barriers- ...
Cloud service providers survey breaking through the cloud adoption barriers- ...Cloud service providers survey breaking through the cloud adoption barriers- ...
Cloud service providers survey breaking through the cloud adoption barriers- ...
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
 

Mehr von SEEBURGER

Best Practice Approaches for the Implementation of E-invoicing
Best Practice Approaches for the Implementation of E-invoicingBest Practice Approaches for the Implementation of E-invoicing
Best Practice Approaches for the Implementation of E-invoicingSEEBURGER
 
E-Invoicing: Invoice Provisioning with the Invoice Delivery Service
E-Invoicing: Invoice Provisioning with the Invoice Delivery ServiceE-Invoicing: Invoice Provisioning with the Invoice Delivery Service
E-Invoicing: Invoice Provisioning with the Invoice Delivery ServiceSEEBURGER
 
Global E-Invoicing
Global E-InvoicingGlobal E-Invoicing
Global E-InvoicingSEEBURGER
 
E-Invoicing: Automate Invoice Receipts
E-Invoicing: Automate Invoice ReceiptsE-Invoicing: Automate Invoice Receipts
E-Invoicing: Automate Invoice ReceiptsSEEBURGER
 
Importance of APIs and their Management in Digitalisation Initiatives
Importance of APIs and their Management in Digitalisation InitiativesImportance of APIs and their Management in Digitalisation Initiatives
Importance of APIs and their Management in Digitalisation InitiativesSEEBURGER
 
How does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateHow does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateSEEBURGER
 
Collaborative Product Development with 100% Partner Connection
Collaborative Product Development with 100% Partner ConnectionCollaborative Product Development with 100% Partner Connection
Collaborative Product Development with 100% Partner ConnectionSEEBURGER
 
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)SEEBURGER
 
Standard Solutions for Track and Trace of Electronic Documents
Standard Solutions for Track and Trace of Electronic DocumentsStandard Solutions for Track and Trace of Electronic Documents
Standard Solutions for Track and Trace of Electronic DocumentsSEEBURGER
 
Fifty Shades of Cloud - Overview, Best Practices, Examples
Fifty Shades of Cloud - Overview, Best Practices, ExamplesFifty Shades of Cloud - Overview, Best Practices, Examples
Fifty Shades of Cloud - Overview, Best Practices, ExamplesSEEBURGER
 
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform SEEBURGER
 
Kollaborative Produktentwicklung mit 100 % Partneranbindung
Kollaborative Produktentwicklung mit 100 % PartneranbindungKollaborative Produktentwicklung mit 100 % Partneranbindung
Kollaborative Produktentwicklung mit 100 % PartneranbindungSEEBURGER
 
Standardlösungen für Track & Trace von elektronischen Dokumenten
Standardlösungen für Track & Trace von elektronischen DokumentenStandardlösungen für Track & Trace von elektronischen Dokumenten
Standardlösungen für Track & Trace von elektronischen DokumentenSEEBURGER
 
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a ServiceiPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a ServiceSEEBURGER
 
Fifty shades of Cloud - Überblick, Best Practices, Beispiele
Fifty shades of Cloud - Überblick, Best Practices, BeispieleFifty shades of Cloud - Überblick, Best Practices, Beispiele
Fifty shades of Cloud - Überblick, Best Practices, BeispieleSEEBURGER
 
Best Practice-Ansätze bei der Umsetzung von E-Invoice.
Best Practice-Ansätze bei der Umsetzung von E-Invoice. Best Practice-Ansätze bei der Umsetzung von E-Invoice.
Best Practice-Ansätze bei der Umsetzung von E-Invoice. SEEBURGER
 
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service SEEBURGER
 
Globales E-Invoicing
Globales E-InvoicingGlobales E-Invoicing
Globales E-InvoicingSEEBURGER
 
E-Invocing: Rechnungseingang automatisieren
E-Invocing: Rechnungseingang automatisierenE-Invocing: Rechnungseingang automatisieren
E-Invocing: Rechnungseingang automatisierenSEEBURGER
 
Die Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
Die Bedeutung von APIs und deren Management bei DigitalisierungsinitiativenDie Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
Die Bedeutung von APIs und deren Management bei DigitalisierungsinitiativenSEEBURGER
 

Mehr von SEEBURGER (20)

Best Practice Approaches for the Implementation of E-invoicing
Best Practice Approaches for the Implementation of E-invoicingBest Practice Approaches for the Implementation of E-invoicing
Best Practice Approaches for the Implementation of E-invoicing
 
E-Invoicing: Invoice Provisioning with the Invoice Delivery Service
E-Invoicing: Invoice Provisioning with the Invoice Delivery ServiceE-Invoicing: Invoice Provisioning with the Invoice Delivery Service
E-Invoicing: Invoice Provisioning with the Invoice Delivery Service
 
Global E-Invoicing
Global E-InvoicingGlobal E-Invoicing
Global E-Invoicing
 
E-Invoicing: Automate Invoice Receipts
E-Invoicing: Automate Invoice ReceiptsE-Invoicing: Automate Invoice Receipts
E-Invoicing: Automate Invoice Receipts
 
Importance of APIs and their Management in Digitalisation Initiatives
Importance of APIs and their Management in Digitalisation InitiativesImportance of APIs and their Management in Digitalisation Initiatives
Importance of APIs and their Management in Digitalisation Initiatives
 
How does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateHow does a Modern Integration Platform Innovate
How does a Modern Integration Platform Innovate
 
Collaborative Product Development with 100% Partner Connection
Collaborative Product Development with 100% Partner ConnectionCollaborative Product Development with 100% Partner Connection
Collaborative Product Development with 100% Partner Connection
 
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
 
Standard Solutions for Track and Trace of Electronic Documents
Standard Solutions for Track and Trace of Electronic DocumentsStandard Solutions for Track and Trace of Electronic Documents
Standard Solutions for Track and Trace of Electronic Documents
 
Fifty Shades of Cloud - Overview, Best Practices, Examples
Fifty Shades of Cloud - Overview, Best Practices, ExamplesFifty Shades of Cloud - Overview, Best Practices, Examples
Fifty Shades of Cloud - Overview, Best Practices, Examples
 
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
 
Kollaborative Produktentwicklung mit 100 % Partneranbindung
Kollaborative Produktentwicklung mit 100 % PartneranbindungKollaborative Produktentwicklung mit 100 % Partneranbindung
Kollaborative Produktentwicklung mit 100 % Partneranbindung
 
Standardlösungen für Track & Trace von elektronischen Dokumenten
Standardlösungen für Track & Trace von elektronischen DokumentenStandardlösungen für Track & Trace von elektronischen Dokumenten
Standardlösungen für Track & Trace von elektronischen Dokumenten
 
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a ServiceiPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
 
Fifty shades of Cloud - Überblick, Best Practices, Beispiele
Fifty shades of Cloud - Überblick, Best Practices, BeispieleFifty shades of Cloud - Überblick, Best Practices, Beispiele
Fifty shades of Cloud - Überblick, Best Practices, Beispiele
 
Best Practice-Ansätze bei der Umsetzung von E-Invoice.
Best Practice-Ansätze bei der Umsetzung von E-Invoice. Best Practice-Ansätze bei der Umsetzung von E-Invoice.
Best Practice-Ansätze bei der Umsetzung von E-Invoice.
 
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
 
Globales E-Invoicing
Globales E-InvoicingGlobales E-Invoicing
Globales E-Invoicing
 
E-Invocing: Rechnungseingang automatisieren
E-Invocing: Rechnungseingang automatisierenE-Invocing: Rechnungseingang automatisieren
E-Invocing: Rechnungseingang automatisieren
 
Die Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
Die Bedeutung von APIs und deren Management bei DigitalisierungsinitiativenDie Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
Die Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
 

Kürzlich hochgeladen

Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 

Kürzlich hochgeladen (20)

Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 

How to Avoid Data Breach Disasters in Automotive Supply Chains

  • 1. Avoiding Data Breach Disasters in Automotive Supply Chains Brian Jolley | Senior IT Specialist, Automotive Akram J. Yunas | Program Manager AIAG SEEBURGER North America - 1 - © SEEBURGER AG 2011
  • 2. Objectives Share insight into the pervasiveness of Data Breach. Discuss the financial liability of Data Breach. Identify Data Security related business pressures. Point out how Data Breach risk is being elevated. AIAG Perspective - Global Supply Chain Network Connectivity. Highlight Automotive data exchange trends. Get control with Managed File Transfer solutions. Identify industry leading solutions to mitigate risks and protect data. - 2 - © SEEBURGER AG 2011
  • 3. Pervasiveness of Data Breach “When asked what keeps them up at night, 24 percent of CIO’s polled said that their top worry is keeping their organizations’ sensitive data out of the wrong hands – the most cited response.” In a survey of 1400 Technology Executives in the US 21% estimate the average company experiences 3 - 5 breaches in a year. “The CIO Insomnia Project” | Robert Half Technologies 2011 - 3 - © SEEBURGER AG 2011
  • 4. Financial Liability of Data Breach “Symantec Corp. (Nasdaq: SYMC) and the Ponemon Institute today released the findings of the 2010 Annual Study: U.S. Cost of a Data Breach, which reveals data breaches grew more costly for the fifth year in a row. The average organizational cost of a data breach increased to $7.2 million and cost companies an average of $214 per compromised record, markedly higher when compared to $204 in 2009.“ Symantec Corporation | March 8, 2011 - 4 - © SEEBURGER AG 2011
  • 5. Polling Question 1 Which of the following best describes your company policies regarding data security? A. Policies are clearly defined and strictly enforced. B. General guidelines exist but are loosely enforced. C. Policies vary from department to department and application to application. D. I am unaware of policies regarding the transfer of unstructured files. - 5 - © SEEBURGER AG 2011
  • 6. Data Security Related Business Pressures Regulatory Compliance Mandates Federal and State regulations have been enacted mandating that businesses securely manage the transfer of electronic data. Profit Leakage from SLA violations Using unreliable FTP connections in critical business processes creates a huge business impact when there are problems/failures/interruptions: Orders cannot be booked, Delivery cannot be initiated, Delivery times with customers are not met (SLA violation) which will directly lead to lost profit, penalties, etc. Brand & Image Protection Data Breach has a negative impact on the Brand and Image of the company where it has occurred. Customers ask, “This company is unable to keep confidential data confidential, should we continue to work with them?”. - 6 - © SEEBURGER AG 2011
  • 7. Data Security Related Business Pressures FTP “Spaghetti” Uncontrolled deployment of FTP connections between internal applications as well as transfer beyond the firewall is a tangled mess. No control on process, no security, no audit-trail. Partner & Customer Privacy Requirements Even without a legal mandate, customers may impose their security rules on their suppliers and expect that data coming from them is treated in a secure/controlled way. - 7 - © SEEBURGER AG 2011
  • 8. Polling Question 2 How often are reports or database queries downloaded from your ERP environment for distribution to other applications or individuals? A. Frequently – multiple times daily B. A few times per week C. Monthly processes D. Rarely - 8 - © SEEBURGER AG 2011
  • 9. Raising Data Breach Risk Despite the costly liabilities, risky files transfer practices abound in the savviest of enterprises - users often download free trials of FTP software. − Without the knowledge of IT. − Violating compliance standards. − Inadequate content validation before and after file transfer. − Unsecure transfer. Without a unified view of files being transferred companies have no chance to control or stop unauthorized behavior. Dealing with a myriad of file transfer modes make forensic investigation after an incident cumbersome and costly. Additionally there is a movement away from proprietary networks to the public internet for communications. - 9 - © SEEBURGER AG 2011
  • 10. Global Supply Chain Network Connectivity- Industry Collaborations Enabling Standards Based Interoperability October 11, 2011 Akram Yunas, Program Manager, AIAG Automotive News Webinar
  • 11. Automotive Industry Action Group… Message From J. Scot Sharland, AIAG Executive Director : “ In the past 15 years…our world and industry have changed dramatically. A new generation of automotive professionals and AIAG volunteers are now being tasked with eliminating cost and complexity in an even more challenging and unpredictable business environment. To successfully drive continuous improvement in global data connectivity… it is imperative that we fundamentally understand and thoroughly vet new technology options…challenge the logic with respect to current standards & the need for higher levels of performance in the areas of speed, security and reliability and…lastly…reaffirm our commitment to work together for our mutual benefit.” 11
  • 14. Project Introduction Collaborative Supply Chain Data Network Connectivity-2011 Project Business Drivers: • What low cost alternatives exist for data exchange for the electronically- enabled supply chain? • Are the low cost alternatives as reliable as current approaches given that these solutions often take advantage of the Public Internet? • Can appropriate levels of security for legal, contractual, regulatory and product tracking information be maintained using a low cost alternative? • Is the current performance and scalability of trading partner information exchanges adversely impacted if a low cost alternative is implemented? • Can Automotive OEMs and Suppliers develop a means to offer cost effective alternatives in the transmission of business and technical information? • Can a common approach be identified and be recommended for the Automotive Industry? 1
  • 15. Vision Supplier Connectivity Project Launched: March 2010 • Automotive Industry supported open standards for communication and transport of Electronic Data • Evaluate and review similar solutions from other industries • Categorize Communication methods by Supply Chain Management business processes and CAD/CAE information requirements – Type – Volume – Security – Global, regional or country specific – Cost value/ROI 1
  • 16. Project Introduction Collaborative Supply Chain Data Network Connectivity-2011 Project 126 Automotive Companies Provided Resources Project Leads: • Betty Young, Chrysler Group LLC, Chair • Jerry Finefrock, ANX, Co Chair • Doug Halliday, Trubiquity, Chair Technical Requirements • Henriette Douglas, Covisint, Document Coordinator • Deb Jablonski, Midway Products, Document Coordinator Corporate Liaisons: • Marilyn Smith, General Motors, AIAG Loaned Executive • Monique Oxender, Ford Motor Company, AIAG Loaned Executive • Morris Brown, Chrysler Group LLC, AIAG Chrysler Loaned Executive 1
  • 17. AIAG Project- Key Accomplishments • Captured Industry Requirements for Connectivity • Mapped Internet Solutions to Private Network – Pros and Cons • Evaluated IP based solutions and provided implementation case studies • Evaluated State of Connectivity in non-automotive industries via implementation case studies • Captured OEM existing Connectivity Landscape • Captured OEM moving forward connectivity strategies • Captured OEM to Supplier future recommendations Resulting in a renewed game changing supply chain connectivity landscape… 17
  • 18. OEM LANDSCAPE – 2011 EDI Ford GM Chrysler Honda 1.Public Internet 1.Public Internet 1.Public Internet 1.Public Internet Standard EDI 2.ANX 2.ANX 2.ANX 2.ANX ( Machine to Machine) Web EDI (low volume or non EDI Public Internet Public Internet Public Internet Public Internet capable) Engineering Ford GM Chrysler Honda & CAD On-line Engineering 1.Public Internet 1.Public Internet 1.Public Internet N/A (“Direct Connect”) 2.ANX 2.ANX 2.Private Circuit CAD File Exchange Public Internet Public Internet Public Internet Public Internet (off-line engineering) Private Circuit
  • 19. Global Challenges, Complexities and Opportunities Europe Asia South America Where Are We ? 1
  • 20. European OEM Connectivity Landscape 2011 Status BMW Daimler Fiat Ford GM Jaguar PSA Renault VW Volvo Group Access 1. ENX 1. ENX 1. ENX 1. ENX 1. ENX 1. ENX 1. ENX 1. ENX 1. ENX 1. ENX 2. ISDN 2. ISDN 2.TCP/IP 2.TCP/IP 2. VAN 2.TCP/IP 2. VAN 2. VAN 2. Public 2.Public (GSX, (GXS) (GXS) Internet Internet Planning Planning 3. ISDN Covisint) 3. ISDN TCP/IP TCP/IP 3.ISDN 3.ISDN Proto- 1. OFTP 1. OFTP 1. FTP 1. OFTP 1. FTP 1. OFTP 1. OFTP 1.OFTP 1. OFTP 1. OFTP 2. OFTP2 2. Web 2. OFTP 2. FTP 2. OFTP 2. FTP 2. OFTP2 2. FTP 2. OFTP2 2. OFTP2 cols 3. SFTP 3. Web (Engineer) 3. Web (Logistics) 3. SFTP 3. FTP 3. Web 4. FTP Planning Planning Planning OFTP2 OFTP2 OFTP2 EDI VDA VDA ODETTE VDA EDIFACT VDA EDIFACT EDIFACT VDA EDIFACT ODETTE ODETTE EDIFACT EDIFACT EDIFACT ODETTE ODETTE EDIFACT ODETTE EDIFACT EDIFACT ANSIX12 ANSIX12 ODETTE ANSIX12 ANSIX12 20
  • 21. Next Steps at AIAG: Validation Pilot “Internet Based Solution For Global Supply Chain Connectivity” Industry Sponsors: • AIAG, Automotive Industry Action Group (N.A) • Odette, European Standards Organization (Europe) • JAMA, Japan Auto Manufacturers Association (Asia) 21
  • 22. Conclusion & Take Away…. • Private Networks provide a valuable service in todays connectivity domain. They are current connectivity performance standard. • Private Internet (PI) has matured to a point where it now meets automotive industry requirements in terms of security, reliability, speed and bandwidth. • North American OEMs have endorsed PI based solutions as an “approved option” in their supplier connectivity toolkit. • European OEMs are fast transitioning to PI as their preferred and or required “connectivity medium”. 2
  • 23. Conclusion & Take Away…. • Asia Pacific is in the planning stages of migrating to Private Internet for supply chain connectivity. • OFTP 2, an industry developed open standard, is fast becoming the leading protocol which is enabling internet based connectivity. OFTP 2 is compliant to global auto industry connectivity requirements . • Connectivity solutions are not one size fits all. Selection criteria is driven by enterprise specific requirements. • The AIAG working Group projects that Internet based connectivity solutions are expected to save the automotive supply chain millions in direct costs, within the next 5 years. 23
  • 24. Automotive Data Exchange Trends Movement from proprietary VAN„s to public internet based communications. − Business Driver – Cost Larger files are being exchanged. − Business Driver – Heavy payload, sensitive data – CAD, CAE, High Res Pictures, Video, Graphics,Test Data Compliance Regulation − Business Driver – Government and Trading Partner rules of exchange Strong focus on supplier integration − Business Driver – High diversity in infrastructure raises questions regarding small tier supplier readiness to securely handle data. Increased Data Security Focus - 24 - © SEEBURGER AG 2011
  • 25. Polling Question 3 At your company, what is the most commonly used method for moving large files from one system or individual to another? A. E-mail B. Shared Folders on an internal network C. Managed File Transfer solution D. Individual FTP processes E. USB thumb drive device - 25 - © SEEBURGER AG 2011
  • 26. Getting Control with Managed File Transfer Managed File Transfer helps reduce the risk of Data Breach Providing Visibility of people, processes and systems affecting and being affected by messages, files, and transactions. Delivering Monitoring which enables companies to proactively/reactively track these messages, files and transactions as they flow through systems and among people. Establishing Security to address risk, identity, access and authentication issues. Providing Adaptability to connect systems and infrastructures. Delivers Provisioning which enables an enterprise to rapidly onboard systems, companies, individuals, and manage all aspects of change. Enabling automated Workflow which allows a company to design, test, and execute processes associated with a file transfer. Source: Gartner – “Key Issues for Managed File Transfer” - 26 - © SEEBURGER AG 2011
  • 27. What is MFT? Simple definition from the analyst community: Secure Communications Check Point/ Compression Encryption Restart Workflow Management Repository with Auditing and Logging - 27 - © SEEBURGER AG 2011
  • 28. Comprehensive MFT/B2B Solution compared to FTP Features FTP MFT MFT Provides a Secure, Cross Platform File ASCII / EBCDIC / Image / Binary X X Transfer Solution file transfers − Encryption Send/Receive files X X − Guaranteed Delivery Point-to-point application links X Just-in-time processing X − End to end process automation Non invasive X X − Empower operations staff Guaranteed delivery X Once and only once delivery X MFT is a complete solution set designed to Logical Naming and Addressing X support all of your file transfer needs Full Error Handling X − One Common User Interface Internet enabled X X − Central Management and Control Advanced Triggering X Advanced Security X − Global Visibility – Intra and Advanced Monitoring X Extra enterprise Broadcasting X − Automation for file transfer related End-to-end managed file transfers X activities and processes. Full Automation X - 28 - © SEEBURGER AG 2011
  • 29. From File Transfer spaghetti architecture… ERP CRM Finance Platform 6 EAI Platform 5 Partner - 29 - © SEEBURGER AG 2011
  • 30. …to Managed File Transfer (MFT) ERP CRM Finance MFT Suite Plattform 6 EAI Plattform 5 Partner - 30 - © SEEBURGER AG 2011
  • 31. SEEBURGER Approach – SEE MFT Adopt an MFT strategy that allows IT teams to centrally manage, monitor, audit and report on file transfers across all critical applications. SEE MFT consolidates and centralizes file transfers to enable oversight, proper management, data protection, and policy enforcement. SEE MFT technology is engineered to handle the changes in file transfer over time including file sizes and volume and the need for increased levels of protection. SEE MFT is a versatile technology that can be deployed as a stand-alone software, integrated into other business applications or delivered as a hosted service. - 31 - © SEEBURGER AG 2011
  • 32. SEEBURGER Managed File Transfer Solution – Components SEE LINK SEE Adapter SEE FX End point client to connect Human to Human, Human Application and protocol any system in the network, to System and Ad Hoc large specific interface to integrate any file type, any operating file exchange. Integrated applications via various system and any file size with popular Email system standard protocols (ex. OFTP2) supported for ease of use Systems Application SEE SEE Application LINK LINK Adapter Base Functions Governance End-to-End-Visibility Event and Activity End Point Provisioning Policy Management Checkpoint and Restart Management Secure multiprotocol Multi-OS and A2A Content filtering Reporting and Administration communication support Management and Process control and measurement automation - 32 - © SEEBURGER AG 2011
  • 33. SEEBURGER at a Glance Leading – Ranked as Global leader for Business Integration by independent analysts (i. e. Gartner and Forrester). International – 19 worldwide offices. Successful – 8,500 customers from all industries, Solutions for Automotive since inception for small, mid, and enterprise businesses. Comprehensive – Solutions for B2B, MFT, A2A, BPM and Community Management Independent – profitable since 1986 Focused on industries & standards - 33 - © SEEBURGER AG 2011
  • 34. Our Core Business: Business Integration focused on connecting people, processes and technology Scalable solutions for any size of company Compatible with all ERP Systems Supports all B2B Standards 100 % Trading Partner Integration Packaged MFT Solutions Industry Solutions Solution extensions for SAP (Auto, Utilities) On Premise/Managed Services/ Cloud Offering - 34 - © SEEBURGER AG 2011
  • 35. Contact Details Brian Jolley Akram Yunas, Program SEEBURGER Manager, AIAG (734) 634 - 9031 (248) 358-9758 b.jolley@seeburger.com ayunas@aiag.org Supplier Connectivity Project Report Available: www.aiag.org - 35 - © SEEBURGER AG 2011
  • 36. © Copyright 2011 SEEBURGER AG. All rights reserved. The information in this document is proprietary to SEEBURGER. Neither any part of this document, nor the whole of it may be reproduced, copied, or transmitted in any form or purpose without the express prior written permission of SEEBURGER AG. Please note that this document is subject to change and may be changed by SEEBURGER at any time without notice. SEEBURGER„s Software product, the ones of its business partners may contain software components from third parties. SAP®, SAP® R/3®, SAP NetWeaver®, SAP® Exchange Infrastructure, ABAP™ are registered trade marks of the SAP AG or the SAP AG Deutschland (Germany), as well as Microsoft®, Windows®, Outlook®, NT®, Word®, EXCEL® and PowerPoint® are the ones of the Microsoft Corporation. Oracle is a registered Mark of the Oracle Corporation as well as UNIX and X/Open are registered Marks of the Open Group. HTML, XML, XHTML and W3C are Marks or registered Marks of W3C®, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a trade Mark of Sun Microsystems, Inc. JBOSS is a registered Mark of the JBOSS Inc. 4avis®, 4classification®, 4everything®, 4invoice®, 4invoice WEBflow®, 4order®, BIS:explore®, BIS:open®, BIS:open UX®, BIS:pdx®, BIS:plm®, FAX2XML®, Free Form Interpreter Kontierung Dialog Workflow®, FreeFormation®, FreiForm®, iMartOne®, Paper2ERP®, SEEBURGER®, SEEBURGER Business-Integration- Server®, SEEBURGER DocumentSuite®, SEEBURGER Logistic Solution Professional®, SEEBURGER Web Supplier Hub®, SEEBURGER Workflow®, SEEBURGER-CASEengine®, SEEBURGER-invoiceCONSOLE®, SEEBURGER-WEBflow®, SmartRetailConnector®, TRAVELinvoice®, WebVERA®, WinELKE® and other products or services of SEEBURGER which appear in this document as well as the according logos are marks or registered marks of the SEEBURGER AG in Germany and of other countries worldwide. All other products and services names are marks of the mentioned companies. All contents of the present document are noncommittal and have a mere information intention. Produkts and services may be country-specific designed. All other mentioned company and software designations are trade marks or unregistered trade marks of the respective organisations and are liable to the corresponding legal regulations.  The information in this document is proprietary to SEEBURGER. No part of this document may be reproduced, copied, or transmitted in any form or purpose without the express prior written permission of SEEBURGER AG.  This document is a preliminary version and not subject to your license agreement or any other agreement with SEEBURGER. This document contains only intended strategies, developments, and functionalities of the SEEBURGER product and is not intended to be binding upon SEEBURGER to any particular course of business, product strategy, and/or development. Please note that this document is subject to change and may be changed by SEEBURGER at any time without notice.  SEEBURGER assumes no responsibility for errors or omissions in this document. SEEBURGER does not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement.  SEEBURGER shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation shall not apply in cases of intent or gross negligence.  The statutory liability for personal injury and defective products is not affected. SEEBURGER has no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third-party web pages nor provide any warranty whatsoever relating to third-party web pages. - 36 - © SEEBURGER AG 2011