UPLOAD

    13.5K

    Platform for security services

    Published: May 30, 2018

    P4SS (Platform For Security Services) is a PKI (Public Key Infrastructure) complaint enterprise solution An organization can benefit from using the platform in order to protect business data and business processes against internal and external threats such as identity thefts, malware, internal attacks.

    Comments

    Platform for security services

    • 1.  Platform For Security Services Platform For Security Services Innovative IT Solutions P4SS TM
    • 2. About Gobito About Gobito Mainly concentrating on secure IT solutions, our aim is to provide secure flexible IT solutions to Small, Medium and large enterprises to create smart ,secure and innovative IT Solutions. Our Current Product Portfolio includes P4SS Platform For Security Services, RIMM, Remote Infrastructure Monitoring and management, Data Leakage Prevention and Enterprise Document Management. Scorm Player(Scorm 1.2 2004 2.3.4. & Thin Can API) Gobito Learning Management System Today's presentation is based on P4SS what it can do and how your organisations can benefit from its features.
    • 3. What is P4SS? What is P4SS? P4SS (Platform For Security Services) is a PKI (Public Key Infrastructure) complaint enterprise solution An organization can benefit from using the platform in order to protect business data and business processes against internal and external threats such as identity thefts, malware, internal attacks
    • 4. Benefits of P4SS? Benefits of P4SS? The platform is suitable for B2B, B2C, B2E, C2B, C2C,M2M services and applications The platform is suitable for internal corporates The platform is clustered and load balanced capable to handle small, medium, or large enterprises A hierarchical organizational authorization schema enables an effective management of users. It makes the platform suitable for domestic or international enterprises A PKI compliant Enterprise Solution
    • 5. Properties of P4SS? Properties of P4SS? •Confidentiality •Non repudiation •Authorization •Integrity •Authentication •Provision of Audit trails •Management
    • 6. Benefits of P4SS? Benefits of P4SS? Protection of business data and processes at: •organizational perspective •user perspective Protection against internal, external threats, malicious attacks Examples: •Identity thefts, •Malware, •Internal attacks
    • 7. Usage of P4SS? Usage of P4SS? •Secure Business Data Exchange •Secure Business Data Sharing •Secure Chat System •Secure Conference Call System •Secure Backup •Secure Printing •Single Sign On •Secure Sign On •Secure remote identification
    • 8. Adopted Design Principles  Adopted Design Principles P4SS has been designed with the following objectives •Security layering, separated concept, Restricted •Pluggable architecture •Configurable, flexible and easy extensible architecture •Load balanced, and clustered
    • 9. Adopted Design Principles  Adopted Design Principles •Security layering •Separated concept •Restricted
    • 10. Adopted Design Principles  Adopted Design Principles Pluggable architecture •Easy to add new plug-ins, new services(OSGI Powered) •Secure Business Data Exchange Service is a plug-in •Proof of concept that P4SS works •Any new service, plug-ins can be developed and added to P4SS according to customers’ needs and requirements •Ready for java , .net and mobile with powerful apis.
    • 11. Adopted Design Principles  Adopted Design Principles Configurable, flexible and extensible architecture •Attribute base database structure oEasy to add new attributes, new queries, new features •LDAP or Third Party database Integration oEasy to integrate the system in to any database including LDAP •Option principle oEasy to add new options oExamples: confidentiality, non repudiation, high privacy, expire date •Configurability oEasy to add new features oExample: add or migrate to new authorization schema
    • 12. Adopted Design Principles  Adopted Design Principles Load balanced •A main node assigns a business logic node that is least busy. The main service node issues the authorization ticket, from which the details of the business logic node that has been assigned are obtained. Clustered •Availability based main service node selection. If a request is not processed successfully then another main service node is selected and consequently requested. In this way, P4SS can handle small, medium, and large enterprices
    • 13. Business Workflow Integration Business Workflow Integration Possibility to integrate incoming business data to workflow processes into: •SAP •Sage •Pegasus •IBM Jazz •HP PPM •Microsoft Dynamics •Easily integrate into other ERP, CMS, CRM, EDMS Systems.
    • 14. Key Manager Types Key Manager Types SOFTWARE VERSION: •Suitable for machines in which support for drivers is problematic or hardware integration might be complex •Suitable for applications in which users prefer not to install additional drivers
    • 15. Key Manager Types Key Manager Types USB SIGNING TOKEN •Higher level of security, cryptographic operations are executed on the token, malformed software cannot extract private key from the token
    • 16. Key Manager Types Key Manager Types SMART CARD •A compromise between USB signing token and software version, card reader required
    • 17. BASE ARCHITECTURE FORGOBITO DLP & Document Management “Data Leakage Prevention Platform”  BASE ARCHITECTURE FOR GOBITO DLP & Document Management “Data Leakage Prevention Platform” Gobito Data Leakage Prevention Platform Includes •Enterprise Learning Management System: (eLMS) •Meta Data Removal , MetaClean •Document conversion •SecureComms •Enterprise Search •Office Classification Plugins (OfCP)
    • 18. Certificates Certificates
    • 19. Contact Us Contact Us Gobito Enterprise Solutions (UK) Daresbury Science & Innovation Campus Keckwick Lane Daresbury, Cheshire. WA4 4FS T : (+44) 01925 607344 F : (+44) 01925 607349 Gobito Enterprise Solutions (TR) Yıldız Teknik Üniversitesi Davutpaşa Kampüsü Ar-ge Alanı Teknopark B1 Blok No:8 Esenler / Istanbul T : (+90) 0212 2634580 F : (+90) 0212 2634580