Revolvy Trivia Quizzes Revolvy Lists Revolvy Topics

Mobile secure gateway

Mobile secure gateway (MSG) is an industry term for the software or hardware appliance that provides secure communication between a mobile application and respective backend resources typically within a corporate network. It addresses challenges in the field of mobile security.

MSG is typically composed of two components - Client library and Gateway. The client is a library that is linked with the mobile application. It establishes secure connectivity to Gateway using cryptographic protocol typically SSL/TLS. This represents a secured channel used for communication between the mobile application and hosts. Gateway separates internal IT infrastructure from the Internet, allowing only an authorized client requests to reach a specific set of hosts inside restricted network.

Client library

The Client library is linked with the corresponding mobile application, and that provides secure access via the Gateway to the set of Hosts. The Client library exposes public API to the mobile application, mimicking platform default HTTP client library. The application uses this API to communicate with the desired hosts in a secure way.

Gateway

Gateway is a server or daemon typically installed onto physical or virtual appliance placed into DMZ. Gateway public interface is exposed to the Internet (or other untrusted network) and accepts TCP/IP connections from mobile applications. It operates on IPv4 and/or IPv6 networks. Incoming client connections typically use SSL/TLS to provide security for the network communication and a mutual trust of communicating peers. Communication protocol is typically based on HTTP.[1]

Host

Gateway forwards requests from connected apps to a collection of configured hosts. These are typically HTTP or HTTPS servers or services within an internal network. The response from a host is sent back to the respective mobile app.

References
  1. "Mobile Security". www.peerlyst.com. Retrieved 6 May 2016.
External links

Continue Reading...
Content from Wikipedia Licensed under CC-BY-SA.

Computer access control

topic

In computer security , general access control includes identification , authorization , authentication , access approval, and audit . A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access. Authentication and access control are often combined into a single operation, so that access is approved based on successful authentication, or based on an anonymous access token. Authentication methods and tokens include passwords , biometric scans, physical keys , electronic keys and devices, hidden paths, social barriers, and monitoring by humans and automated systems. In a capability-based model, holding an unforge-able reference or capability to an object provides access to the object (roughly analogous to how possession of one's house key grants one access to one's house); access is conveyed to another party by transmitting such a capab ...more...



Digital wallet

topic

A digital wallet refers to an electronic device that allows an individual to make electronic transactions. This can include purchasing items on-line with a computer or using a smartphone to purchase something at a store. An individual's bank account can also be linked to the digital wallet. They might also have their driver’s license, health card, loyalty card(s) and other ID documents stored on the phone. The credentials can be passed to a merchant’s terminal wirelessly via near field communication (NFC). Increasingly, digital wallets are being made not just for basic financial transactions but to also authenticate the holder's credentials. For example, a digital wallet could verify the age of the buyer to the store while purchasing alcohol. The system has already gained popularity in Japan, where digital wallets are known as "wallet mobiles". A cryptocurrency wallet is a digital wallet where private keys are stored for cryptocurrencies like bitcoin . Technology A digital wallet has both a software and info ...more...



Software security assurance

topic

Software security assurance is a process that helps design and implement software that protects the data and resources contained in and controlled by that software. Software is itself a resource and thus must be afforded appropriate security . Since the number of threats specifically targeting software is increasing, the security of our software that we produce or procure must be assured. "Dependence on information technology makes software assurance a key element of business continuity, national security, and homeland security." What is software security assurance? Software Security Assurance (SSA) is the process of ensuring that software is designed to operate at a level of security that is consistent with the potential harm that could result from the loss, inaccuracy, alteration, unavailability, or misuse of the data and resources that it uses, controls, and protects. The software security assurance process begins by identifying and categorizing the information that is to be contained in, or used by, the s ...more...



Data-centric security

topic

Data-centric security is an approach to security that emphasizes the security of the data itself rather than the security of networks, servers, or applications. Data-centric security is evolving rapidly as enterprises increasingly rely on digital information to run their business and big data projects become mainstream. Data-centric security also allows organizations to overcome the disconnect between IT security technology and the objectives of business strategy by relating security services directly to the data they implicitly protect; a relationship that is often obscured by the presentation of security as an end in itself. Key concepts Common processes in a data-centric security model include: Discover: the ability to know what data is stored where including sensitive information. Manage: the ability to define access policies that will determine if certain data is accessible, editable, or blocked from specific users, or locations. Protect: the ability to defend against data loss or unauthorized use o ...more...



SIM Application Toolkit

topic

SIM Application Toolkit (commonly referred to as STK) is a standard of the GSM system which enables the Subscriber Identity Module (SIM) to initiate actions which can be used for various value-added services . The SIM Application Toolkit consists of a set of commands programmed into the SIM which define how the SIM should interact directly with the outside world and initiates commands independently of the handset and the network. This enables the SIM to build up an interactive exchange between a network application and the end user and access, or control access to, the network. The SIM also gives commands to the handset such as displaying menus and/or asking for user input. STK has been deployed by many mobile operators around the world for many applications, often where a menu-based approach is required, such as Mobile Banking and content browsing. Designed as a single application environment, the STK can be started during the initial power up of the SIM card and is especially suited to low level applic ...more...



CS Networks

topic

CS Network Solutions Limited is a privately-held mobile communications company specialising in charging and messaging systems for mobile network operators (MNOs), mobile virtual network operators (MVNOs) and mobile virtual network enablers (MVNEs). The company’s headquarters is in London , United Kingdom . Offering CS Networks is a supplier of telecommunication products for value-added services to mobile operators. The company sells technology for convergent online charging , voice, data and content charging, M2M charging, Advanced Short Message Service Center (SMSC), Short Message Service (SMS), Multimedia Messaging Service (MMS), A2P Messaging, Voucher Management, SMS routing and firewall, USSD gateway and solutions for Policy and Charging Rules Function (PCRF), Mobile Security and Policy Management. History CS Networks was founded in Belgrade , Serbia , in 2001, to supply mobile operators . The company was initially founded as a consultancy company but shifted focus in the late 2000s to products. The firs ...more...



Man-in-the-middle attack

topic

In cryptography and computer security , a man-in-the-middle attack ( MITM ) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the-middle attacks is active eavesdropping , in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within reception range of an unencrypted wireless access point (Wi-Fi) could insert himself as a man-in-the-middle. As an attack that aims at circumventing mutual authentication , or lack thereof, a man-in-the-middle attack can succeed only when the attacker can imperso ...more...



Contactless payment

topic

EMV contactless symbol used on compatible payment terminals A contactless enabled American Express charge card issued in the UK Contactless payment systems are credit cards and debit cards , key fobs , smart cards , or other devices, including smartphones and other mobile devices , that use radio-frequency identification (RFID) or near field communication (NFC, e.g. Samsung Pay , Apple Pay , Android Pay , Fitbit Pay, or any bank mobile application that support Contactless) for making secure payments. The embedded chip and antenna enable consumers to wave their card, fob, or handheld device over a reader at the point of sale terminal. Contactless payments are made in close physical proximity, unlike mobile payments which use broad-area cellular or WiFi networks and do not involve close physical proximity. Some suppliers claim that transactions can be almost twice as fast as a conventional cash , credit, or debit card purchase. Because no signature or PIN verification is typically required, contactless purchase ...more...



XenMobile

topic

XenMobile is software that provides mobile device management (MDM) and mobile application management (MAM). It is developed by Citrix Systems . Product overview XenMobile is enterprise mobility management software developed by Citrix. The product allows businesses to manage employee mobile devices and mobile applications . The software’s aim is to increase productivity by allowing employees to securely work on both enterprise-owned and personal mobile devices and apps. A suite of enterprise applications come with the software called the Worx mobile application suite. It comprises email client WorxMail, that can be used to manage employee email , contacts and calendar , a browser called WorxWeb, WorxDesktop, which allows access to remote files and applications, WorxNotes, an app for creating documents for notes, and WorxEdit for editing documents. In May 2015, the company introduced time management tool WorxTasks to the app suite. Users can download additional applications through WorxStore. The applic ...more...



DataCash

topic

DataCash is a payment processing company which offers a global gateway to secure multi-channel payment processing, fraud and risk management services. Founded in 1996, it has been a division of MasterCard since 2010. History Founded by entrepreneurs Gavin Breeze and Dave MacRae in 1996 as a payment gateway intended to serve the needs of the emerging e-commerce channel, a series of early mergers and acquisitions led to expansion within specific markets (notably, the airline and travel sectors) as well as coverage of the cardholder present environment. In 2009, the company significantly expanded its fraud offering with the acquisition of The 3rd Man, a fraud and risk management technology company. It has been a wholly owned subsidiary of MasterCard since 2010, when it was purchased for £333 million. In early 2012, DataCash was announced as a white-label partner to supply Elavon 's global e-commerce gateway in Europe , as part of the American bank 's expansion plans. Similar announcements followed in 2013, m ...more...



E-commerce payment system

topic

An e-commerce payment system facilitates the acceptance of electronic payment for online transactions . Also known as a sample of Electronic Data Interchange (EDI), e-commerce payment systems have become increasingly popular due to the widespread use of the internet-based shopping and banking. Over the years, credit cards have become one of the most common forms of payment for e-commerce transactions. In North America almost 90% of online retail transactions were made with this payment type. Turban et al. goes on to explain that it would be difficult for an online retailer to operate without supporting credit and debit cards due to their widespread use. Increased security measures include use of the card verification number (CVN) which detects fraud by comparing the verification number printed on the signature strip on the back of the card with the information on file with the cardholder's issuing bank. Also online merchants have to comply with stringent rules stipulated by the credit and debit card issuers ...more...



Mimecast

topic

Mimecast is an international company specializing in cloud-based email management for Microsoft Exchange and Microsoft Office 365 , including security, archiving , and continuity services to protect business mail. History Mimecast was founded in 2003 by Peter Bauer and Neil Murray. It has offices in London , Boston , Chicago , San Francisco , Dallas , Cape Town , Johannesburg and Melbourne . In January, 2010, the company raised $21 million in Series B financing from Index Ventures and Dawn Capital . By June 2015 Mimecast had 14,500 customers, up from 7,000 in 2007. In September 2012 Mimecast raised $62m in a Series C funding round, led by New York-based Insight Venture Partners . Founding Mimecast co-founder and CEO, Peter Bauer, previously founded FAB Technology in the mid-nineties and sold it to Idion. Earlier, Peter trained as a Microsoft systems engineer and worked with corporate messaging systems. Mimecast co-founder and CTO is Neil Murray, previously CTO at Global Technology Services and founder of Pr ...more...



Comparison of antivirus software

topic

This is a non-exhaustive list of notable antivirus and Internet Security software , in the form of comparison tables, according to their platform (e.g. desktop and server , mobile , etc.) and their operating systems (e.g. Windows , OS X , Linux , Solaris , Android , iOS , Ubuntu Touch , Windows Phone , etc.). Legend The term "on-demand scan" refers to the possibility of performing a manual scan (by the user) on the entire computer/device, while "on-access scan" refers to the ability of a product to automatically scan every file at its creation and/or subsequent modification. The term " CloudAV " refers to the ability of a product to automatically perform scans on the cloud. The term " Email Security " refers to the protection of emails from viruses and malware , while " AntiSpam " refers to the protection from spam , scam and phishing attacks. The term " Web protection " usually includes protection from: infected and malicious URLs , phishing websites, online identity protection (privacy) and online banking p ...more...



Cyberwarfare

topic

Cyberwarfare involves the battlespace use and targeting of computers and networks in warfare . It involves both offensive and defensive operations pertaining to the threat of cyberattacks , espionage and sabotage. There has been controversy over whether such operations can duly be called "war". Nevertheless, nations have been developing their capabilities and engaged in cyberwarfare either as an aggressor, defendant, or both. Definition Cyberwarfare has been defined as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption", but other definitions also include non-state actors, such as terrorist groups, companies, political or ideological extremist groups, hacktivists , and transnational criminal organizations. Some governments have made it an integral part of their overall military strategy, with some having invested heavily in cyberwarfare capability. Cyberwarfare is essentially a formalized version of penetration testing in which ...more...

Member feedback about Cyberwarfare:

Folder: Cyber

(jadair01)



Networking hardware

topic

Networking hardware , also known as network equipment or computer networking devices , are physical devices which are required for communication and interaction between devices on a computer network . Specifically, they mediate data in a computer network. Units which are the last receiver or generate data are called hosts or data terminal equipment . Range Networking devices may include gateways , routers , network bridges , modems , wireless access points , networking cables , line drivers , switches , hubs , and repeaters ; and may also include hybrid network devices such as multilayer switches , protocol converters , bridge routers , proxy servers , firewalls , network address translators , multiplexers , network interface controllers , wireless network interface controllers , ISDN terminal adapters and other related hardware. The most common kind of networking hardware today is a copper-based Ethernet adapter which is a standard inclusion on most modern computer systems. Wireless networking has become in ...more...



Mobile IP

topic

Mobile IP (or MIP ) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. Mobile IP for IPv4 is described in IETF RFC 5944 , and extensions are defined in IETF RFC 4721 . Mobile IPv6 , the IP mobility implementation for the next generation of the Internet Protocol , IPv6 , is described in RFC 6275 . Introduction The Mobile IP allows for location-independent routing of IP datagrams on the Internet. Each mobile node is identified by its home address disregarding its current location in the Internet. While away from its home network, a mobile node is associated with a care-of address which identifies its current location and its home address is associated with the local endpoint of a tunnel to its home agent. Mobile IP specifies how a mobile node registers with its home agent and how the home agent routes datagrams to the mobile node through the tunnel. Applications ...more...



IP Multimedia Subsystem

topic

The IP Multimedia Subsystem or IP Multimedia Core Network Subsystem ( IMS ) is an architectural framework for delivering IP multimedia services. Historically, mobile phones have provided voice call services over a circuit-switched -style network, rather than strictly over an IP packet-switched network. Alternative methods of delivering voice ( VoIP ) or other multimedia services have become available on smartphones, but they have not become standardized across the industry. IMS is an architectural framework to provide such standardization. IMS was originally designed by the wireless standards body 3rd Generation Partnership Project (3GPP), as a part of the vision for evolving mobile networks beyond GSM . Its original formulation (3GPP Rel-5) represented an approach to deliver " Internet services" over GPRS . This vision was later updated by 3GPP, 3GPP2 and ETSI TISPAN by requiring support of networks other than GPRS , such as Wireless LAN , CDMA2000 and fixed lines. To ease the integration with the Internet , ...more...



Gh-link

topic

gh-link is GhIPSS’ interbank switching and processing system which interconnects financial institutions and systems of third party payment service providers. gh-link is a local electronic payment ecosystem based on the domestic ATM card with channels such as ATM, POS and Web. gh-link provides the following services: Services Interbank Switching and Processing: As a result of its position as the central switch interconnecting financial institutions and third parties, gh-link switches, clears all interbank transactions and facilitates net settlement in Bank of Ghana RTGS Payment Gateway Services: gh-link provides web acquiring services to local online merchants for domestic ATM cards. This package comes with a merchant plug-in for enforcement of 3D secure authentication. 3D Secure Services: gh-link provides gh-secure- its 3D secure platform- for all domestic card issuers as a second layer cardholder security for online payments. Instant Interbank Transfer Service – GhIPSS INSTANT PAY (GIP): GhIPSS Instant Pay ( ...more...



Oracle Secure Global Desktop

topic

Oracle Secure Global Desktop (SGD) software provides secure access to both published applications and published desktops running on Microsoft Windows , Unix , mainframe and System i systems via a variety of clients ranging from fat PCs to thin clients such as Sun Rays . History In 1993 the Santa Cruz Operation (SCO, later Tarantella, Inc. ) acquired IXI Limited , a software company in Cambridge , UK , best known for its X.desktop product. In 1994 it then bought Visionware , of Leeds , UK, developers of XVision . In 1995 the development teams from IXI and Visionware were combined to form IXI Visionware , later the Client Integration Division of SCO. A development team within this division began work in 1996 on a project codenamed Tarantella. The goal of this project was "any application, any client, anywhere": access to applications of any type (hosted on back-end servers ) from any client device that supported a Java -enabled web browser . The project codename stuck: it became the final product name. The firs ...more...



Ingenico

topic

The Ingenico iPP350 is a common card terminal in the United Kingdom Ingenico is a France-based company , whose business is to provide the technology involved in secure electronic transactions . Its traditional business is based on the manufacture of point of sale (POS) payment terminals , but it also includes complete payment software and related services, also software for merchants. History Ingenico Elite 510 terminal and separate keypad Ingenico was founded in France by Jean-Jacques Poutrel and Michel Malhouitre in 1980. It is headquartered in Paris . In 2008, after the merging with SAGEM Sécurité, Ingenico closed its R&D centre in Barcelona . This centre developed Ingenico's family of EFTPOS (Electronic funds transfer at point of sale). In 2008, Ingenico acquired 55% of Fujian Landi, a Chinese EFTPOS vendor. In 2009, Ingenico partnered with its two largest competitors, Hypercom and VeriFone , to found the Secure POS Vendor Alliance, a non-profit organization whose goal is to increase awareness of and ...more...



Gemalto

topic

Gemalto is an international digital security company providing software applications , secure personal devices such as smart cards and tokens, and managed services . It is the world’s largest manufacturer of SIM cards . The company was founded in June 2006 when two companies, Axalto and Gemplus International , merged. Gemalto's 2015 revenue was €3.122 billion. It is listed on both Euronext Amsterdam and Euronext Paris under the symbol GTO . Gemalto N.V. is a public company incorporated in the Netherlands . It is headquartered in Amsterdam , and has subsidiaries and group companies in several countries. Globally, Gemalto has 15,000 employees, 118 offices; 17 production sites, 45 personalization centers, and 27 R&D centers in 49 countries. History In June 2006, smart card providers Gemplus and Axalto merged to become Gemalto (Portmanteau of the original company names.) Axalto was a Schlumberger IPO spin-off in 2004. Between the merger and 2015, Gemalto completed a series of acquisitions: the Leigh Mardon’ ...more...



List of Bluetooth profiles

topic

Bluetooth logo In order to use Bluetooth technology, a device must be compatible with the subset of Bluetooth profiles (often called services) necessary to use the desired services. A Bluetooth profile is a specification regarding an aspect of Bluetooth -based wireless communication between devices. It resides on top of the Bluetooth Core Specification and (optionally) additional protocols. While the profile may use certain features of the core specification, specific versions of profiles are rarely tied to specific versions of the core specification. For example, there are Hands-Free Profile (HFP) 1.5 implementations using both Bluetooth 2.0 and Bluetooth 1.2 core specifications. The way a device uses Bluetooth technology depends on its profile capabilities. The profiles provide standards which manufacturers follow to allow devices to use Bluetooth in the intended manner. For the Bluetooth low energy stack according to Bluetooth 4.0 a special set of profiles applies. At a minimum, each profile specification ...more...



Vulnerability scanner

topic

A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weak points or poorly constructed parts. It's utilized for the identification and detection of vulnerabilities relating to mis-configured assets or flawed software that resides on a network-based asset such as a firewall, router, web server, application server, etc. Modern vulnerability scanners will allow for both authenticated and unauthenticated scans to occur. Authenticated Scans allow for the scanner to directly access network based assets using remote administrative protocols such as secure shell (SSH) or remote desktop protocol (RDP) and authenticate using provided system credentials. This allows the vulnerability scanner to access low-level data, such as specific services and configuration details of the host operating system. It’s then able to provide detailed and accurate information about the operating sy ...more...



File Transfer Protocol

topic

The File Transfer Protocol ( FTP ) is the standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS ( FTPS ). SSH File Transfer Protocol (SFTP) is sometimes also used instead; it is technologically different. The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces , and are still shipped with most Windows , Unix , and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops , servers, mobil ...more...



AudioCodes

topic

AudioCodes Ltd. designs, develops and sells advanced Voice-over-IP ( VoIP ) and converged VoIP and Data networking products and applications to service providers and enterprises. AudioCodes is a VoIP technology market leader focused on converged VoIP & data communications and its products are deployed globally in broadband, mobile, cable, and enterprise networks. AudioCodes' international headquarters and R&D facilities are located in Israel, with branch offices in United States, France, Germany, The Netherlands , Italy, UK, China, India, Japan, Korea , Singapore , Argentina , Brazil , and Mexico. Company history AudioCodes was established in 1993 in Israel and founded by Mr. Shabtai Adlersberg and Mr. Leon Bialik. Adlersberg had previously co-founded DSP Group , a semiconductor company, in 1987. AudioCodes was established based on its low-bit-rate speech compression technology. The company's first achievement was when its speech compression algorithm was selected by the International Telecommunic ...more...



Vocality International

topic

Vocality International is a British organisation, manufacturing telecommunications products for the defence and satellite communications markets. Vocality International was founded in 1999, following the merger of Vocality Ltd and Sosoft Ltd. The company specialises in the fields of voice, secure voice and networking into the field over satellite communications links, with technical capabilities that address the issues associated with this field of communications . Vocality's products include multiplexers , routers and secure voice gateway devices, as well as a range of satellite simulators. In 2009, Vocality International launched its BASICS range, designed for integration into tactical communications systems for mobile, field deployed satcom operators. A central activity since 2012 has been in the field of RoIP Radio over IP connectivity. In 2015, Vocality launched a new software platform for satellite optimization including SCPS acceleration support, called OPUS Enhance. Vocality operates a subsidiary offi ...more...



List of computer security certifications

topic

Credentialing is the process of establishing the qualifications of licensed professionals, organizational members or organizations, and assessing their background and legitimacy. In the Computer security or Information security fields, there are a number of tracks a professional can take to demonstrate qualifications. Four sources categorizing these, and many other credentials, licenses and certifications, are: 1. Schools and Universities; 2. "Vendor" sponsored credentials (e.g. Microsoft, Cisco); 3. Association and Organization sponsored credentials; 4. Governmental (or quasi governmental) body sponsored licenses, certifications and credentials. Quality and acceptance vary worldwide for IT security credentials, from well-known and high quality examples like a master's degree in the field from an accredited school, CISSP, and Microsoft certification, to a controversial list of many dozens of lesser known credentials and organizations. In addition to certification obtained by taking courses and/or passing exam ...more...



Ripple (payment protocol)

topic

Ripple is a real-time gross settlement system (RTGS), currency exchange and remittance network by Ripple . Also called the Ripple Transaction Protocol ( RTXP ) or Ripple protocol, it is built upon a distributed open source Internet protocol , consensus ledger and native cryptocurrency called XRP (ripples). Released in 2012, Ripple purports to enable "secure, instantly and nearly free global financial transactions of any size with no chargebacks." It supports tokens representing fiat currency , cryptocurrency, commodity or any other unit of value such as frequent flier miles or mobile minutes. At its core, Ripple is based around a shared, public database or ledger, which uses a consensus process that allows for payments, exchanges and remittance in a distributed process. The network can operate without the Ripple company. Among validators are companies, internet service providers, and the Massachusetts Institute of Technology . Used by companies such as UniCredit , UBS and Santander , Ripple has been incre ...more...



NAT traversal

topic

Network address translator traversal is a computer networking technique of establishing and maintaining Internet protocol connections across gateways that implement network address translation (NAT). NAT breaks the principle of end-to-end connectivity originally envisioned in the design of the Internet . NAT traversal techniques are required for many network applications, such as peer-to-peer file sharing and Voice over IP . Network address translation NAT devices are commonly used to alleviate IPv4 address exhaustion by allowing the use of private IP addresses on private networks behind routers with a single public IP address facing the public Internet . The internal network devices communicate with hosts on the external network by changing the source address of outgoing requests to that of the NAT device and relaying replies back to the originating device. This leaves the internal network ill-suited for hosting servers, as the NAT device has no automatic method of determining the internal host for which inc ...more...



VoIP VPN

topic

A VoIP VPN combines voice over IP and virtual private network technologies to offer a method for delivering secure voice . Because VoIP transmits digitized voice as a stream of data, the VoIP VPN solution accomplishes voice encryption quite simply, applying standard data-encryption mechanisms inherently available in the collection of protocols used to implement a VPN . The VoIP gateway -router first converts the analog voice signal to digital form, encapsulates the digitized voice within IP packets, then encrypts the digitized voice using IPsec , and finally routes the encrypted voice packets securely through a VPN tunnel. At the remote site, another VoIP router decodes the voice and converts the digital voice to an analog signal for delivery to the phone. A VoIP VPN can also run within an IP in IP tunnel or using SSL-based OpenVPN . There is no encryption in former case, but traffic overhead is significantly lower in comparison with IPsec tunnel. The advantage of OpenVPN tunneling is that it can run on a dyn ...more...



Zenprise

topic

Zenprise provides Mobile Device Management (MDM) solutions to enterprises. The company's solutions are available in both on-premises and cloud-based ( SaaS ) versions. Zenprise MobileManager and Zencloud allow companies and government agencies to manage and secure mobile devices, including iOS , Android , BlackBerry , Windows Mobile , and Symbian . History Zenprise was founded in 2003 by Waheed Qureshi. Initially the company developed remote support and diagnostics software to help companies manage large-scale BlackBerry deployments. As the market evolved to enterprises supporting a diverse set of smartphones and tablets, Zenprise shifted its product development efforts to support the major mobile platforms, including iPhone and iPad , Android, BlackBerry, Symbian, and Windows Mobile. In 2010, Zenprise acquired French Mobile Device Management vendor, Sparus Software, and integrated Sparus’s software into its core product offering. In July 2011, Zenprise launched Zencloud, the cloud version of its Mobile Dev ...more...



Mobile payments in India

topic

Mobile payments is a mode of payment using mobile phones . Instead of using methods like cash, cheque, and credit card, a customer can use a mobile phone to transfer money or to pay for goods and services. A customer can transfer money or pay for goods and services by sending an SMS , using a Java application over GPRS , a WAP service, over IVR or other mobile communication technologies. In India, this service is bank -led. Customers wishing to avail themselves of this service will have to register with banks which provide this service. Currently, this service is being offered by several major banks and is expected to grow further. Mobile Payment Forum of India (MPFI) is the umbrella organisation which is responsible for deploying mobile payments in India. Background India has a vast non-banking population, most of whom reside in the rural areas. The traditional banking industry can not cater to the needs of India's large rural populace. Setting up a conventional bank branch in a rural area would require c ...more...



Ibibo

topic

ibibo Group is an online travel organization founded in January 2007 by Ashish Kashyap. The company is a subsidiary of Naspers , which owns an 80% stake in Ibibo Group. In February, Naspers announced plans to increase its stake in Ibibo Group to 90% by investing additional $250 million in the company. The group owns the B2C online travel aggregator Goibibo, and online bus ticketing platform Redbus.in, and has a 51% stake in the B2B travel website travelboutiqueonline.com. The company also owns a minority stake in Naspers' payment gateway business PayU Global. In 2013, ibibo Group was named one of the top five most trusted e-commerce brands in India in The Brand Trust Report India Study – 2013. History Ibibo started as a social networking service in 2007, and later changed to become an e-commerce and travel organization. In 2009 Goibibo.com was launched. Acquisition and Investments Goibibo.com Goibibo was launched in 2009 and is part of ibibo Group. Goibibo is India’s largest hotels aggregator and also one ...more...



Multipath routing

topic

Multipath routing is the routing technique of using multiple alternative paths through a network, which can yield a variety of benefits such as fault tolerance , increased bandwidth , or improved security . The multiple paths computed might be overlapped, edge-disjointed or node-disjointed with each other. Extensive research has been done on multipath routing techniques, but multipath routing is not yet widely deployed in practice. Multipath routing in wireless networks To improve performance or fault tolerance : CMR (Concurrent Multipath Routing) is often taken to mean simultaneous management and utilization of multiple available paths for the transmission of streams of data emanating from an application or multiple applications. In this form, each stream is assigned a separate path, uniquely to the extent supported by the number of paths available. If there are more streams than available paths, some streams will share paths. This provides better utilization of available bandwidth by creating multiple activ ...more...



Coins.ph

topic

Coins.ph is a financial services platform founded in 2014 by Silicon Valley entrepreneurs Ron Hose and Runar Petursson in Metro Manila, Philippines [1] As a service running on blockchain technology, Coins.ph uses digital currency as a low cost gateway to banking, extending the reach of financial institutions beyond their existing branch infrastructure to the 300+ million who are unbanked in the Philippines and the rest of Southeast Asia. In October 2016 , Coins.ph secured a $5 mln dollar Series A investment from early-stage investors including Quona Capital, Kickstart Ventures, Ideaspace Foundation and Digital Currency Group. In May 2017, Coins.ph raised $5 million in series A extension led by Naspers Ventures. Services Coins.ph provides person-to-person wallet transfers, bill payments, mobile top-ups, online shopping, and remittance services. Its cash delivery network covers tens of thousands of banks, pawnshops, payment outlets, and door-to-door delivery across the region. References "Could the Philippine ...more...



HOB GmbH & Co KG

topic

HOB GmbH & Co. KG is part of the Brandstätter Group , which also owns Playmobil and other companies. HOB GmbH & Co. KG was founded in 1964 as an electronics concern, by Horst Brandstätter . The name HOB is an acronym formed from his name. HOB began developing software and terminals for IBM Mainframe computers in 1981. In 1983, HOB brought the world's first multi-session terminal for Mainframes onto the market, the HOB 78E terminal. Among the company’s major customers were MAN, Munich, the OFD Koblenz (Oberfinanzdirektion = Superior Finance Directorate: the central instance for all financial matters of the German state Rhineland-Westphalia), the automakers BMW and Audi, and the German mail-order giant Quelle. Up until 2001, the company produced hard- and software mainly for IBM Mainframes. With the advent of PC’s, terminal hardware sales dropped and, in 2001, HOB discontinued production of the multi-session terminals. Since then, HOB produces pure software solutions providing secure remote connectiv ...more...



List of SIP software

topic

This list of SIP software documents notable software applications which use Session Initiation Protocol (SIP) as a voice over IP (VoIP) protocol. Servers Free and open-source license Asterisk Cipango SipServlets 1.1 application server FreeSWITCH FreePBX GNU SIP Witch Issabel , fork of Elastix Kamailio , formerly OpenSER Mobicents Platform (JSLEE[2] 1.0 compliant and SIP Servlets 1.1 compliant application server) Mysipswitch OpenSIPS , fork of OpenSER SailFin SIP Express Router (SER) Enterprise Communications System sipXecs Yate YXA , based on Erlang Proprietary license 3Com VCX IP telephony module: back-to-back user agent SIP PBX 3CX Phone System , for Windows, Debian 8 GNU/Linux Aastra 5000, 800, MX-ONE Alcatel-Lucent 5060 IP Call server Aricent SIP UA stack, B2BUA, proxy, VoLTE/RCS Client AskoziaPBX Avaya Application Server 5300 (AS5300), JITC certified ASSIP VoIP Bicom Systems IP PBX for telecoms Brekeke SIP Server , SIP proxy, SIP registrar, SIP NAT, TCP/UDP Cisco SIP Proxy Server, Cisco unified border el ...more...



SIP URI scheme

topic

The SIP URI scheme is a Uniform Resource Identifier (URI) scheme for the Session Initiation Protocol (SIP) multimedia communications protocol. A SIP address is a URI that addresses a specific telephone extension on a voice over IP system. Such a number could be a private branch exchange or an E.164 telephone number dialled through a specific gateway. The scheme was defined in RFC 3261 . Operation A SIP address is written in user@domain.tld format in a similar fashion to an email address . An address like: instructs a SIP client to make a (usually UDP ) connection to voip-provider.example.net:5060 (which may be a gateway) and ask to be connected to the destination user at 1-999-123-4567. The gateway may require the user REGISTER using SIP before placing this call. The default Internet port address for SIP is 5060 unless explicitly specified in the URI. As a SIP address is text, much like an e-mail address, it may contain non-numeric characters. As the client may be a SIP phone or other device with just a numer ...more...



Proxy server

topic

Communication between two computers (shown in grey) connected through a third computer (shown in red) acting as a proxy. Bob does not know to whom the information is going, which is why proxies can be used to protect privacy. In computer networks , a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems. Today, most proxies are web proxies , facilitating access to content on the World Wide Web , providing anonymity and may be used to bypass IP address blocking . Types of proxy servers A proxy server may reside on the user's local computer, or at various points between the user's computer ...more...



Cyberstrategy 3.0

topic

Cyberstrategy 3.0 is the United States information warfare strategy against cyberwarfare . This strategy uses deterrence based on making infrastructure robust and redundant enough to survive any Internet cyber attack. References Washington Post: Pentagon's cybersecurity plans have a Cold War chill Cyberstrategy 3.0 is the United States information warfare strategy against cyberwarfare . This strategy uses deterrence based on making infrastructure robust and redundant enough to survive any Internet cyber attack. References Washington Post: Pentagon's cybersecurity plans have a Cold War chill ...more...



Belgacom ICS

topic

BICS (previously known as Belgacom ICS or Belgacom International Carrier Services ) operates in the telecommunication industry as a subsidiary of Proximus Group (parent group) , and provides wholesale carrier services to wireline and wireless operators, and service providers globally. The company was founded in 1997 and is headquartered in Brussels, Belgium with sales offices and Service Operation Centers worldwide including Dubai, Singapore, Bern, San Francisco and New York. BICS provides voice, connectivity, messaging, roaming and mobile financial services to over 1,000 fixed and wireless carriers and service providers, including more than 400 mobile operators. In 2012 BICS processed 28 billion international minutes and generated revenues for 1,65 Billion Euro. History 1997, Belgacom created its business unit Belgacom ICS (International Carrier Services). Later, in the early years 2000, the Belgacom Group deliberately separated the financial reporting of its International Carrier Services to increase financ ...more...



Session Initiation Protocol

topic

The Session Initiation Protocol ( SIP ) is a communications protocol for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, as well as in instant messaging over Internet Protocol (IP) networks. The protocol defines the specific format of messages exchanged and the sequence of communications for cooperation of the participants. SIP is a text-based protocol, incorporating many elements of the Hypertext Transfer Protocol (HTTP) and the Simple Mail Transfer Protocol (SMTP). A call established with SIP may consist of multiple media streams , but no separate streams are required for applications, such as text messaging , that exchange data as payload in the SIP message. SIP works in conjunction with several other protocols that specify and carry the session media. Media type and parameter negotiation and media setup is performed with the Session Description Protocol (SDP), which is carried as payload in SIP m ...more...



Ensygnia

topic

Ensygnia is a UK-based technology company. The company specialises in delivering a good customer experience combined with invisible security. They aggregate across identity management , mobile payments and cyber security acting as an interaction gateway. Ensygnia's primary product is Onescan, a transaction and identity management platform. History Ensygnia operations began in 2012. In 2013 the company secured $3.3 million in seed funding and successfully applied for and received two UK patents. Ensygnia was also one of 17 start-ups accepted into the London-based Telefonica funded Wayra Academy for the year 2013. At the end of 2013, Ensygnia acquired Mustard Digital and its retail site Snaptaps. In 2014, Ensygnia won 'Best Software Solution' at the Mobile Industry Awards, reached the final on the Innotribe start-up challenge and became a start-up in residence at BBC labs. Horizon 2020 is an EU initiative that funds high-potential innovation through a dedicated SME instrument. In 2015, Ensygnia were one of ...more...



Systancia

topic

Systancia is a French software company that develops software for desktop and application virtualisation, cloud computing and remote access security solutions . The company was founded in 1998 and is located in Sausheim , France . Systancia acquired IPdiva at the end of 2013, that provides security solutions. Recently, the French Deposits and Consignments Fund (now known as BPI) added finance into Systancia’s capital with the already present A Plus, enabling accelerated conditions for its international development. History Systancia' s earliest developments date back to 1998 with a view to creating new types of low-cost, multi-processor computers ( Intel ) providing administration for the remote execution of user applications on the most available servers and desktops thereby making redundant resources available to companies for the execution of their usual applications. Systancia entered Deloitte's 2010 Technology Fast 500 EMEA list, a ranking of the 500 fastest growing technology companies in EMEA, ranked ...more...



VoIP phone

topic

Flip VoIP phone A VoIP phone or IP phone uses voice over IP technologies for placing and transmitting telephone calls over an IP network, such as the Internet , instead of the traditional public switched telephone network (PSTN). Digital IP-based telephone service uses control protocols such as the Session Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP) or various other proprietary protocols . Types VoIP phones can be simple software-based softphones or purpose-built hardware devices that appear much like an ordinary telephone or a cordless phone . Traditional PSTN phones are used as VoIP phones with analog telephone adapters (ATA). A VoIP phone or application may have many features an analog phone doesn't support, such as e-mail-like IDs for contacts that may be easier to remember than names or phone numbers, or easy sharing of contact lists among multiple accounts. Generally the features of VoIP phones follow those of Skype and other PC-based phone services, which have richer feature sets b ...more...



VocaLink

topic

Vocalink is a payment systems company headquartered in the United Kingdom , created in 2007 from the merger between Voca and LINK . It designs, builds and operates the UK payments infrastructure, which underpins the provision of the Bacs payment system, the Direct Debit system, the UK ATM LINK switching platform covering 65,000 ATM’s and the UK Faster Payments systems. Vocalink processes over 90% of UK salaries, more than 70% of household bills and 98% of state benefits. In 2013 the company processed over 10.5 billion UK payments with a value of over £5 trillion. In July 2016 MasterCard purchased a 92% stake in the company, with the remainder to be held by UK banks for a period of three years. Background In 1968, the Joint Stock Banks Clearing Committee chaired by Dennis Gladwell, set-up the Inter-Bank Computer Bureau to modernise the existing paper-based standing order system. Secure electronic funds transfer between banks was introduced from later that year, significantly reducing both the processing ti ...more...



ScanSafe

topic

ScanSafe was a privately held company backed by investors Benchmark Capital and Scale Venture Partners, until its 2009 acquisition by Cisco Systems . The company provided Web-based " Software as a service " (SaaS) to organizations. History Co-founded in 1999 by brothers Eldar and Roy Tuvey, its services block malware and secure the use of the Web and messaging . Noted as being the first to successfully deliver a Secure Web Gateway service, the company competes with similar services offered by Blue Coat Systems , MessageLabs , Purewire , Webroot , Websense and Zscaler . ScanSafe has offices in London , England and San Francisco , California and maintains alliance partnerships with Google , AT&T , Sprint , Kaspersky , Telus , NEC , Orange Business Services , Integralis, SoftScan, TopNordic, Viatel, Ancoris , and FVC. MessageLabs , a major provider of Messaging services ended a strategic partnership between the two companies in 2006. MessageLabs introduced a competing in-house product titled Web Security ...more...



Viasat, Inc.

topic

Viasat Inc. is a communications company based in Carlsbad, California , with additional operations across the United States and worldwide. Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets. Viasat is ranked on the SpaceNews Top 50 space companies and is also included on the Defense News list of Top 100 defense companies. Viasat owns and operates Exede Internet , a satellite Internet provider for over 659,000 households. Viasat launched its satellite, ViaSat-1 , in 2011, and its second satellite, ViaSat-2 , on June 1, 2017. History Early history (1986-2004) Viasat was co-founded in May 1986 by Mark Dankberg, Mark Miller and Steve Hart. Mark Dankberg became chief executive officer and Mark Miller and Steve Hart became chief technical officers . Viasat received venture capital financing of $300,000 from Southern California Ventures. In December 1996, Viasat had its initial public offering (IPO). The company offe ...more...



Cyber PHA

topic

A cyber PHA (also styled cyber security PHA ) is a detailed cybersecurity risk assessment methodology that conforms to ISA 62443-3-2 . The name, cyber PHA, was given to this method because it is similar to the Process Hazards Analysis (PHA) or the hazard and operability study (HAZOP) methodology that is popular in process safety management , particularly in industries that operate highly hazardous industrial processes (e.g. oil and gas, chemical, etc.). The method is typically conducted as a workshop that includes a facilitator and a scribe with expertise in the cyber PHA process as well as multiple subject matter experts who are familiar with the industrial process, the industrial automation and control system (IACS) and related IT systems. For example, the workshop team typically includes representatives from operations, engineering, IT and health and safety as well as an independent facilitator and scribe. A multidisciplinary team is important in developing realistic threat scenarios, assessing the impact ...more...



Wireless LAN

topic

This notebook computer is connected to a wireless access point using a PC card wireless card. An example of a Wi-Fi network A wireless local area network ( WLAN ) is a wireless computer network that links two or more devices using wireless communication within a limited area such as a home, school, computer laboratory, or office building. This gives users the ability to move around within a local coverage area and yet still be connected to the network. Through a gateway , a WLAN can also provide a connection to the wider Internet . Most modern WLANs are based on IEEE 802.11 standards and are marketed under the Wi-Fi brand name. Wireless LANs have become popular for use in the home, due to their ease of installation and use. They are also popular in commercial properties that offer wireless access to their employees and customers. An embedded RouterBoard 112 with U.FL - RSMA pigtail and R52 mini PCI Wi-Fi card widely used by wireless Internet service providers History Norman Abramson , a professor at the Unive ...more...




Next Page
Javascript Version
Revolvy Server https://www.revolvy.com