Ebusiness over the Internet - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

Ebusiness over the Internet

Description:

Sterling Commerce. GEIS Network. AT&T. MCI. CommerceOne. Oracle ... Security alert information. System audit trails. Backup systems. Anti-virus software ... – PowerPoint PPT presentation

Number of Views:53
Avg rating:3.0/5.0
Slides: 20
Provided by: garysh3
Category:

less

Transcript and Presenter's Notes

Title: Ebusiness over the Internet


1
E-business over the Internet
David M. Lonsdale Chairman, CEO President May
17, 2001
2
Overview
  • Seeing the challenges of Internet-based business
  • Leveraging technology to mitigate risk

3
Seeing the challenges
  • The Internet is evil

4
Seeing the challenges
  • The Internet is evil
  • The Internet is good

Honest
5
The Internet.. bridging the gaps
IP
X12
XML
Exchanges
SNA
HTTP
EDIFACT
IBM Global Network Sterling Commerce GEIS
Network ATT MCI
CommerceOne Oracle BizTalk Ariba
FTP
SMTP
EDIINT
SSL
6
IP Infrastructure Demands
  • B2B integration technology challenges
  • Insecure and unreliable public Internet
  • Data format complexity in a multi-enterprise
    environment
  • Rapid deployment to large and small trading
    partners
  • Mounting real time data transmission demands
  • Supplier adoption challenges
  • Interoperability requirements (across hardware
    platforms and operating systems)
  • Online exchange and collaborative commerce
    initiatives will fail if they do not address
    IP-based security issues

7
Leveraging technology to mitigate risk
  • Adopt sensible security practices
  • Firewalls
  • Security alert information
  • System audit trails
  • Backup systems
  • Anti-virus software
  • Password management
  • Vendor provided patches
  • Security policy
  • Employment awareness
  • Public domain tools

8
Leveraging technology to mitigate risk
  • Use security mechanisms designed for electronic
    business
  • ANSI ASC X12.58
  • ISO 9735
  • SSL/TLS
  • AS1
  • AS2
  • XML D/Sig
  • XML-ENC
  • PKI

9
Leveraging technology to mitigate risk
  • Use security mechanisms designed for electronic
    business
  • ANSI ASC X12.58
  • ISO 9735
  • SSL/TLS
  • AS1
  • AS2
  • XML D/Sig
  • XML-ENC
  • PKI

10
Leveraging technology to mitigate risk
  • Use security mechanisms designed for electronic
    business
  • ANSI ASC X12.58
  • ISO 9735
  • SSL/TLS
  • AS1
  • AS2
  • XML D/Sig
  • XML-ENC
  • PKI

11
Leveraging technology to mitigate risk
  • Use security mechanisms designed for electronic
    business
  • ANSI ASC X12.58
  • ISO 9735
  • SSL/TLS
  • AS1
  • AS2
  • XML D/Sig
  • XML-ENC
  • PKI

12
Leveraging technology to mitigate risk
  • Use security mechanisms designed for electronic
    business
  • ANSI ASC X12.58
  • ISO 9735
  • SSL/TLS
  • AS1
  • AS2
  • XML D/Sig
  • XML-ENC
  • PKI

13
Leveraging technology to mitigate risk
  • Use security mechanisms designed for electronic
    business
  • ANSI ASC X12.58
  • ISO 9735
  • SSL/TLS
  • AS1
  • AS2
  • XML D/Sig
  • XML-ENC
  • PKI

14
Leveraging technology to mitigate risk
  • Use security mechanisms designed for electronic
    business
  • ANSI ASC X12.58
  • ISO 9735
  • SSL/TLS
  • AS1
  • AS2
  • XML D/Sig
  • XML-ENC
  • PKI

15
Leveraging technology to mitigate risk
  • Use security mechanisms designed for electronic
    business
  • ANSI ASC X12.58
  • ISO 9735
  • SSL/TLS
  • AS1
  • AS2
  • XML D/Sig
  • XML-ENC
  • PKI

16
One view of the world
17
Private Exchange Market
  • Company ABC has an EDI back office application
    and an SCM application. They have trading
    partners on a VAN, trading partner on VPNs over
    the Internet, and small trading partners that can
    not currently leverage their application.
  • Need create a trading environment that can
    integrate to their application base and include
    all their trading partners. Remove the need for
    VPNs. Participate with current peer-to-peer
    trading partners.

18
Private Exchange Model
SAP
EDI App
Company ABC
AS2
S/FTP
VAN IXC
Internet
AS2 Peer
VAN
AS2 Spoke
Internet
Web Methods AS2
AS2
Cyclone AS2
S/FTP
S/FTP
19
Conclusion
  • The Internet is a potentially hostile environment
    where companies can safely conduct business
  • Success depends on the consistent employment of a
    well-defined security policy, using proven
    security techniques
Write a Comment
User Comments (0)
About PowerShow.com