comarch data security solutions en 473

Upload: vinaynoida19

Post on 09-Apr-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Comarch Data Security Solutions en 473

    1/20

    banking, insurance& capital marketsCompreesve t Secrt Sstems

    Data Security Solutions

  • 8/8/2019 Comarch Data Security Solutions en 473

    2/20

    Bkg, Isrce d Cpt Mrkets

    Itrodcto

    Almost everything companies, organizations and insti-

    tutions do is now connected with inormation systems

    and data processing. These systems oten support crit-

    ical processes that powerully inuence success or ail-

    ure on the market.

    Data access is the key to ortune or the majority o op-

    erations. But the unceasing development and proliera-

    tion o solutions designed to illegally access, destroy or

    change electronically stored data makes it essential to

    deploy more and more advanced resources or secure

    storage, transmission and processing.

    , Isrce Cpt Mrets

  • 8/8/2019 Comarch Data Security Solutions en 473

    3/20

    Data Security Solutions

    Access Mgemet Sstems

    Comarch Security Access Manager DRACO cobes

    the eatures o Access Management and Identity Man-

    agement sstes to proe qe ctot.

    Comarch Security Access Manager DRACO supplies world-

    css etcto, torzto, tetcto

    accounting that is in line with the latest security trends pts to cstoer ees. Corc Se-

    crt ccess Mer DRCO proes extese op-

    tos or resorce ser eet:

    Ietes sers

    Proes tetcto (psswors, oe-te

    psswors, tokes, crptorpc tokes

    boetrcs)

    tores: TNs (Trscto tetcto N-

    bers), tokes, SMS psswors, Corc MobeID,

    certctes

    Spports trscto torzto

    Peror ccot

    Proes se s-o ppctos spporte b

    Corc RACO Refects te cops orzto strctre

    Enables user identity management in a large number

    o I sstes

    Spports te creto o rt ortos (co-

    sortiums) and manages their applications and human

    resorces

    Comrc Secrt Access Mger

    Te sse o IT sste secrt t protecto s

    very broad indeed. It is identied, though, with the con-

    tos octo ptto o sotos

    secrt eet to te retes o te opert

    eroet.

    Comarch has extensive experience in securing and main-

    taining IT system security, which has been proven within

    the company itsel and in many customer implementa-

    tions. Based on this experience, the know-how o our en-

    gineers and our long-term relations with leading security

    solution providers, we would like to present our servic-

    es or ce, propretr secrt sstes.

    Comarch Security Access Manager DRACO Functionality

    RACO ctot

    Idett Mgemet Sstems

    3

  • 8/8/2019 Comarch Data Security Solutions en 473

    4/20

    Bkg, Isrce d Cpt Mrkets

    Oers e coce o terto t ppctos

    c ec ppctos

    Provides centralized user management and authoriza-

    to b rop, roe or cto

    Supports diverse access rights: a user may have varied

    sets o torztos t oe ppcto

    Supports permissions transer (a persons permission

    be psse to oter perso)

    Spports resorce cteorzto trst ees

    Ebes trspret ser ett trser te

    woe c pt (seret, portet -> Webserce ->

    Webserce)

    Ebes t-ee strto.

    Comarch Security Access Manager DRACO Functional Diagram

    Idetcto Accotg

    Refectgo Orgto Strctre

    Atetcto

    RACO IAAA FRAMEWORK

    Atorto

    Vrt Orgtos(Cosortms)

    SgeSg-O

    Itegrto wt LegcAppctos

    Cetr UserMgemet

    Admstrtve Overtkg Secrt Poc Mgemet

    Grops

    CetrPermssos

    MgemetTrst Leves(Resorce Ctegorto)

    Cotets

    eegtg Permssos

    Approvg Permssos

    LAPtbse

    4

  • 8/8/2019 Comarch Data Security Solutions en 473

    5/20

    Data Security Solutions

    User authentication and authorization represent key el-

    eets I sste secrt. Atetcto cors

    ser ettes, we torto rts sers c-

    cess ccor to specc secrt prcpes so

    os te to cor te crebt o trsctos.

    tetcto s te rst e o eese st -

    torze ccess.

    e tetcto process c be cocte

    ways. First o all there is the simple deense aorded bysttc psswors. Next, tere re oe-te psswors

    eerte b tokes. F, tere re certctes

    loaded on to smart (cryptographic) cards and biometric

    reers.

    Comarch MobileIDComarch MobileID is a new authentication and author-

    ization method based on mobile phones that combines

    etres eer beore see toeter oe soto. It

    eers secrt, ese o se ce teco-

    o t ow prce. Corc MobeID c operte s

    st-oe sste so be terte tCorc Secrt Access Mer RACO.

    Basic components o Comarch MobileID

    Comrc

    MobeI

    Server

    Compoets

    Atetcto

    Atorto

    Comrc Mobe Secrt

    5

  • 8/8/2019 Comarch Data Security Solutions en 473

    6/20

    Bkg, Isrce d Cpt Mrkets

    During login the application asks the user to provide the

    login and password generated by Comarch MobileID. All

    te ser s to o s strt te ppcto s Per-

    sonal Identication Number (PIN) only he knows. The ap-

    pcto eertes psscoe c te ser epos

    to cor s ett te ppcto.

    A two-part authentication takes place involving what the

    user knows (PIN) and what the user possesses a mobile

    poe t persoze Corc MobeI.

    Trscto torto s bse o cee

    respose. e serer copoet eertes tor-

    zation code according to the transaction data: account

    number, sum and current time. The user enters this data

    to te ppcto o s obe poe (or oter o-

    be ece). Us ts s bse, respose torz-

    to coe s eerte s te b te Cor-

    c MobeI serer.

    2. T passcod is ntrd

    into t application3. Cod Validation

    1. T usr starts t application

    it a PIN only knos

    T usr starts t application

    it a PIN only knos

    k49cqder

    ******

    k49cqdr

    ******

    k49cq3de

    89647523

    MobilID Srvr

    Rspons cod

    Gnrats t Callng Cod

    and validats t rspons

    MobilID Srvr

    Aut callng cod

    APPLICATION

    Comarch Mobile ID User Authentication

    Comarch MobileID Operation Authorization

    Usr NamPASSCODe

    AUTheNTICATe

  • 8/8/2019 Comarch Data Security Solutions en 473

    7/20

    Data Security Solutions

    Comarch MobilePKIComarch MobilePKI is a solution that supports authen-

    tcto torzto s obe tecoo. It

    enables ull use o Public Key Inrastructure (PKI) on mo-

    be poes s SIM crs.

    Corc MobePKI tetcto torzto

    rests on a java application installed on a SIM card (with

    te opto wt crptoprocessor). Te ppcto

    converts the mobile phone into a mobile cryptographiccard that contains a public and private key and does not

    require a card reader or signature submission. SMSs are

    se to cocte t te trscto sste or

    e eerto, ctto stre sbsso.

    Using this authentication and authorization method re-

    quires no additional mobile phone operator services. The

    o ce reqre s to sbsttte te coo SIM

    card or a SIM with a crypto processor. It is also possible

    to come to an agreement with the mobile phone opera-

    tor to Corc MobeI to te SIM cr.

    Sstem Fetres Teepoe cocto ccess to te bks

    trscto sste SMS

    Coptbe t SK GSM 11.14 str

    Uses 1024 bt RSA es

    Generates keys using an application located on a SIMcard (in the case o a cryptographic card the application

    s octe o te cr)

    Opto to se e prs

    Prte e protecte b PIN

    SIM crs c be boce b SMS

    Es stto.

    Sortcto geerted ke

    Comarch MobilePKI Authorization and Authentication

    GSMNetwork Opertor

    SIM TooktAppcto

    SMS-C

    Bk Server

    SIM

    7

  • 8/8/2019 Comarch Data Security Solutions en 473

    8/20

    Bkg, Isrce d Cpt Mrkets

    Coteporr bsess s er e epeet o

    spee cocto rebe copete

    t. Ts es tt copes stttos re

    vulnerable to enormous loss and damage to their IT sys-

    tems rom break-ins and rom the abuses and misuses o

    ter o epoees. o cocte eecte

    securely on the Internet and on corporate networks com-

    pes reqre sotos tt ebe te to:

    Iet trets rp ccrte Rece te ber o eets b pro

    sbe eet t

    Spport te recto b qck eer eet

    orto

    Monitor and audit IT inrastructure eectively to make

    t secre.

    Comarch CentralLog s copreese soto or

    managing security data generated by the companys IT

    rstrctre. It ces toos or te cetrto,

    ss store o te secrt t orto

    proce b ros sstes ppctos. s -

    ces tose excse eote to secrt tose

    tt re epeet, sc s t bses.

    e sotre es t possbe to cetrze t -

    ss, te preete esres, eer cop sec-rt stts reports ert te pproprte eprt-

    ments when a potential or actual problem is uncovered

    or detected. The systems unctionality means adminis-

    trators can manage security associated events conven-

    et, toro procte.

    CENTRAL LOGMANAGER

    Reportg

    EvdeceGterg

    IcdetSpport

    Msseetecto

    IT SYSTEMS

    AGENTS

    Comarch CentralLog Functional Diagram Comarch CentralLog

    Comrc CetrLog

  • 8/8/2019 Comarch Data Security Solutions en 473

    9/20

    Data Security Solutions

    IT system monitoring is a signicant tool in IT risk man-

    eet becse t eers t o te extet e-

    cec o sste resorce se.

    Comarch SecureAdmin s ser ctt otor

    system which operates transparently at the level o the

    etor er (psse cte ss). ese e-

    tres e tt peet Corc SecreA

    oes ot reqre te octo or recorto

    o exst ppctos or sstes ts presece sot sbe to sers.

    rter pos etre s te cpct to otor

    ecrpte coectos. s es t exceet sp-

    peetr sste or otor ser ctt. It s

    bse o ppcto sste os so be

    epoe to otor strtor ctt.

    System ComponentsCorc SecreA s bee proce tree ter

    rctectre s te oo copoets:

    Sensors ecte serers eqppe wt t est

    tree etor terces, c to opert

    bre oe. er ts s to otor etor trc,

    analyze selected connections according to the required

    cortos recor te t coecte

    Network Managing Server te cetr serer ttes te sesors te t coecto

    Administration Console www cosoe eb

    sste strto pro ew o te

    t coecte b te sste.

    Comrc SecreAdm

    AdmstrtorWorksttos

    Mgg Server

    Sesors

    ttpsttps

    Comarch SecureAdmin System Architecture

  • 8/8/2019 Comarch Data Security Solutions en 473

    10/20

    Bkg, Isrce d Cpt Mrkets

    High Volume Protocol Analysisere re to s etor trc s ze:

    psse

    cte s MIM (M e Me).

    Passive analysis is based on the incoming packet queue

    ecs proe b ptbes sotwre. Ts s te

    ses or spe protocos p text sc s

    eet, POP3, IMAP, FP, SMP, SM, NFS, Orce, MSQL,

    PostreSQL MSSQL re cocte.

    MIM ss tecqes, to, oe sesor -

    tere betee te serer cet ss

    ter ettes. Protocos s ecrpto or tt re-

    quire modications to the transmitted packets such as

    SSH (ersos 1 2), SSL (FP, POP3, IMAP, LAP, SMP,

    HP) X11 re ze ts .

    TransparencyTe etwork trc ss otor pro-

    e b Corc Secre s trspret to sers.

    Ts s es to cee wt psse ss becsete pckets trstte te coectos re o

    oe.

    Comarch SecureAdmin is exceptional because it also o-

    ers trsprec MIM coecto ss. I ts

    oe te sesor ses ptbes ecss to trser

    connections to a local port and simulate the clients con-

    nection. Meanwhile, the sensor connects with the serv-

    er in the name o the client. The server hides behind the

    IP resses o re serers cets so tt t s -

    sbe bot to te cet te serer.

    Managing SSH keys and SSL certicates and keys is per-

    ore cetr ro te strto cosoe.

    Logging User ActivityCorc Secre otors etwork trc

    cocts protoco ses to o ser ctt. Ts

    es recor ter ctos te coseqeces

    o tose ctos. Were te perore sccess or

    ere errors cotte?

    Te oow orto s oe or ec coec-

    to ze:

    e coecto be

    rto o coecto

    Sorce ress port estto ress port

    MAC NS resses, be

    Protoco tpe

    User e pssor, be

    Iorto specc to te otore protoco.

    Comarch SecureAdmin Administrator Desktop

    1

  • 8/8/2019 Comarch Data Security Solutions en 473

    11/20

    Data Security Solutions

    Comarch SOPEL (Eectroc Stre Spport Sste)

    provides complete implementation or secure qualied

    electronic signature verication equipment and secure

    electronic signature submission sotware. Both comply

    t te L o Eectroc Stres.

    Ipeet te sste eers te beets o

    eectroc cotct t cstoers prters e

    pro te oo secrt etres:

    Undeniability te ressee cot e tt teesse or orto s bee set

    Consistency and Correctness it is easy to detect any

    ces e b torze peope to esses

    or orto.

    The electronic signature is especially useul where there

    re re bers o oos or occso eec-

    troc cotcts, or ere t s ecessr to store oc-

    ets s eece.

    Comarch SOPEL System Features

    F copce wt te e reqreets oreectroc stres

    Full compliance with the technical requirements aris-

    ing rom the orders pursuant to the Law on Electronic

    Stres

    Can work with cryptographic hardware devices (HSM

    Hrre Secrt Moes)

    Hs terces or te ost popr pror

    es: C/C#/J

    Supports a variety o cryptographic key and certicate

    orts (X.5093, PGP).

    e ts perore b te sste oes s to

    support employee document and orm signing. Employ-

    ees achieve this by using their private keys with optional

    time stamping. The model is implemented in such a way

    that it can sign inormation using private keys connect-

    e wt certcte o te x.5093 str store

    te Certcte Sste Store Wos. s teoe o te Wos CrptoAPI brr es t -

    epeet o te pce oe o stor te pr-

    vate key that is linked to the certicates signatory. This

    es tt, proe te rre s coptbe t

    Microsot CSP (Cryptographic Service Provider) technol-

    ogy, the modules can use any hardware token or micro-

    processor card that is storing the users private key. The

    copoets re peete s ActeX (Iteret Ex-

    porer) or s p s (Netscpe, Moz, Freox).

    The system also enables the use o private keys located

    te Hrre Secrt Moe or s.

    Electronic Signature Veriicationo opertos re perore s te se or-

    er o eer ocet rec te sste: te sig-

    nature check and, i this is passed successully, the CRL

    list check (Certifcate Revocation List). I te tests -

    oe tese to opertos re copete sccess-

    Comrc SOPEL

    Sgg compoet

    Mcrosot Crpto API

    Crpto TokeCSP

    SmrtCrdCSP

    Mcrosot Eced CSP

    The signing components separation rom the cryptographic key storage

    11

  • 8/8/2019 Comarch Data Security Solutions en 473

    12/20

    Bkg, Isrce d Cpt Mrkets

    ully, the integrity o the electronic signatures support-

    te ocets s rtee.

    Te o ceck te stres s to estbs te

    oo:

    Is te stre correct ccor to tetc

    cec?

    Ws te certcte t ts expr te e t s

    se?

    I any irregularities whatever are detected during these

    tests, ttept s bee e to coprose te

    correctess copeteess o te t processe

    b te sste.

    To esre tt te e coseqeces o te ecr-

    to o w expresse s te eectroc stre

    re cert, t s ecessr to cec eter te cert-

    cte (te certctes prte e) se to execte te

    stre ws t te oet o s. Ws t

    sspee or e t tt oet? Is t sspe-

    e or e o?

    1

    New ocmet

    Sspeded Vercto

    SgtreCeckg

    CRL Lst Ceck

    Icorrect Sgtre

    Fed Vercto Sccess Vercto

    Correct Sgtre

    Electronic Signature Verifcation

  • 8/8/2019 Comarch Data Security Solutions en 473

    13/20

    Data Security Solutions

    Bsess to s er e epeet o rebe

    copete t. Ts creses te rsk copes

    stttos re expose to. s ces ot o

    te tret o I sste bre-s ro te otse bt

    so te possbt o e, obstrcto or sse

    ro ter o epoees. e cocso s cer: -

    portt be t so be proper protect-

    e secre.

    Comarch SaeDesktop is Comarchs security solution orend-user workstations in IT systems. Comarch SaeDesk-

    top makes it possible to obtain diverse unctionality us-

    croprocessor crs US toes eteroe-

    eos eroets, c te MS Wos 98SE/

    Me/2000/XP/2003 ptor Lx.

    Important Functionality Stro cetr or oc ser tetcto

    Atotc e eerto, certcte sse reqests,

    certctes certcte propto

    S e-s

    Ecrpt es, ctoes scs

    Creating unidirectional and bidirectional SSL authen-

    tcto ces or eb oter ppctos

    Se s-o tetcto or web wow

    ppctos te MS Wos eroet Ecrpto e retre.

    s ctot s so be to sers or

    terminal environments (RDP, Citrix, X-Windows) on Win-

    os or Lx ptors.

    Comrc Seesktop

    13

    Comarch SmartCard

    Comrc SmrtCrd

    Comarch SmartCard s j bse crptorpc -

    croprocessor card or the secure storage o sensitive in-

    orto sc s crptorpc es pssors.

    Te re cef se PKI (Pbc Ke rctectre)

    sstes ore ore ote bk, were

    er secrt strs, or expe or csto-

    er trsctos, re reqre. Te crs secrt rests

    on asymmetrical cryptography. The private key used to

    s or te trscto eer ees te croproces-

    sor cr: t s eerte tere tere s o tt

    t c be cope. O te crs oer os te PIN

    ber.

  • 8/8/2019 Comarch Data Security Solutions en 473

    14/20

    Bkg, Isrce d Cpt Mrkets

    Comarchs oer includes specialized hardware-program

    solutions enabling strong authentication in a variety o

    cstoer eroets sstes.

    Oe o tese procts s Comarch Token, c s so-

    to ose rre s bse o US toes. It co-

    bines cryptographic smart card and card reader eatures

    in one device. The programming, including the sotware

    se te toe, s proce b Corc.

    Corc tokes, wt J Srt Cr eectroc s-

    seb, proe:

    Extese ctot secrt

    rbt, ese o se toe trser cpbt.

    Te sotwre ttce to te tokes ebes te o-

    o etres:

    User PIN wt et o 4 to 16 crcters (res,

    etters spec crcters)

    Astrtor PIN (PUK) t et o 4 to 16 cr-

    cters (res, etters spec crcters)

    Crptorpc orts:

    Assetrc: e esos: RSA: 512, 1024, 2048

    Setrc: 3ESHs cto: M5, SHA-1

    64kb cr eor (c 40kb or te kes, te

    certctes te t).

    14

    Comrc Toke

    Comrc SmrtCrd Worksop

    Comarch SmartCardWorkshop sste es te

    e cces o crptorpc crs tokes. I -

    tion to the basic unctionality connected with workfow

    crret stts reports or crs sse b te ss-

    te, te sste so proes terto or t-

    rpc cr persozto.

    It spports te oo pses te cr e cce:

    Persozto

    Iss

    Cce certctes Reo crs ro te sste.

    One o Comarch SmartCardWorkshops basic purposes

    s to e te e cce o crptorpc crs. s

    oes preset tpes o t tere b te ss-

    te so o te re coecte. I ts

    t s possbe to o o te sste es te -

    eret objects processes coecte t te cr

    e cce. e objects te sste es re, o

    corse, sers crs.

    Users te sste st be ete b costt

    and non-transerable identier (e.g., the identier o an

    epoee o ceses to or t prtcr cop

    cot be sse to oter epoee). s c be,

    or expe, e- ttrbte bos co-

    r te sers I. A ser opertos perore

    te sste re bse o ts costt eter.

    Cryptographic Cards, as well as users,have unique iden-

    tiers in the system. In their case this is a serial number.

    Te sste works o te sspto tt cr o be sse to oe ser r ts e cce (e

    to te rpc persoto process). ser

    possess ber o crs (ee t te se te), bt

    cr eer be sse to oter ser.

  • 8/8/2019 Comarch Data Security Solutions en 473

    15/20

    Data Security Solutions

    Comarch CertifcateAuthority s Corc propretr

    sotware or ull implementation o PKI systems (Public

    Key Inrastructure). This involves issuing certicates or

    secure e-mail, web servers, communication channels, and

    user authentication and authorization. Comarch Certi-

    cteAtort spports te etre certcte e cce

    ro ppcto tro to expr or et.

    Comarch CertiicateAuthority

    Functionality or Operators Certicate searches and queries according to certica-

    to pse oter etres, sc s te e o

    te kes ower te te te ppcto ws

    sbtte

    Rejecto o certcte serces qeres

    ppro o ppctos or certctes (certcte

    ss)

    Certicate search and queries according to validity cri-

    teria (valid, cancelled and expired), name o key owner

    (CN Coo Ne), pero o t, proe

    Certcte cce

    Geert ew CRL sts (Certcte ReoctoLsts)

    Ctoe corto

    Pbs certctes te rector serces

    Pbs CRL sts te rector serces

    Cret e CAs

    Proe etos

    Certicate/key recovery (KRM Key Recovery Manage-

    et )

    OCSP (Oe Certcte Stts Protoco) serce.

    Comarch CertiicateAuthority Features Capacity to establish expanded Public Key Inrastruc-

    tre t eros strbte restrto pots

    H ptbe to reqreets

    F coptbt teroperbt wt we

    re o crptorpc sotre

    Range o options or publishing certicates and CRLs

    via mail, tp, WWW, LDAP (Lightweight Directory Access

    Protoco)

    Unique capacity to migrate cards rom the PGP stand-r to X.509

    Iteroperbt t croprocessor crs

    Iteroperbt wt HSM eces (H Secrt

    Moe).

    Comarch CertiicateAuthorityStandard Modules Registration Authority Module (RA), wc ows

    sers to sbt ppctos

    Registration Authority Operator Module (RA Opera-

    tor) , c recees ppctos

    Certifcate Authority Module (CA), when applicationsre ccepte RA Opertor te re re or sse

    b CA.

    Comrc CertcteAtort

    15

  • 8/8/2019 Comarch Data Security Solutions en 473

    16/20

    Bkg, Isrce d Cpt Mrkets

    Comarch Security Content Management s copre-

    hensive solution or Internet service providers. The sys-

    te bs boosts copette te b ex-

    panding the range o services that can be oered. These

    ce coce o secrt optos cotet

    coectos otor.

    Comarch SCM lters access to www pages based on rules

    dened by subscribers. These rules stipulate which pag-

    es so be boce c oe b Cor-c SCM.

    Te sste ows Iteret teecoctos

    service providers to oer security options on a pre-paid

    basis. This is accomplished without subscribers having

    to st sotre.

    The systems modular architecture makes it easily adapt-

    be to te ees o serce proers, wo e r-

    be reqreets rs ro te ber o sb-

    scrbers, te re o serces oere te se o

    te opertor.

    Comrc Secrt Cotet Mgemet

    Overview o Comarch Security Content Management

    Access SetrLOGINPASSwORD

    Access eed

    STOP!!!

    history 1

    Qeres: ttp://.amzon.com ??

    Rep

    Control

    Statistics

    Filtring

    Ruls

    Filtr

    Catgory

    Sport Erotc xE- Sopp xGes xCt x

    .c.p.xxx.p.p.p.ct.p.oet.p.crco.p

    history 2

    Mama

    ********

    Sbscrber

    Access Admstrtor

    User Access

    t Bse

    User Proe,

    Sttstcs, Hstor

    Fterg Server

    Iteret

    16

  • 8/8/2019 Comarch Data Security Solutions en 473

    17/20

    Data Security Solutions

    Tere re two spects to proper cto secr-

    t eet pt to te spece reqre-

    ments. These are an operational security policy and pe-

    roc secrt ts.

    A Security Policy is a set o coherent andprecise proce-

    res, res retos tt cop t te pre-

    ws. orto ses tese to costrct,

    e proe ccess to ts IT sstes -orto resorces. e poc stptes c re-

    sources should be protected and how this should be ac-

    copse. Its reqreets e to st te sstes

    oer te t be store. Corc s exte-

    se experece bt eeop pe-

    et secrt poces.

    Corc stro ecores o to se ts auditing

    services. The specialists rom the Security and Data Pro-

    tecto eprtet oer:

    Penetration TestsThese simulate a break-in to a corporate network. Comar-

    ch appoints a Tiger Team to perorm this kind o audit.

    e te s e p o cber e-ecte

    proessos wose tsk t s to coct stebre- te eeop s o pro te q-

    t o te secrt sste.

    Coniguration AnalysisEe te ost secre opert sstes, ppctos

    or t protecto sstes re seess te e ot

    been properly congured. This is why we include cong-

    Comrc Servces

    17

    ANALYSISOF ThE ExISTING

    SITUATION

    EFINING ThESECURITY POLICY

    REVIEW

    MOERNIzATION

    EVELOPING ThESECURITY POLICYOCUMENTATION

    START!

    IMPLEMENTINGThE SECURITY

    POLICY

    Methodology or Developing Security Policy

  • 8/8/2019 Comarch Data Security Solutions en 473

    18/20

    Bkg, Isrce d Cpt Mrkets

    uration analyses or the majority o operating systems,

    secrt sstes, t bses ppctos s prt

    o or oer. I ts process e se te secrt o-

    ee e e ere o te corse o ers o

    prctc experece peet secr -

    eros sstes.

    Security Policy and ProcedureMonitoring

    e st set o ts e oer oe z co-ps exst secrt poc proceres. Ts

    so be o prtcr terest to tose resposbe

    or secrt tose wose tsk t s to otor te

    sste ts etret.

    Corc s se ts extese experece to ee-

    op te etooo or secrt poc projects repre-

    sete re.

    Comarch Also Oers Consultation services or constructing comprehensive

    orto secrt ps (secrt poc)

    Des serces or ce t-ere secrt

    sstes

    Technology and products implementation or securing

    etors, serers orsttos

    Technical training or company IT security personnel.

    This includes an overview o security and then ocuses

    on the implemented products. It also provides trainingto ep ers epoees to be ore wre

    better ore o secrt poc

    Cop secrt eet wt tece

    serce ssstce or te secrt sstes

    peete.

    1

  • 8/8/2019 Comarch Data Security Solutions en 473

    19/20

    Data Security Solutions

    P

    PH PK

    M PKO P

    IG Gs S.A.

    NOR Pos S.A

    M PK S.A.

    Eers

    Erst&Yo Pos

    Erob

    Forts Pos S.A. Frtscc ece S.A .

    GE Cpt

    ING s S.A

    Krajowy Depozyt Papierw Wartociowych (National

    Secrtes epostor)

    KPWG

    Lbortor Kosetcze r Ire Ers

    Mstersto Fs (Mstr o Fce)

    Net

    Norwc Uo Serces Posk (Uers Peso

    F)

    PeKO S.A.

    Peo CM

    PKO/Handlowy Powszechne Towarzystwo Emerytalne

    (Uers Peso F)

    Pos eeo Cro S.A.

    PK Ceterte Rese Pos S.A.

    RHEINHYP-RE Hpotecz S.A.

    Wrt Vt S.A.

    eeocj Pos S.A .

    U PC/Wzj V

    Vose Pos

    Seected Cstomers

    1

  • 8/8/2019 Comarch Data Security Solutions en 473

    20/20

    CoArc Sp Acj t ts restere set Kr t Aej J P II 39A, etere te Nto Cort Rester ept b testrct Cort or Kr-rece Kr, te 11t Coerc so o te Nto Cort Rester er o. KRS 000057567.e sre cpt ots to 7,960,596.00 z. e sre cpt s p, NIP 677-00-65-406

    Copyright Comarch 2008. All Rights Reserved. No part o this document may be reproduced in any orm without the prior written consento Corc. Corc reseres te rt to r ese ts ocet to e ces te cotet ro te to te tot otce.Comarch may make improvements and/or changes to the product(s) and/or programs described in this document any time. The trademarks serce rs o Corc re te excse propert o Corc, ot be se tot persso. A oter rs re tepropert o ter respecte oers.

    EN-2008.09

    Comrc Ic.

    10 W 35t Street

    Cco, IL 60616

    Ute Sttes

    poe: +1 800 786 4408

    x: +1 800 684 5916e-m: [email protected]

    Comrc Sotwre AG

    Cetzer Str. 50

    01187 rese

    Ger

    poe: +49 351 3201 3200

    : +49 351 438 97 10

    e-m: [email protected]

    Comrc OOO

    Precstes Pereo 14/1119034 Mosco

    Rss

    poe: +7 495 783 36 71

    Comrc hedqrters

    A. J P II 39

    31-864 Kro

    Po

    poe: +48 12 64 61 000

    : +48 12 64 61 100e-m: [email protected]

    Pod

    Gs, Ktoce Kro,

    Lb, Loz, Poz,

    Szczec, Wrs, Wroc

    Begm rssesFrce Le

    Germ rese,

    Frrt/M

    Lt Vs

    Pm P Ct

    Rss Mosco

    Sovk rts

    UAE b

    Ukre Ke, L

    USA Cco, M

    .ce.corc.cowww.comarch.com www.comarch.pl www.comarch.de www.comarch.ru

    Corc s e Cetr Erope IT bsess sotos proer

    spec or bsess retosps tt xe cstoer

    protability while optimizing business and operational processes. Comarchs

    prr te es te st o o kowee ccte

    ppe to or sotwre procts. Tese procts corporte

    sophisticated IT solutions or businesses in all vertical sectors. Comarch has

    a multinational network o oces employing over 2800 highly-experienced

    I specsts Erope, te Me Est te Aercs.