Download - Comarch Data Security Solutions en 473
-
8/8/2019 Comarch Data Security Solutions en 473
1/20
banking, insurance& capital marketsCompreesve t Secrt Sstems
Data Security Solutions
-
8/8/2019 Comarch Data Security Solutions en 473
2/20
Bkg, Isrce d Cpt Mrkets
Itrodcto
Almost everything companies, organizations and insti-
tutions do is now connected with inormation systems
and data processing. These systems oten support crit-
ical processes that powerully inuence success or ail-
ure on the market.
Data access is the key to ortune or the majority o op-
erations. But the unceasing development and proliera-
tion o solutions designed to illegally access, destroy or
change electronically stored data makes it essential to
deploy more and more advanced resources or secure
storage, transmission and processing.
, Isrce Cpt Mrets
-
8/8/2019 Comarch Data Security Solutions en 473
3/20
Data Security Solutions
Access Mgemet Sstems
Comarch Security Access Manager DRACO cobes
the eatures o Access Management and Identity Man-
agement sstes to proe qe ctot.
Comarch Security Access Manager DRACO supplies world-
css etcto, torzto, tetcto
accounting that is in line with the latest security trends pts to cstoer ees. Corc Se-
crt ccess Mer DRCO proes extese op-
tos or resorce ser eet:
Ietes sers
Proes tetcto (psswors, oe-te
psswors, tokes, crptorpc tokes
boetrcs)
tores: TNs (Trscto tetcto N-
bers), tokes, SMS psswors, Corc MobeID,
certctes
Spports trscto torzto
Peror ccot
Proes se s-o ppctos spporte b
Corc RACO Refects te cops orzto strctre
Enables user identity management in a large number
o I sstes
Spports te creto o rt ortos (co-
sortiums) and manages their applications and human
resorces
Comrc Secrt Access Mger
Te sse o IT sste secrt t protecto s
very broad indeed. It is identied, though, with the con-
tos octo ptto o sotos
secrt eet to te retes o te opert
eroet.
Comarch has extensive experience in securing and main-
taining IT system security, which has been proven within
the company itsel and in many customer implementa-
tions. Based on this experience, the know-how o our en-
gineers and our long-term relations with leading security
solution providers, we would like to present our servic-
es or ce, propretr secrt sstes.
Comarch Security Access Manager DRACO Functionality
RACO ctot
Idett Mgemet Sstems
3
-
8/8/2019 Comarch Data Security Solutions en 473
4/20
Bkg, Isrce d Cpt Mrkets
Oers e coce o terto t ppctos
c ec ppctos
Provides centralized user management and authoriza-
to b rop, roe or cto
Supports diverse access rights: a user may have varied
sets o torztos t oe ppcto
Supports permissions transer (a persons permission
be psse to oter perso)
Spports resorce cteorzto trst ees
Ebes trspret ser ett trser te
woe c pt (seret, portet -> Webserce ->
Webserce)
Ebes t-ee strto.
Comarch Security Access Manager DRACO Functional Diagram
Idetcto Accotg
Refectgo Orgto Strctre
Atetcto
RACO IAAA FRAMEWORK
Atorto
Vrt Orgtos(Cosortms)
SgeSg-O
Itegrto wt LegcAppctos
Cetr UserMgemet
Admstrtve Overtkg Secrt Poc Mgemet
Grops
CetrPermssos
MgemetTrst Leves(Resorce Ctegorto)
Cotets
eegtg Permssos
Approvg Permssos
LAPtbse
4
-
8/8/2019 Comarch Data Security Solutions en 473
5/20
Data Security Solutions
User authentication and authorization represent key el-
eets I sste secrt. Atetcto cors
ser ettes, we torto rts sers c-
cess ccor to specc secrt prcpes so
os te to cor te crebt o trsctos.
tetcto s te rst e o eese st -
torze ccess.
e tetcto process c be cocte
ways. First o all there is the simple deense aorded bysttc psswors. Next, tere re oe-te psswors
eerte b tokes. F, tere re certctes
loaded on to smart (cryptographic) cards and biometric
reers.
Comarch MobileIDComarch MobileID is a new authentication and author-
ization method based on mobile phones that combines
etres eer beore see toeter oe soto. It
eers secrt, ese o se ce teco-
o t ow prce. Corc MobeID c operte s
st-oe sste so be terte tCorc Secrt Access Mer RACO.
Basic components o Comarch MobileID
Comrc
MobeI
Server
Compoets
Atetcto
Atorto
Comrc Mobe Secrt
5
-
8/8/2019 Comarch Data Security Solutions en 473
6/20
Bkg, Isrce d Cpt Mrkets
During login the application asks the user to provide the
login and password generated by Comarch MobileID. All
te ser s to o s strt te ppcto s Per-
sonal Identication Number (PIN) only he knows. The ap-
pcto eertes psscoe c te ser epos
to cor s ett te ppcto.
A two-part authentication takes place involving what the
user knows (PIN) and what the user possesses a mobile
poe t persoze Corc MobeI.
Trscto torto s bse o cee
respose. e serer copoet eertes tor-
zation code according to the transaction data: account
number, sum and current time. The user enters this data
to te ppcto o s obe poe (or oter o-
be ece). Us ts s bse, respose torz-
to coe s eerte s te b te Cor-
c MobeI serer.
2. T passcod is ntrd
into t application3. Cod Validation
1. T usr starts t application
it a PIN only knos
T usr starts t application
it a PIN only knos
k49cqder
******
k49cqdr
******
k49cq3de
89647523
MobilID Srvr
Rspons cod
Gnrats t Callng Cod
and validats t rspons
MobilID Srvr
Aut callng cod
APPLICATION
Comarch Mobile ID User Authentication
Comarch MobileID Operation Authorization
Usr NamPASSCODe
AUTheNTICATe
-
8/8/2019 Comarch Data Security Solutions en 473
7/20
Data Security Solutions
Comarch MobilePKIComarch MobilePKI is a solution that supports authen-
tcto torzto s obe tecoo. It
enables ull use o Public Key Inrastructure (PKI) on mo-
be poes s SIM crs.
Corc MobePKI tetcto torzto
rests on a java application installed on a SIM card (with
te opto wt crptoprocessor). Te ppcto
converts the mobile phone into a mobile cryptographiccard that contains a public and private key and does not
require a card reader or signature submission. SMSs are
se to cocte t te trscto sste or
e eerto, ctto stre sbsso.
Using this authentication and authorization method re-
quires no additional mobile phone operator services. The
o ce reqre s to sbsttte te coo SIM
card or a SIM with a crypto processor. It is also possible
to come to an agreement with the mobile phone opera-
tor to Corc MobeI to te SIM cr.
Sstem Fetres Teepoe cocto ccess to te bks
trscto sste SMS
Coptbe t SK GSM 11.14 str
Uses 1024 bt RSA es
Generates keys using an application located on a SIMcard (in the case o a cryptographic card the application
s octe o te cr)
Opto to se e prs
Prte e protecte b PIN
SIM crs c be boce b SMS
Es stto.
Sortcto geerted ke
Comarch MobilePKI Authorization and Authentication
GSMNetwork Opertor
SIM TooktAppcto
SMS-C
Bk Server
SIM
7
-
8/8/2019 Comarch Data Security Solutions en 473
8/20
Bkg, Isrce d Cpt Mrkets
Coteporr bsess s er e epeet o
spee cocto rebe copete
t. Ts es tt copes stttos re
vulnerable to enormous loss and damage to their IT sys-
tems rom break-ins and rom the abuses and misuses o
ter o epoees. o cocte eecte
securely on the Internet and on corporate networks com-
pes reqre sotos tt ebe te to:
Iet trets rp ccrte Rece te ber o eets b pro
sbe eet t
Spport te recto b qck eer eet
orto
Monitor and audit IT inrastructure eectively to make
t secre.
Comarch CentralLog s copreese soto or
managing security data generated by the companys IT
rstrctre. It ces toos or te cetrto,
ss store o te secrt t orto
proce b ros sstes ppctos. s -
ces tose excse eote to secrt tose
tt re epeet, sc s t bses.
e sotre es t possbe to cetrze t -
ss, te preete esres, eer cop sec-rt stts reports ert te pproprte eprt-
ments when a potential or actual problem is uncovered
or detected. The systems unctionality means adminis-
trators can manage security associated events conven-
et, toro procte.
CENTRAL LOGMANAGER
Reportg
EvdeceGterg
IcdetSpport
Msseetecto
IT SYSTEMS
AGENTS
Comarch CentralLog Functional Diagram Comarch CentralLog
Comrc CetrLog
-
8/8/2019 Comarch Data Security Solutions en 473
9/20
Data Security Solutions
IT system monitoring is a signicant tool in IT risk man-
eet becse t eers t o te extet e-
cec o sste resorce se.
Comarch SecureAdmin s ser ctt otor
system which operates transparently at the level o the
etor er (psse cte ss). ese e-
tres e tt peet Corc SecreA
oes ot reqre te octo or recorto
o exst ppctos or sstes ts presece sot sbe to sers.
rter pos etre s te cpct to otor
ecrpte coectos. s es t exceet sp-
peetr sste or otor ser ctt. It s
bse o ppcto sste os so be
epoe to otor strtor ctt.
System ComponentsCorc SecreA s bee proce tree ter
rctectre s te oo copoets:
Sensors ecte serers eqppe wt t est
tree etor terces, c to opert
bre oe. er ts s to otor etor trc,
analyze selected connections according to the required
cortos recor te t coecte
Network Managing Server te cetr serer ttes te sesors te t coecto
Administration Console www cosoe eb
sste strto pro ew o te
t coecte b te sste.
Comrc SecreAdm
AdmstrtorWorksttos
Mgg Server
Sesors
ttpsttps
Comarch SecureAdmin System Architecture
-
8/8/2019 Comarch Data Security Solutions en 473
10/20
Bkg, Isrce d Cpt Mrkets
High Volume Protocol Analysisere re to s etor trc s ze:
psse
cte s MIM (M e Me).
Passive analysis is based on the incoming packet queue
ecs proe b ptbes sotwre. Ts s te
ses or spe protocos p text sc s
eet, POP3, IMAP, FP, SMP, SM, NFS, Orce, MSQL,
PostreSQL MSSQL re cocte.
MIM ss tecqes, to, oe sesor -
tere betee te serer cet ss
ter ettes. Protocos s ecrpto or tt re-
quire modications to the transmitted packets such as
SSH (ersos 1 2), SSL (FP, POP3, IMAP, LAP, SMP,
HP) X11 re ze ts .
TransparencyTe etwork trc ss otor pro-
e b Corc Secre s trspret to sers.
Ts s es to cee wt psse ss becsete pckets trstte te coectos re o
oe.
Comarch SecureAdmin is exceptional because it also o-
ers trsprec MIM coecto ss. I ts
oe te sesor ses ptbes ecss to trser
connections to a local port and simulate the clients con-
nection. Meanwhile, the sensor connects with the serv-
er in the name o the client. The server hides behind the
IP resses o re serers cets so tt t s -
sbe bot to te cet te serer.
Managing SSH keys and SSL certicates and keys is per-
ore cetr ro te strto cosoe.
Logging User ActivityCorc Secre otors etwork trc
cocts protoco ses to o ser ctt. Ts
es recor ter ctos te coseqeces
o tose ctos. Were te perore sccess or
ere errors cotte?
Te oow orto s oe or ec coec-
to ze:
e coecto be
rto o coecto
Sorce ress port estto ress port
MAC NS resses, be
Protoco tpe
User e pssor, be
Iorto specc to te otore protoco.
Comarch SecureAdmin Administrator Desktop
1
-
8/8/2019 Comarch Data Security Solutions en 473
11/20
Data Security Solutions
Comarch SOPEL (Eectroc Stre Spport Sste)
provides complete implementation or secure qualied
electronic signature verication equipment and secure
electronic signature submission sotware. Both comply
t te L o Eectroc Stres.
Ipeet te sste eers te beets o
eectroc cotct t cstoers prters e
pro te oo secrt etres:
Undeniability te ressee cot e tt teesse or orto s bee set
Consistency and Correctness it is easy to detect any
ces e b torze peope to esses
or orto.
The electronic signature is especially useul where there
re re bers o oos or occso eec-
troc cotcts, or ere t s ecessr to store oc-
ets s eece.
Comarch SOPEL System Features
F copce wt te e reqreets oreectroc stres
Full compliance with the technical requirements aris-
ing rom the orders pursuant to the Law on Electronic
Stres
Can work with cryptographic hardware devices (HSM
Hrre Secrt Moes)
Hs terces or te ost popr pror
es: C/C#/J
Supports a variety o cryptographic key and certicate
orts (X.5093, PGP).
e ts perore b te sste oes s to
support employee document and orm signing. Employ-
ees achieve this by using their private keys with optional
time stamping. The model is implemented in such a way
that it can sign inormation using private keys connect-
e wt certcte o te x.5093 str store
te Certcte Sste Store Wos. s teoe o te Wos CrptoAPI brr es t -
epeet o te pce oe o stor te pr-
vate key that is linked to the certicates signatory. This
es tt, proe te rre s coptbe t
Microsot CSP (Cryptographic Service Provider) technol-
ogy, the modules can use any hardware token or micro-
processor card that is storing the users private key. The
copoets re peete s ActeX (Iteret Ex-
porer) or s p s (Netscpe, Moz, Freox).
The system also enables the use o private keys located
te Hrre Secrt Moe or s.
Electronic Signature Veriicationo opertos re perore s te se or-
er o eer ocet rec te sste: te sig-
nature check and, i this is passed successully, the CRL
list check (Certifcate Revocation List). I te tests -
oe tese to opertos re copete sccess-
Comrc SOPEL
Sgg compoet
Mcrosot Crpto API
Crpto TokeCSP
SmrtCrdCSP
Mcrosot Eced CSP
The signing components separation rom the cryptographic key storage
11
-
8/8/2019 Comarch Data Security Solutions en 473
12/20
Bkg, Isrce d Cpt Mrkets
ully, the integrity o the electronic signatures support-
te ocets s rtee.
Te o ceck te stres s to estbs te
oo:
Is te stre correct ccor to tetc
cec?
Ws te certcte t ts expr te e t s
se?
I any irregularities whatever are detected during these
tests, ttept s bee e to coprose te
correctess copeteess o te t processe
b te sste.
To esre tt te e coseqeces o te ecr-
to o w expresse s te eectroc stre
re cert, t s ecessr to cec eter te cert-
cte (te certctes prte e) se to execte te
stre ws t te oet o s. Ws t
sspee or e t tt oet? Is t sspe-
e or e o?
1
New ocmet
Sspeded Vercto
SgtreCeckg
CRL Lst Ceck
Icorrect Sgtre
Fed Vercto Sccess Vercto
Correct Sgtre
Electronic Signature Verifcation
-
8/8/2019 Comarch Data Security Solutions en 473
13/20
Data Security Solutions
Bsess to s er e epeet o rebe
copete t. Ts creses te rsk copes
stttos re expose to. s ces ot o
te tret o I sste bre-s ro te otse bt
so te possbt o e, obstrcto or sse
ro ter o epoees. e cocso s cer: -
portt be t so be proper protect-
e secre.
Comarch SaeDesktop is Comarchs security solution orend-user workstations in IT systems. Comarch SaeDesk-
top makes it possible to obtain diverse unctionality us-
croprocessor crs US toes eteroe-
eos eroets, c te MS Wos 98SE/
Me/2000/XP/2003 ptor Lx.
Important Functionality Stro cetr or oc ser tetcto
Atotc e eerto, certcte sse reqests,
certctes certcte propto
S e-s
Ecrpt es, ctoes scs
Creating unidirectional and bidirectional SSL authen-
tcto ces or eb oter ppctos
Se s-o tetcto or web wow
ppctos te MS Wos eroet Ecrpto e retre.
s ctot s so be to sers or
terminal environments (RDP, Citrix, X-Windows) on Win-
os or Lx ptors.
Comrc Seesktop
13
Comarch SmartCard
Comrc SmrtCrd
Comarch SmartCard s j bse crptorpc -
croprocessor card or the secure storage o sensitive in-
orto sc s crptorpc es pssors.
Te re cef se PKI (Pbc Ke rctectre)
sstes ore ore ote bk, were
er secrt strs, or expe or csto-
er trsctos, re reqre. Te crs secrt rests
on asymmetrical cryptography. The private key used to
s or te trscto eer ees te croproces-
sor cr: t s eerte tere tere s o tt
t c be cope. O te crs oer os te PIN
ber.
-
8/8/2019 Comarch Data Security Solutions en 473
14/20
Bkg, Isrce d Cpt Mrkets
Comarchs oer includes specialized hardware-program
solutions enabling strong authentication in a variety o
cstoer eroets sstes.
Oe o tese procts s Comarch Token, c s so-
to ose rre s bse o US toes. It co-
bines cryptographic smart card and card reader eatures
in one device. The programming, including the sotware
se te toe, s proce b Corc.
Corc tokes, wt J Srt Cr eectroc s-
seb, proe:
Extese ctot secrt
rbt, ese o se toe trser cpbt.
Te sotwre ttce to te tokes ebes te o-
o etres:
User PIN wt et o 4 to 16 crcters (res,
etters spec crcters)
Astrtor PIN (PUK) t et o 4 to 16 cr-
cters (res, etters spec crcters)
Crptorpc orts:
Assetrc: e esos: RSA: 512, 1024, 2048
Setrc: 3ESHs cto: M5, SHA-1
64kb cr eor (c 40kb or te kes, te
certctes te t).
14
Comrc Toke
Comrc SmrtCrd Worksop
Comarch SmartCardWorkshop sste es te
e cces o crptorpc crs tokes. I -
tion to the basic unctionality connected with workfow
crret stts reports or crs sse b te ss-
te, te sste so proes terto or t-
rpc cr persozto.
It spports te oo pses te cr e cce:
Persozto
Iss
Cce certctes Reo crs ro te sste.
One o Comarch SmartCardWorkshops basic purposes
s to e te e cce o crptorpc crs. s
oes preset tpes o t tere b te ss-
te so o te re coecte. I ts
t s possbe to o o te sste es te -
eret objects processes coecte t te cr
e cce. e objects te sste es re, o
corse, sers crs.
Users te sste st be ete b costt
and non-transerable identier (e.g., the identier o an
epoee o ceses to or t prtcr cop
cot be sse to oter epoee). s c be,
or expe, e- ttrbte bos co-
r te sers I. A ser opertos perore
te sste re bse o ts costt eter.
Cryptographic Cards, as well as users,have unique iden-
tiers in the system. In their case this is a serial number.
Te sste works o te sspto tt cr o be sse to oe ser r ts e cce (e
to te rpc persoto process). ser
possess ber o crs (ee t te se te), bt
cr eer be sse to oter ser.
-
8/8/2019 Comarch Data Security Solutions en 473
15/20
Data Security Solutions
Comarch CertifcateAuthority s Corc propretr
sotware or ull implementation o PKI systems (Public
Key Inrastructure). This involves issuing certicates or
secure e-mail, web servers, communication channels, and
user authentication and authorization. Comarch Certi-
cteAtort spports te etre certcte e cce
ro ppcto tro to expr or et.
Comarch CertiicateAuthority
Functionality or Operators Certicate searches and queries according to certica-
to pse oter etres, sc s te e o
te kes ower te te te ppcto ws
sbtte
Rejecto o certcte serces qeres
ppro o ppctos or certctes (certcte
ss)
Certicate search and queries according to validity cri-
teria (valid, cancelled and expired), name o key owner
(CN Coo Ne), pero o t, proe
Certcte cce
Geert ew CRL sts (Certcte ReoctoLsts)
Ctoe corto
Pbs certctes te rector serces
Pbs CRL sts te rector serces
Cret e CAs
Proe etos
Certicate/key recovery (KRM Key Recovery Manage-
et )
OCSP (Oe Certcte Stts Protoco) serce.
Comarch CertiicateAuthority Features Capacity to establish expanded Public Key Inrastruc-
tre t eros strbte restrto pots
H ptbe to reqreets
F coptbt teroperbt wt we
re o crptorpc sotre
Range o options or publishing certicates and CRLs
via mail, tp, WWW, LDAP (Lightweight Directory Access
Protoco)
Unique capacity to migrate cards rom the PGP stand-r to X.509
Iteroperbt t croprocessor crs
Iteroperbt wt HSM eces (H Secrt
Moe).
Comarch CertiicateAuthorityStandard Modules Registration Authority Module (RA), wc ows
sers to sbt ppctos
Registration Authority Operator Module (RA Opera-
tor) , c recees ppctos
Certifcate Authority Module (CA), when applicationsre ccepte RA Opertor te re re or sse
b CA.
Comrc CertcteAtort
15
-
8/8/2019 Comarch Data Security Solutions en 473
16/20
Bkg, Isrce d Cpt Mrkets
Comarch Security Content Management s copre-
hensive solution or Internet service providers. The sys-
te bs boosts copette te b ex-
panding the range o services that can be oered. These
ce coce o secrt optos cotet
coectos otor.
Comarch SCM lters access to www pages based on rules
dened by subscribers. These rules stipulate which pag-
es so be boce c oe b Cor-c SCM.
Te sste ows Iteret teecoctos
service providers to oer security options on a pre-paid
basis. This is accomplished without subscribers having
to st sotre.
The systems modular architecture makes it easily adapt-
be to te ees o serce proers, wo e r-
be reqreets rs ro te ber o sb-
scrbers, te re o serces oere te se o
te opertor.
Comrc Secrt Cotet Mgemet
Overview o Comarch Security Content Management
Access SetrLOGINPASSwORD
Access eed
STOP!!!
history 1
Qeres: ttp://.amzon.com ??
Rep
Control
Statistics
Filtring
Ruls
Filtr
Catgory
Sport Erotc xE- Sopp xGes xCt x
.c.p.xxx.p.p.p.ct.p.oet.p.crco.p
history 2
Mama
********
Sbscrber
Access Admstrtor
User Access
t Bse
User Proe,
Sttstcs, Hstor
Fterg Server
Iteret
16
-
8/8/2019 Comarch Data Security Solutions en 473
17/20
Data Security Solutions
Tere re two spects to proper cto secr-
t eet pt to te spece reqre-
ments. These are an operational security policy and pe-
roc secrt ts.
A Security Policy is a set o coherent andprecise proce-
res, res retos tt cop t te pre-
ws. orto ses tese to costrct,
e proe ccess to ts IT sstes -orto resorces. e poc stptes c re-
sources should be protected and how this should be ac-
copse. Its reqreets e to st te sstes
oer te t be store. Corc s exte-
se experece bt eeop pe-
et secrt poces.
Corc stro ecores o to se ts auditing
services. The specialists rom the Security and Data Pro-
tecto eprtet oer:
Penetration TestsThese simulate a break-in to a corporate network. Comar-
ch appoints a Tiger Team to perorm this kind o audit.
e te s e p o cber e-ecte
proessos wose tsk t s to coct stebre- te eeop s o pro te q-
t o te secrt sste.
Coniguration AnalysisEe te ost secre opert sstes, ppctos
or t protecto sstes re seess te e ot
been properly congured. This is why we include cong-
Comrc Servces
17
ANALYSISOF ThE ExISTING
SITUATION
EFINING ThESECURITY POLICY
REVIEW
MOERNIzATION
EVELOPING ThESECURITY POLICYOCUMENTATION
START!
IMPLEMENTINGThE SECURITY
POLICY
Methodology or Developing Security Policy
-
8/8/2019 Comarch Data Security Solutions en 473
18/20
Bkg, Isrce d Cpt Mrkets
uration analyses or the majority o operating systems,
secrt sstes, t bses ppctos s prt
o or oer. I ts process e se te secrt o-
ee e e ere o te corse o ers o
prctc experece peet secr -
eros sstes.
Security Policy and ProcedureMonitoring
e st set o ts e oer oe z co-ps exst secrt poc proceres. Ts
so be o prtcr terest to tose resposbe
or secrt tose wose tsk t s to otor te
sste ts etret.
Corc s se ts extese experece to ee-
op te etooo or secrt poc projects repre-
sete re.
Comarch Also Oers Consultation services or constructing comprehensive
orto secrt ps (secrt poc)
Des serces or ce t-ere secrt
sstes
Technology and products implementation or securing
etors, serers orsttos
Technical training or company IT security personnel.
This includes an overview o security and then ocuses
on the implemented products. It also provides trainingto ep ers epoees to be ore wre
better ore o secrt poc
Cop secrt eet wt tece
serce ssstce or te secrt sstes
peete.
1
-
8/8/2019 Comarch Data Security Solutions en 473
19/20
Data Security Solutions
P
PH PK
M PKO P
IG Gs S.A.
NOR Pos S.A
M PK S.A.
Eers
Erst&Yo Pos
Erob
Forts Pos S.A. Frtscc ece S.A .
GE Cpt
ING s S.A
Krajowy Depozyt Papierw Wartociowych (National
Secrtes epostor)
KPWG
Lbortor Kosetcze r Ire Ers
Mstersto Fs (Mstr o Fce)
Net
Norwc Uo Serces Posk (Uers Peso
F)
PeKO S.A.
Peo CM
PKO/Handlowy Powszechne Towarzystwo Emerytalne
(Uers Peso F)
Pos eeo Cro S.A.
PK Ceterte Rese Pos S.A.
RHEINHYP-RE Hpotecz S.A.
Wrt Vt S.A.
eeocj Pos S.A .
U PC/Wzj V
Vose Pos
Seected Cstomers
1
-
8/8/2019 Comarch Data Security Solutions en 473
20/20
CoArc Sp Acj t ts restere set Kr t Aej J P II 39A, etere te Nto Cort Rester ept b testrct Cort or Kr-rece Kr, te 11t Coerc so o te Nto Cort Rester er o. KRS 000057567.e sre cpt ots to 7,960,596.00 z. e sre cpt s p, NIP 677-00-65-406
Copyright Comarch 2008. All Rights Reserved. No part o this document may be reproduced in any orm without the prior written consento Corc. Corc reseres te rt to r ese ts ocet to e ces te cotet ro te to te tot otce.Comarch may make improvements and/or changes to the product(s) and/or programs described in this document any time. The trademarks serce rs o Corc re te excse propert o Corc, ot be se tot persso. A oter rs re tepropert o ter respecte oers.
EN-2008.09
Comrc Ic.
10 W 35t Street
Cco, IL 60616
Ute Sttes
poe: +1 800 786 4408
x: +1 800 684 5916e-m: [email protected]
Comrc Sotwre AG
Cetzer Str. 50
01187 rese
Ger
poe: +49 351 3201 3200
: +49 351 438 97 10
e-m: [email protected]
Comrc OOO
Precstes Pereo 14/1119034 Mosco
Rss
poe: +7 495 783 36 71
Comrc hedqrters
A. J P II 39
31-864 Kro
Po
poe: +48 12 64 61 000
: +48 12 64 61 100e-m: [email protected]
Pod
Gs, Ktoce Kro,
Lb, Loz, Poz,
Szczec, Wrs, Wroc
Begm rssesFrce Le
Germ rese,
Frrt/M
Lt Vs
Pm P Ct
Rss Mosco
Sovk rts
UAE b
Ukre Ke, L
USA Cco, M
.ce.corc.cowww.comarch.com www.comarch.pl www.comarch.de www.comarch.ru
Corc s e Cetr Erope IT bsess sotos proer
spec or bsess retosps tt xe cstoer
protability while optimizing business and operational processes. Comarchs
prr te es te st o o kowee ccte
ppe to or sotwre procts. Tese procts corporte
sophisticated IT solutions or businesses in all vertical sectors. Comarch has
a multinational network o oces employing over 2800 highly-experienced
I specsts Erope, te Me Est te Aercs.