Government Business Security High Security Automotive

Transcription

Government Business Security High Security Automotive
The IT Security Report
by
Issue 1 | 2009
Business Security
Automotive
Government
High Security
Digital signatures
fast and simple
Locking out
the virus zoo
WANTED:
Fast multitasking expert
for healthcare sector
Data stream
under control
mobile.de relies on secunet
multisign for electronic billing
Embedded security in automobiles for protection against
malware attacks
DSV relies on new OCSP
responder from secunet
SIAM observes procedure in
the electronic processing of
classified data
The web resembles the animal
kingdom: there are many different viruses, worms and Trojans,
and researchers discover new
species every day. Visitors
intending to enter this “malware
zoo” have to be protected appropriately.
The health card is here. Starting
with the North Rhine region, it is
now progressively shifting into
active service. This small electronic card and its added value,
the time of its introduction and
the protection of highly sensitive
patient data, which can be
accessed by means of the card,
have been the subject of extensive coverage and speculation in
all the media and much discussed by experts in the run-up
to its launch.
ERP system
invoice
PDF
e-mail server
customer
When launching new technologies, companies are mainly
interested in just one thing: that
the process runs smoothly. If, in
addition, there are legal requirements to be considered, migration can quickly become very
complex. Not so with mobile.de.
Have a look at what Mr Pascal
Frohn reports about the introduction of electronic billing with
secunet multisign.
The last two issues of secuview
included reports on current
developments concerning online
access in the vehicle. Customers, manufacturers and legislators are pushing for Internet
access, remote maintenance and
car-2-car communication.
Find more on this issue
on page 3
Find more on this issue
on page 5
Internet
process channel
secured
affirmation channel
PKI
Mr Smart knows many secrets.
He saved them securely on his
computer. No one can get to
them. So it would seem. But Mr
Smart is a little uneasy about
what may be escaping through
his network cable without his
noticing. And these secrets are of
course only for the eyes of
authorised persons.
Mr Smart is right to be anxious.
There are many ways to lift data
from his computer. For example,
a Trojan may be wreaking havoc
on Mr Smart’s hard drive and
secretly sending data without
drawing any attention to itself.
Find more on this issue
on page 6
www.secunet.com
Find more on this issue
on page 10
EDITORIAL
CONTENT
03 Digital signatures fast and simple
manages Germany’s
04 secunet
largest distance education provider
05 Locking out the virus zoo
Fast multitasking expert
06 WANTED:
for healthcare sector
Dear Reader,
Dr. Rainer Baumgart
Global financial crisis, recession, downsizing. These issues have
been the media focus for months now. But despite all the negative
prognoses and announcements, there is a gleam of hope. Companies that fly in the face of the economic slump and actively challenge it. Take secunet, for example. Last year’s double digit growth
in revenue speaks for itself.
And to whom do we owe this success? On the one hand, of course,
to our staff who work on solutions for our customers with great
motivation and reliability each and every day. However, it is you, our
customers and partners, whose contribution is even more critical.
Your confidence in us strengthens us in our day-to-day work and
has ensured our success for more than 10 years now. We would like
to take this opportunity to express our gratitude – by providing consistently reliable solutions and clear communication.
We make every effort to offer you the stability and reliability that is
so crucial, particularly in times such as these. However, this in no
way prevents us from responding to your wishes and requirements.
This issue of secuview outlines the challenges we have faced in the
past few months. In addition to reports on current projects, you will
find information on innovative developments which make us optimistic that we will safely weather the next few years despite the crisis and the weak economy. You can count on us.
07 What is …?
08 ELSTER must go through customs
09 Security for 540,000 citizens all at once
10 Data stream under control
SINA meets Beethoven –
invitation to the SINA User Day
11 IT Security Check 2009
Professional project management at secunet
Events, important dates
12 Successful co-operation at the CeBIT 2009
Best regards
Rainer Baumgart
2
Business Security
Digital signatures fast and simple
mobile.de relies on secunet multisign for electronic billing
Continuance of page 1
Mr Pascal Frohn, Business
Operations Manager at mobile.de:
“How did the migration to electronic billing go? In a nutshell,
fast and simple. I received an email from secunet with the signature program and a configuration
manual attached. Together with a
secunet consultant I set up the
configuration over the phone.
secunet multisign was installed in
next to no time and I was able to
send electronic invoices to my
customers the very same day.
The difference between the
secunet solution and those of
other providers is that it is possible to integrate it easily into our
ERP system. This not only saves
time, but also reduces anxiety
and costs because customerspecific adaptations to an ERP
system are extremely complex.
With secunet multisign there was
no need to reprogram anything –
no risk at low cost. That clinched
it for me.
We opted for the service version
of secunet multisign. That means
that invoices are not signed inhouse, but instead go to a data
centre of the German Post for
signature. From a technical perspective, this amounted to simply
adding one more step to the
billing process: the PDF invoice
generated by the ERP system is
sent as an e-mail attachment
directly to the signature service
via a proxy. There the PDF invoice
is signed and sent back to our email server. It is sent to our customers from there. The only thing
that was added was the completely automatic exchange with
the secunet multisign solution.
The signatures are just one
aspect of many that need to be
considered in the case of electronic billing. To make the entire
process easier for customers,
secunet offers additional services
besides qualified signatures.
These include e-mail encryption
and distribution, invoice archiving and management of the system. A further customer portal
makes it possible for the final
recipient of the invoice to independently view all invoices
received. For secunet customers,
this means savings in terms of
time and money since there is no
need to look up invoices or
resend them.
We never imagined it would be
so easy to save on costs and still
comply with all legal requirements. The integration of the certified secunet multisign solution
was child’s play and had us convinced fast. Meanwhile, we have
outsourced our billing to a service provider – secunet multisign
coped with the transfer with no
problems at all and everything
continues to run reliably.”
For more
information
contact
Roland Krüger
Phone: +49 - 201- 54 54 - 20 52
[email protected]
secunet multisign can be
integrated fast and simply into
existing ERP-Systems.
ERP system
invoice
PDF
seperates attachment from e-mail
Proxy (signing program)
e-mail server
secunet
multisign
invoice
recomposes signed
attachment & e-mail
invoice
with signature
customer
www.secunet.com
3
Business Security
secunet manages Germany’s largest distance
education provider
The “Institut für Lernysteme” commissions secunet with Managed Security
Services
A-Levels, Technician or Business
Administration – these are just a
few of the courses offered by the
“Institut für Lernsysteme”, or ILS
for short. These are all distance
learning courses, i.e. inquisitive
minds throughout Germany and
beyond national borders can take
advantage of the offering – via the
World Wide Web. About 60,000
course participants communicate
with ILS over the Internet every
year. Every day more than 5,000
customers access the online
study centre to exchange information with tutors and peers, view
examination results or update their
personal data in the portal. Consequently, IT security is of considerable importance at ILS.
For more
information
contact
Guido Höfken
Phone: +49 - 201- 54 54 - 20 65
[email protected]
In view of the large circle of customers and constant availability
of the website, two criteria are
critical for the company: on the
one hand, protection of personal
customer data and, on the other
hand, high levels of reliability. In
order to meet these requirements
in the best way possible, secunet
developed a tailored solution
together with ILS which secures
the web server farm.
Responsibilities for the web server were split at the outset to
boost security: ILS continues to
be responsible for the content; a
large data centre operator in
Southern Germany takes care of
hosting; and secunet was
commissioned with security
operations. Our Managed Security
Service provides ILS with a “noworries package”.
In order to increase the availability and reliability of the websites
as well as the customer portals,
sensitive data such as personal
customer data is kept separate
from web content on servers. Socalled load balancers are used to
ensure that requests via the web
are distributed evenly to the individual web servers. In case of a
failure of web server A, the Internet user is forwarded to web
server B or C. Of course, the user
does not notice that this has
occurred. Meanwhile, server A is
repaired by secunet.
By monitoring the entire system
environment 24 hours a day, we
are able to detect and directly
counteract failures within just a
few minutes. secunet is also
responsible for the patch
management of the web server
farm to ensure that the IT environment remains protected at top
security levels. This is the only
way to guarantee that the server
farm is armed against dangerous
attacks and other risks from the
Internet.
“With secunet’s Managed Security Service there’s no longer any
need for us to worry about our IT
security. If we still have questions
or want changes, we can reach
the secunet team night or day
using the 24/7 hotline. But, fortunately, this has not been necessary,” says Thorsten Boek, IT
manager at ILS GmbH.
For the ILS Portal secunet’s Managed Security Services guarantee the security of students’ personal
data and a high level of reliability.
4
Automotive
Locking out the virus zoo
Embedded security in automobiles for protection against malware attacks
Continuance of page 1
Dangers such as availability
attacks or contact with malware
should of course remain outside
so that vehicle functions are not
interfered with. However, the protection concepts known from the
PC world are not easy to implement in the automotive sector.
The big question is this: how do
you protect visitors to the animal
kingdom from species which are
as yet unknown? That is, how
can you keep a vehicle free of
malware which has not even
been developed yet?
With this situation in mind,
secunet has created a dual-level
method for securing open communication interfaces in the vehicle. The Secure Communication
Unit was presented in the previous issue of secuview. It protects
the vehicle against denial-ofservice attacks at IP packet level.
However, it offers no protection
against malware. In such cases,
only security at application level
can help – and the Protection
Unit is responsible for this.
But how does it manage to
detect viruses in the long term
which do not yet exist? The multimedia and Internet applications
running in the vehicle are known
and are specified by a carmaker
so that security at application
level is based on the detection of
faulty behaviour during runtime.
The Protection Unit therefore
aims to detect the resulting faulty
behaviour, and not to identify
every single virus. To do so, the
Protection Unit makes use of two
approaches taken from the area
of operating systems: security
extensions which make it possible to define access to system
resources for each application,
on the one hand. And on the
other hand, protection can also
be effected by executing applications in a virtual environment or
sandbox. To put it simply: an artificial barrier is created between
the unsecure applications and
the vehicle, similar to a moat
around an enclosure at the zoo.
If a new animal – i. e. a virus –
gets past the moat, it can be discovered by zoo staff – even if
staff are not familiar with that
particular animal. The Protection
Unit (PU) works as an autonomous unit independent of the
actual application processor and
takes on the role of keeper. It
thus watches out for viruses
which get by the artificial barrier.
To do so, it is not necessary for it
to know which virus has jumped
the barrier, only that something
has escaped from the secured
enclosure. This makes it possible
to contain new viruses, even if
the PU does not know them. In
this way, the PU monitors the
security extensions as well as the
virtual environment. If it discovers any irregularities, dedicated
emergency run properties are
activated. These range from terminating the faulty process all the
way to restarting the system in
protected mode with base functionality only.
In conjunction with the Secure
Communication Unit, the Protection Unit thus offers comprehensive protection for vehicles with
open Internet access – even if
the virus zoo keeps growing bigger with every passing day.
www.secunet.com
By means of the virtual
environment the Protection Unit
builds up an atificial barrier
between insecure applications
and the vehicle.
For more
information
contact
Dr. Marc Lindlbauer
Phone: +49 - 201- 54 54 - 25 01
[email protected]
5
Government
WANTED: Fast multitasking expert
for healthcare sector
DSV relies on new OCSP responder from secunet
contact
One issue which has been
resolved with less noise in the
wake of the “world’s biggest IT
project” is the actual security and
control of the gigantic volume of
data behind the scenes with
regard to the high-profile card.
There are two major prerequisites
which must be met to
ensure the secure and
successful use of the
health card: the first is
a technical infrastructure with a very secure
design. The second is
making sure that only
those
users
with
proven authorisation
are
permitted
to
access the secure
telematics infrastructure. In other words: when the
approx. 2.5 million registered
healthcare professionals and
experts connect to the telematics
infrastructure via the connector, it
must be verified that every single
one of them is currently author-
Steffen Heyde
Phone: +49 - 201- 54 54 - 20 25
[email protected]
«
ised to do so. Digital certificates
are used in security-critical areas
to secure these electronic connections. This kind of certificate
is basically the equivalent of an
electronic identity which has
been confirmed by a trusted entity. A public key infrastructure
(PKI) serves as the technological
basis.
S-TRUST since 2001. gematik
found a very experienced technology partner in this company
and commissioned it with the
implementation and operation of
the central services and components of the PKI. The so-called
OCSP responder is a major component of this PKI. OCSP is the
international standard for determining the current
validity of a digital cerDr. Rüdiger Mock-Hecker
tificate. This is carried
Head of the Card Systems Business
out as an online
Division of the DSV
request, i.e. in realtime,
which makes it posWe have been working very successsible to query the status
fully with secunet for a long time. This
promptly and simply.
co-operation has also proven to be
The
DSV
already
suitable in the gematik sector.
makes successful use
of the OCSP responder
from secunet in its own
trust centre, in compliThe provision and administration ance with the German Signature
of digital certificates is one of the Act (SigG). This comes as no surcore competencies of the DSV prise: after all, this OCSP respon(Deutscher Sparkassenverlag) der has a special internal archigroup, which has been operating tecture and various security funca trust centre for electronic tions without which it would not
signatures under the brand be suitable for use under the
«
Continuance of page 1
For more
information
How does the Online Certificate Status Protocol (OCSP) work?
During the registration process the
so-called
“trusted
instance”
accepts the data of a requester. A
digital certificate is then issued for
this person and is digitally signed
by this instance. It contains the
public key of the certificate holder and additional data, e. g. the
holder’s name and address. Any
third person carrying out an electronic transaction with this certificate holder can verify the holder’s
6
certificate – and thus the holder’s
network identity – by querying the
trusted instance for the status of
the certificate.
There are a number of technical
options available to verify the validity of a certificate. One common
method is to check a so-called
revocation list which contains all
invalid certificates. This list is very
long and must be downloaded and
verified at the certification instance.
In addition, this list contains only
certificates which have been
revoked by the instance; it does not
prove that a certificate has even
been issued by this instance.
The OCSP responder of a trusted
instance makes it possible to perform such checks with considerably more reliability as well as
speed. Upon request, the OCSP
responder provides online information on the status of a dedicated
digital certificate. In compliance
with RFC 2560, this standard
response consists of the status, a
time stamp and an electronic signature via the OCSP responder. In this
way, it is possible to verify the validity of the certificate, the topicality
and integrity of the response and
the integrity of the responder.
Government
most stringent security requirements – e. g. those of the German
Signature Act. In addition, the
approval from the German Federal Office for Information Security
(Bundesamt für Sicherheit in der
Informationstechnik) and the
Federal Network Agency (Bundesnetzagentur) confirm the
extremely high level of security.
Although it was the best solution
in terms of security features, the
performance of the components
had to undergo considerable
improvement before they could
be used in the telematics infrastructure. The requirements:
high-speed parallel responses to
many requests with the shortest
possible response times for the
provision of information on initial
and changed certificate statuses.
Again, DSV relied on the experts
from secunet who had extensive
know-how in the field of telematics and the gematik specifications in general. The result is a
new version of the OCSP responder software which combines
existing high levels of security
with high-performance implementation – an entirely unique
solution on the market. DSV is
now in a position to view subsequent loads in the gematik network with equanimity.
secunet’s OCSP-Responder
provides short response times in
the telematics network.
What is ...
… secunet’s security flash drive really?
The security flash drive, secunet’s new helmsman, takes the rudder from
the previous ELSTER flash drive. The ELSTER flash drive is not (yet)
leaving the vessel entirely, but will sail calmer waters in future and is
not longer commercially available. Starting now, those who want
economical, flexible and secure control of their electronic tax
declarations are right on course with the security flash drive.
www.secunet.com
7
Government
ELSTER must go through customs
Certificates for the tax authorities will soon be used for customs too
More than 1.5 billion tonnes of
freight are exported worldwide
every year – and have to pass
through customs. For a few years
now, it has been possible to submit export declarations free of
charge via the Internet, which
has been of particular advantage
to small and mid-sized companies. As part of the security initiative of the European Commission, an electronic export declaration must be submitted to the
customs authorities for all
exports of goods as
of 1 July 2009.
For more
information
contact
Kurt Maier
Phone: +49 - 201- 54 54 - 30 39
[email protected]
The new online export declaration can be used as a cost-neutral solution for this purpose. The
involved party must prove its
identity via the customs portal.
This authentication is carried out
by means of advanced electronic
signatures. Now you might say:
“I seem to remember hearing
something about that.” ELSTER,
the German electronic tax declaration program, works using the
same system. The public authorities had that very idea and came
to an agreement that companies
can use the same certificates for
online export declarations as
they do for electronic tax declarations. These are provided free of
charge by the German tax authorities via the ElsterOnline portal (www.elsteronline.de). In addition, the entire authentication for
processing the new online export
declarations uses the same system as for tax declarations.
Three security levels are available
for the certificates required for
processing customs declarations: “ELSTERBasis” saves the
certificate on a PC. The disadvantage is that the data may be
lost in the event of user errors or
virus attacks, or may even be
stolen as a result of phishing
attacks. “ELSTERPlus” includes
the use of a signature card and
relies on certificates provided by
German trust centres which are
not free instead of the complimentary certificates of the tax
authorities. The security of these
processes is quite high, as
are the additional costs. The
“ELSTERSpezial” process with
security flash drive has proven to
be the best solution for high
security at low cost. The flash
drive is immune to phishing
attacks, is computer-independent and is therefore suitable for
mobile use.
The implementation of the security initiative also aims to fight
VAT evasion, among other things.
The security processes implemented by secunet in the customs sector is a big step in this
direction.
From 1 July 2009, all export goods have to be declared online. The ELSTER cerificates provide a
secure identification on the internet.
8
Government
Security for 540,000 citizens all at once
Firewall upgrade for Macao
Are you familiar with Macao?
Never mind, a short lesson in
geography won’t hurt: Macao is a
Special Administrative Region
belonging to China and situated
not far from Hong Kong. The
sovereignty of the former Portuguese colony was transferred
back to the People’s Republic in
1999. The region’s main sources
of income are tourism and gambling.
But the two experts from secunet
who flew to Macao at the end of
October 2008 had little time for
poker or roulette. In their luggage: the firewall architecture
upgrade concept for the extensive network. But why would a
small city-state such as Macao
need a highly secure and highly
available network? In response, a
review of past events:
In 2002, Macao commissioned
Giesecke & Devrient along with
Siemens with the development
and introduction of citizen’s
cards for all the people of Macao,
the Macao ID.
By means of a public key infrastructure, every citizen received a
digital ID which contains not only
biometric features for automatic
border controls, but also an individual electronic signature. This
makes it possible for each of the
540,000 Macanese citizens to
prove their identity and enter into
legally binding contracts on the
Internet. For this purpose, secunet designed the secure network
infrastructure and protection
from external threats as well as
the components of the public key
infrastructure.
Now back to the present: carrying out public authority business
and other official transactions
requires special protection, of
course, since the personal data
of the residents is transmitted via
the network. The old firewall
cluster no longer constituted the
latest technology, and it was no
longer possible to ensure acrossthe-board protection of the network against new dangers from
the web. Consequently, the Identification Department (DSI) of
Macao contacted Giesecke &
Devrient, whose performance
had positively impressed them in
2002. G&D in turn commissioned
its subsidiary secunet, which has
extensive know-how in the field
of network security.
In collaboration with the Identification Department, secunet
developed a concept and used a
reference system in Germany to
test and preconfigure the components which were to be implemented. One advantage of the
replicated system: in case of failures or problems, the error situation can be replicated in Germany and quickly fixed. In addition,
this enabled fast and error-free
installation of the highly secure
and highly available cluster comprising three new, high-performance firewall appliances. The
platform is easy to manage and
cost effective, consisting of a
stateful inspection firewall which
can be extended to include an
IPSec VPN, gateway antivirus
and antispyware systems, intrusion prevention and a web application firewall. Special software
is used for monitoring network
activities and makes it possible
for administrators to recognise
trends in network load and respond to hardware and software
problems with greater speed.
Particular attention was paid to
operation: snapshots, online
backups and disaster recovery
can be carried out within a very
short timeframe. Monitoring critical services and allocating new
resources (RAM, CPUs) help
make the administrator’s day-today work easier.
This comprehensive protection
now ensures that the citizens of
Macao can continue to carry out
their business and public sector
transactions securely 24 hours a
day via the Internet. Even if one
or two components are down,
the system functions for the
users as usual and the defective
parts can be replaced without
interrupting operation.
www.secunet.com
Macao
For more
information
contact
Kurt Maier
Phone: +49 - 201- 54 54 - 30 39
[email protected]
9
High Security
Data stream under control
SIAM observes procedure in the electronic processing of classified data
Internet
process channel
SIAM
secured
affirmation channel
web server
IDM
PKI
Continuance of page 1
For more
information
contact
Jörg Kebbedies
Phone: +49 - 201- 54 54 - 35 27
[email protected]
It could also happen that Mr
Brazen assumes Mr Smart’s
identity and sends e-mail messages in his name. Mr Smart will
then be able to read his secrets
in the newspaper.
And this will not do. Consequently, we came up with an idea. First
of all, the data in Mr Smart’s
repository must only be able to
leave by a single exit. Secondly,
Mr Smart wants to know what
leaves by that exit and where it is
bound. Thirdly, he wants veto
rights so that data can only get
out with his express permission.
Fourthly, he would like it to be
possible for the recipient to be
certain that the sender is actually
Mr Smart and not Mr Brazen.
And fifthly, Mr Smart would like
to be able to track where he sent
what secret when, should there
be any doubt.
We have solved Mr Smart’s problem with the SIAM module. SIAM
is a kind of security guard and
monitors the flow of data. The
system starts by verifying Mr
Smart’s identity. When he signs
on, it checks the login and sets
up a secure back-channel to Mr
Smart. If Mr Brazen tries to assume Mr Smart’s identity again, it
will no longer help him one bit
because the back-channel set up
by SIAM does not end at Mr
Brazen’s computer but on Mr
Smart’s. He himself immediately
sees that something is not right
since SIAM asks him right away
whether the command to forward
data is really to be executed. And
if Mr Smart fails to confirm, Mr
Brazen’s attempt will not be successful.
Therefore, Mr Smart gains control of the processes executed in
his name. Checks are performed
where they are required
according to security
policies. Under these
conditions, even e-mail
can be used as a secure
transmission medium. Mr
Smart’s supervisor can be
sure that the electronic messages he has received from Mr
Smart were actually sent by Mr
Smart. In this way, he has better
control over the entire processing
of classified data.
In addition to process control,
SIAM has a logging service. This
keeps track of all the processes
executed by Mr Smart. In this
manner, it is possible to look
back and see exactly who did
what when.
SINA meets Beethoven –
invitation to the SINA User Day
This year’s SINA User Day will be
held in Bonn at the “Beethovenhalle” on 15 and 16 June.
We cordially invite you, as a user
10
of our SINA solutions, to attend.
The programme is identical both
days so that you can make your
own schedule. Is there anything
that you, the user, are particularly interested in? Please let us
know. We are already accepting
registrations and suggestions.
PINBOARD
More
information
IT Security Check 2009
on
number of attacks on IT systems continues to grow
43 percent of all companies and
public authorities observed an
increase in the number of
attacks on their IT systems in
2008. These are the results of
secunet’s IT Security Check
2009 study. The annual webbased survey is based on the
responses of 275 IT decisionmakers, IT executives and IT
managers from Germany. For
the most part, the attackers set
their sights on the public sector:
65 percent of those surveyed
indicated that they had fallen
victim to attacks with greater fre-
quency in 2008 than in 2007. The
healthcare sector and providers of financial services figured
at the very top of the attackers’
list in 2008. Respectively, 57
and 50 percent of those surveyed in these sectors reported
that attacks were on the rise.
If you would like more information,
the report is available upon
request: [email protected]
Professional project management at secunet
As a purely project-driven
enterprise, we make professional project management
a top priority. As a result,
40 project managers
underwent further inhouse training during
the summer of last
year. Another 12 very
experienced staff
+++
Events
+++
Important dates
members took part in a sixmonth qualification phase at
our training centre in Munich,
where they prepared for the
certified project management
examination. The course is
based on the internationally
recognised standards of the
International Project Management Association (IPMA), rep-
+++
Events
resented in Germany by the
“Gesellschaft für Projektmanagement” (GPM). The training was
provided by Resultance, a consulting company specialised in
this field. All participants successfully passed the examination. Congratulations! This is
how we consistently raise the
quality of our projects.
+++
IDC IT Security Roadshow – Kiev, Bucharest, Sofia – 24 + 26 February 2009, 17 March 2009
CeBIT – Hannover – 3-8 March 2009
Border Security – Warsaw – 4-5 March 2009
Security Document World – London – 26-27 March 2009
RSA Conference – San Francisco – 20-24 April 2009
23. AFCEA Exhibition – Bonn – 6-7 May 2009
11. German IT Security Congress – Bonn – 12-14 May 2009
SINA User Day – Bonn – 15-16 June 2009
Biometrics – London – 20-22 October 2009
Public IT Security – Berlin – 27 October 2009
www.secunet.com
11
3-8 March
Hall 11, Stand D 61
Successful co-operation
at the CeBIT 2009
secunet and partners present the results of their co-operation in Hannover
The CeBIT will be opening its
gates on 3 March 2009 to all
who are interested in IT under
the motto “Discover a world of
ITC opportunity”. Hundreds of
exhibitors will again be showing their latest solutions and
products at the number one
digital business marketplace.
This year, the IT security
community will be gathering
in Hall 11.
secunet is backed by reinforcements at the stand:
together with our partners
InterComponentWare,
Intraproc and the German tax
authorities in Bavaria, we will
be presenting our latest developments. Come by Hall 11,
Stand D 61 and experience the
potential of this specialist network firsthand.
Our partners:
InterComponentWare AG &
secunet – secure and efficient ehealth solutions
Intraproc GmbH & secunet –
efficient applications for electronic ID documents in compliance with ICAO standards
Today, sustainably raising the
quality of medical care means
introducing innovations with
structure and farsightedness –
and that with limited resources.
InterComponentWare AG (ICW)
is shaping the future with
networking information technologies.
Intraproc GmbH (Ratingen, Germany) has been a global player
for more than 20 years in the
areas of planning, implementation and distribution of cards and
personalisation systems. In collaboration with Speed Identity AB
(Stockholm), Intraproc develops
terminals for live enrolment of
biometric data, e.g. for e-IDs and
e-passports. During the enrolment process, the picture data is
subjected to automatic verification in compliance with ICAO criteria. The direct capture of the
digital data accelerates application processing.
ICW's connector for the healthcare system, the “ICW Healthcare Connector based on SINA”,
relies on secunet’s security technology. Together with the application connector from ICW, the
secunet network connector,
which is based on the SINA highsecurity solution, ensures a
secure connection and thus protects the exchange of data
between all stakeholders.
secunet biomiddle is used for
integration at public authorities.
This middleware meets regulatory requirements and is suitable
for flexible combination with different terminals. Please visit us
and test this citizen-friendly selfservice terminal at our stand.
German tax authorities in Bavaria & secunet – security and
efficiency for citizens
The Bavarian State Office for Tax
Administration (BayLfSt) is the
contact partner of the Bavarian
State Ministry of Finance in the
area of tax administration. Its
responsibilities include providing
technical services for all tax
offices. Under the leadership of
the BayLfSt, the entire concept
of the ELSTER electronic tax
declaration system was developed and implemented.
secunet provides support to
ELSTER in matters concerning IT
security.
The security components for the
ElsterOnline portal as well as the
electronic certificates used for
this purpose are the result of this
successful co-operation. The
ELSTER certificates are also in
use by Customs within the scope
of a current project.
IMPRINT
Editor:
secunet Security Networks AG
Kronprinzenstraße 30
45128 Essen - Germany
Telephone: +49 201 54 54 - 0
Responsible for the content:
Marketing/Communications
[email protected]
Chief Editor:
[email protected]
Design:
Chromedia West GmbH
www.chromedia.de
Copyright:
© secunet Security Networks AG. All rights reserved. All contents and structures are copyright protected. All and any use not
expressly permitted by copyright law requires prior written permission.
12