- Julien Larsonneur - Gregory Dunn
Sommaire 1. FEITIAN Introduction 2. Sécurité en ligne, Légalité & Pratique Maroc Afrique 3. FEITIAN Solutions
FEITIAN Introduction www.ftsafe.com
Haute Capacité de production Vue d’ensemble Haute Capacité de production 150 Banques équipées dans le monde 45 million de nouveaux usagers chaque année Experience Globale Innovation 300 employés en R&D 14 ans d’expérience en Sécurité Digitale More than half of the company is composed by engineers exclusively dedicated to Research and Development, improving the existing security experience and creating pure innovation. ▶ Our experienced team ensures confidence in meeting new market trends Quality Control ISO9001: 2000 and RoHS (ISO14001: 2004). ▶ 20 million tokens produced annually ensures economies of scale. Team: with vast experience. We serve more than 50 countries around the world. ▶ Training: specific to each client, locally or remotely ▶ Possibility of customization.
Etat des lieux CCM Short for computers cleaned per mille (thousand). The number of computers cleaned for every 1,000 executions of MSRT. For example, if MSRT has 50,000 executions in a particular location in the first quarter of the year and removes infections from 200 computers, the CCM for that location in the first quarter of the year is 4.0 (200 ÷ 50,000 × 1,000).
Rapport Microsoft MSRT Malicious Software Removal Tool CCM Short for computers cleaned per mille (thousand). The number of computers cleaned for every 1,000 executions of MSRT. For example, if MSRT has 50,000 executions in a particular location in the first quarter of the year and removes infections from 200 computers, the CCM for that location in the first quarter of the year is 4.0 (200 ÷ 50,000 × 1,000).
CCM Short for computers cleaned per mille (thousand). The number of computers cleaned for every 1,000 executions of MSRT. For example, if MSRT has 50,000 executions in a particular location in the first quarter of the year and removes infections from 200 computers, the CCM for that location in the first quarter of the year is 4.0 (200 ÷ 50,000 × 1,000).
2010 CCM Short for computers cleaned per mille (thousand). The number of computers cleaned for every 1,000 executions of MSRT. For example, if MSRT has 50,000 executions in a particular location in the first quarter of the year and removes infections from 200 computers, the CCM for that location in the first quarter of the year is 4.0 (200 ÷ 50,000 × 1,000).
2011 Q4 CCM Short for computers cleaned per mille (thousand). The number of computers cleaned for every 1,000 executions of MSRT. For example, if MSRT has 50,000 executions in a particular location in the first quarter of the year and removes infections from 200 computers, the CCM for that location in the first quarter of the year is 4.0 (200 ÷ 50,000 × 1,000). Malicious Software Removal Tool (Microsoft
“ Le cyber-crime génère Plus de profit annuellement que le trafic de drogue ” – Nations Unies
2. Sécurité digitale, Législatif & Pratique Maroc Afrique
Maroc Numeric 2013 Internet Haut débit e-Government Development des industries Informatisation des PME
•2009 Loi n°09‐08 du 18 février relative à la protection des personnes physiques à l’égard du traitement des données à caractère personnel •2011Protection du Consommateur Loi n°31‐08 BO en date du 07/04/11 •15 Novembre 2012, Date limite pour se conformer à la Loi 09‐08
« ...Nous avons autant d’ambition que de détermination pour assurer l’insertion du Maroc, par ses entreprises et ses universités, dans l’économie mondiale du savoir.[…]» Extrait du Texte intégral du discours adressé à la Nation par SM le Roi à l’occasion de la Fête du Trône - 30/07/08 Maroc Numeric
Afrique
Declaration d’Addis Abeba sur l’ harmonization de la cyber législation L’Union Africaine 22 Juin 2012 Declaration d’Addis Abeba sur l’ harmonization de la cyber législation Adoptée par 80 experts Africains 2 Septembre 2012 L'objectif de la Convention sur la cyber-sécurité est de fournir des lignes directrices pour l’élaboration de législation sur les transactions électroniques la protection des données personnelles cyber criminalité la sécurité cybernétique aux Etats Membres
3.Nos Solutions
Authentification forte à 2 facteurs basée sur la technologie PKI. Traditionels PKI “Plug and Play” PKI Interactifs PKI StorePass Mobile PKI Authentification forte à 2 facteurs basée sur la technologie PKI. Stockage sécurisé des certificats. Certifications: FIPS, LEA, EAL5 (on chip) Flash options – 2 to 8G / 8 to 16GB Embedded browser – Zero foot print solutions Accès à distance par VPN (Cisco, Checkpoint OpenVPN et autres) Encryption des emails.
OATH standard compatible, conforme HOTP, TOTP, OCRA Traditionel OTP Challenge-Response EMV/CAP reader OTP Optical OTP Partenaire INTEL avec l’IPT OATH standard compatible, conforme HOTP, TOTP, OCRA Standard OTP, challenge response, signature transaction Assure la securite des transactions en ligne (One Time Password). VPN accès a distance (Cisco, Citrix, Checkpoint, etc.) et application web IPT: identity protection Technology
Mobile Solutions Mobile Multiple Plateformes PKI MicroSD Audio Pass Optical OTP iInterpass iReader 301 Multiple Plateformes Multiple solutions mobiles EMV conformes PKI securité mobile
PKI and Java Cards FTCOS is an operating system for smart cards developed by Feitian. Based on Java technology development environment providing a robust and flexible platform. We also provide PKI cards with all PKI functions such as storing digital certificates, signing, encrypt/decrypt, etc.
Readers Lecteurs de carte à puce hautes performances Contact Readers Contactless Readers Contact/Contactless Readers SIM card Readers iPhone Reader Bluetooth Reader Lecteurs de carte à puce hautes performances Nos différents modèles assurent : PC/SC, CCID,Driverless, avec ou sans contact EMV compliant iPhone/iPad/iTouch
Thank You Merci 谢谢 شكرا julien@ftsafe.com Stand 47