Title: Ebusiness over the Internet
1E-business over the Internet
David M. Lonsdale Chairman, CEO President May
17, 2001
2Overview
- Seeing the challenges of Internet-based business
- Leveraging technology to mitigate risk
3Seeing the challenges
4Seeing the challenges
- The Internet is evil
- The Internet is good
Honest
5 The Internet.. bridging the gaps
IP
X12
XML
Exchanges
SNA
HTTP
EDIFACT
IBM Global Network Sterling Commerce GEIS
Network ATT MCI
CommerceOne Oracle BizTalk Ariba
FTP
SMTP
EDIINT
SSL
6 IP Infrastructure Demands
- B2B integration technology challenges
- Insecure and unreliable public Internet
- Data format complexity in a multi-enterprise
environment - Rapid deployment to large and small trading
partners - Mounting real time data transmission demands
- Supplier adoption challenges
- Interoperability requirements (across hardware
platforms and operating systems) - Online exchange and collaborative commerce
initiatives will fail if they do not address
IP-based security issues
7Leveraging technology to mitigate risk
- Adopt sensible security practices
- Firewalls
- Security alert information
- System audit trails
- Backup systems
- Anti-virus software
- Password management
- Vendor provided patches
- Security policy
- Employment awareness
- Public domain tools
8Leveraging technology to mitigate risk
- Use security mechanisms designed for electronic
business - ANSI ASC X12.58
- ISO 9735
- SSL/TLS
- AS1
- AS2
- XML D/Sig
- XML-ENC
- PKI
9Leveraging technology to mitigate risk
- Use security mechanisms designed for electronic
business - ANSI ASC X12.58
- ISO 9735
- SSL/TLS
- AS1
- AS2
- XML D/Sig
- XML-ENC
- PKI
10Leveraging technology to mitigate risk
- Use security mechanisms designed for electronic
business - ANSI ASC X12.58
- ISO 9735
- SSL/TLS
- AS1
- AS2
- XML D/Sig
- XML-ENC
- PKI
11Leveraging technology to mitigate risk
- Use security mechanisms designed for electronic
business - ANSI ASC X12.58
- ISO 9735
- SSL/TLS
- AS1
- AS2
- XML D/Sig
- XML-ENC
- PKI
12Leveraging technology to mitigate risk
- Use security mechanisms designed for electronic
business - ANSI ASC X12.58
- ISO 9735
- SSL/TLS
- AS1
- AS2
- XML D/Sig
- XML-ENC
- PKI
13Leveraging technology to mitigate risk
- Use security mechanisms designed for electronic
business - ANSI ASC X12.58
- ISO 9735
- SSL/TLS
- AS1
- AS2
- XML D/Sig
- XML-ENC
- PKI
14Leveraging technology to mitigate risk
- Use security mechanisms designed for electronic
business - ANSI ASC X12.58
- ISO 9735
- SSL/TLS
- AS1
- AS2
- XML D/Sig
- XML-ENC
- PKI
15Leveraging technology to mitigate risk
- Use security mechanisms designed for electronic
business - ANSI ASC X12.58
- ISO 9735
- SSL/TLS
- AS1
- AS2
- XML D/Sig
- XML-ENC
- PKI
16One view of the world
17Private Exchange Market
- Company ABC has an EDI back office application
and an SCM application. They have trading
partners on a VAN, trading partner on VPNs over
the Internet, and small trading partners that can
not currently leverage their application. - Need create a trading environment that can
integrate to their application base and include
all their trading partners. Remove the need for
VPNs. Participate with current peer-to-peer
trading partners.
18Private Exchange Model
SAP
EDI App
Company ABC
AS2
S/FTP
VAN IXC
Internet
AS2 Peer
VAN
AS2 Spoke
Internet
Web Methods AS2
AS2
Cyclone AS2
S/FTP
S/FTP
19Conclusion
- The Internet is a potentially hostile environment
where companies can safely conduct business - Success depends on the consistent employment of a
well-defined security policy, using proven
security techniques