Will EBICS Spread Throughout Europe? – A Quick Look at EBICS and Axway Financial Exchange

Mathias Bonnard, Product and Solution Marketing, Axway

“…the ability to, in a short time frame, open a new channel with a customer or partner using the protocol that they require.”

They Find Higher Value Things to Do

John Thielens, Chief Architect, Cloud Services, Axway

“One of the things that people have been doing with Axway solutions over the years has been to study, analyze, integrate, and automate, to the greatest extent possible, the business processes, especially B2B or business integration processes. This has obvious benefits in terms of efficiency and cost to operate the system. But it might leave you thinking, ‘Well, gee, what do we do with all those people?'”

Will We Ever Get Close to 100% Security? – On Location at RSA Conference 2011

Taher Elgamal, CSO, Axway

“We kind of know where the vaccines are going to come from. The mistake that people in information security get into is the perfect solution, a hundred percent ‘something.’ And a hundred percent does not work.”

Is the Future Filled with Data Breaches? – On Location at RSA Conference 2011

Taher Elgamal, CSO, Axway

“We will see a lot of these in our lifetimes, is the reality of it… Most people do not know how to manage information or access to it.”

What About WikiLeaks? What About Stuxnet? – On Location at RSA Conference 2011

Taher Elgamal, CSO, Axway

“This industry started out thinking of information security and migrated into a lot of other things. If we actually go back to information security as it was supposed to be originally, we would not allow people who are not supposed to have access to anything (to get) access to it. And we would not allow people to post things out without having the right to do that as well.”

Policies Driven by the People Who Interact with You – On Location at RSA Conference 2011

Dave Bennett, CTO, Axway

“Authorization today is so much controlled by the enterprise. In the future it’s going to be controlled more and more by the user.”

The Network’s Becoming Intelligent – On Location at RSA Conference 2011

Dave Bennett, CTO, Axway

“I think it goes beyond that. I think we have to start looking at the whole fabric, the whole network, beyond just cloud. How cloud intertwines to your corporate enterprise, how it intertwines to the new social medias, to the ad hoc users.”

The Data They Use in the Format They Choose

John Wilson, Director of Solution Enablement – FSI, Axway

“Being competitive is about finding new solutions that the market needs. It’s about developing programs. It’s meeting customer requirements. One of the requirements that a lot of people tend to overlook is organic growth. Taking care of your existing customers and building out more share of the wallet from them — this can be one of the easiest markets to grow since they’re already your customers, but it has to be done correctly.”

Axway Connections 2011, May 10-12
Scottsdale, Arizona
Hyatt Regency Scottsdale at Gainey Ranch

For more information, visit: AxwayConnections.com

Consolidate All the Financial Flows

Mathias Bonnard, Product and Solution Marketing, Axway

“All of SWIFT’s 9,000 customers will have to migrate to SWIFT 7 between now and the end of 2011. As of today we at Axway have more than fifty customers in twenty different countries using Axway’s products to handle their SWIFT flows. And Axway’s solutions are annually certified by SWIFT, and Axway’s committed to deliver high-end support for SWIFT to its clients.”

Axway Connections 2011
March 24-25
Chantilly, France
Dolce Hotel Chantilly

For more information, visit: AxwayConnections.com

Axway CSO Taher Elgamal Posts on LastWatchdog.com: “The case in support of Internet ID proposal called NISTIC”

Axway CSO Taher Elgamal posted a blog post today on LastWatchdog.com, a blog and news site that focuses on IT security. Please take a look and share your thoughts!

“I commend the White House for this idea. They’re thinking about the security of an important feature of the modern world we live in — the Internet — and they’re intent on joining the ranks of governments throughout the world who are asking a simple, all-important question: ‘How do we authenticate users?'”