SlideShare a Scribd company logo
BASE24 is a product of ACI Worldwide, all copyrights acknowledged.
1Copyright comForte 2014
This part of the screen/slide are the so-called speaker notes
Viewing instructions: please see actual slide
Copyright comForte 2014 2
Copyright comForte 2014 3
In this presentation, we are assuming that we are a financial institution using BASE24 classic - and that we have no
plans to change that in the next few years. ((Side note: we might be looking at other options but we are aware that
fully migrating off BASE24 is a multi-year project))
That leaves us with a stable, yet old, unsecure and not-agile system. The word map above shows technologies and
components which are deeply entrenched into BASE24. All of the technologies are decades old and are *not* what
today is called ‘agile’.
4Copyright comForte 2014
Here are a few trends which are shaking up the financial industry (and others!)
5Copyright comForte 2014
This is what IBM is offering when it comes to modernizing “mainframe legacy applications”. Please note how they
have managed to integrate the mainframe into modern worlds but (1) running Linux partitions right on the
mainframe and (2) by providing “gateways” or “adaptors” running in this Linux component which enable the legacy
applications to take part in modernization initiatives.
Compare this with the way HP NonStop systems are typically NOT integrated into the Enterprise, more on this later
6Copyright comForte 2014
Simply put, we don’t have the tools for the job. Assume your NonStop BASE24 system is supposed to be integrated
in a new mobile app your business is developing:
- implement new functionality in TAL?  Not really an option
- How to provide a SOAP (or JSON/REST) wrapper around a ‘service’ provided by green screens?
7Copyright comForte 2014
Using modern tools is the answer – we’ll look in more details next
8Copyright comForte 2014
Copyright comForte 2014 9
A rock-solid and proven application to process POS and ATM transaction. Looks good from a high level – but how
correct is this picture?
10Copyright comForte 2014
As we typically run BASE24 classic very much in legacy mode, this is how it looks like from the C-level and business folks
perspective.
Let us not kid ourselves though – BASE24 is *not* integrated well into the Enterprise – also it severely lacks in certain areas of
compliance. That puts the application (and platform!) in danger of being replaced by something new.
Also, even if there are plans for replacement they typically involve a rather long schedule – can you afford to wait that long
given all the aforementioned business drivers?
The good news: as we’ll see, BASE24 (and other ‘legacy’ NonStop applications) can easily be
• SOA-enabled for better integrations
• secured for better PCI compliance
 But typically they are NOT
11Copyright comForte 2014
Further good news: typically the changes can be done with very little or even NO source code changes
12Copyright comForte 2014
Copyright comForte 2014 13
Here the business process is to add an ATM to a BASE24 system. The current process typically involves entering the
relevant data (description, IP address, ATM details) into a “green screen” user interface. That process is (1) manual
and laborious and (2) error prone.
14Copyright comForte 2014
In a SOA (Service Oriented Architecture) approach, the BASE24 system is presenting a service “Add ATM” (and
“INFO ATM <name>) to the integration layer. That service is then invoked from existing business
application/processes. The business benefits are:
- Streamlined operation
- “Live” view of all ATMs available for other applicatinos
- Reduction of manual, error-prone work
15Copyright comForte 2014
This presentation is not very technical by design – hence this slide only provides a short description of the
technologies involved.
16Copyright comForte 2014
(This example is taken from the UK, other geographies might not have this requirement).
Today, customers in branch offices authenticate themselves via either a passport or a signature. In this example,
the business wants to authenticate bank customers in the branch using their debit card and Chip and PIN
technology. This is both easier for the end user as well as more convenient (no need to carry a passport or ID
document) and more secure.
Many BASE24 classic implementations already have Chip&PIN technology built-in, but not available as a service on
BASE24.
17Copyright comForte 2014
Here the technology involved is a bit more complex. But do not let this picture confuse you – interaction between multiple business applicationsof this complexity is perfectly
normal in modern IT environments. Here is a bit detail on how this would work:
BASE24 can provide a service via the integration layer to authenticatethe card (typically by converting it into a balance enquiry request at the integration layer). Pass or Fail is
returned to the requestorof the service
The implementation would be roughly as follows:
• A ew “Authenticatewith debit card” Application (let’s call it AWDCA) at branch is developed from scratch
• AWDCA has to be connected to the PeD ( PIN Encryption Device) via an internal network
• The AWDCA starts a transactionat the PeD (step 1)
• The customer swipes card, device does Offline PIN check. The PeD does *not* use offline PINverification but creates request for transaction
• Step 2: the PeD transactioncan be any transactioncode which is sent to the FEP layer at the bank which forwards it to the comforte service wrapper for BASE24(step 3). The
wrapper generates a BASE24 ISO Balance Inquiry request
• (still step 3, see next slide): the Integrationlayers sends request to CSL
• (still step 3, see next slide): CSL product receives WSDL and converts it into format readable by BASE24
• (still step 3, see next slide): CSL sends request into BASE24 and receives response
• (still step 3, see next slide): BASE24 sees normal balancy inquiry and treats it as coming from an ATM – doing Chip/EMV authorization as side effect
18Copyright comForte 2014
• (Step 4): Response is translatedinto “success”or “fail with error message” (balance inquiry result is tossed) and returned to AWDC
• The bank teller would simply use the new AWDCA and could now happily authenticate its customers.
Copyright comForte 2014 18
Note the similarity to slide #16
19Copyright comForte 2014
The last example is not about new business requirements but about being compliant with the PCI framework.
Out-of-the box, BASE24 classic can NOT comply with PCI 3.4, also BASE24 can NOT encrypt TCP/IP connections
between XPNET and ATMs or POS devices.
20Copyright comForte 2014
Greg Swedosh gave a good presentation about compliance at the NonStop technical Bootcamp 2014 – see
http://www.slideshare.net/thomasburg/you-may-be-compliant-but-are-you-really-secure
21Copyright comForte 2014
The following two comForte products improve compliance and security for BASE24 classic – again without any
source code changes:
• SecurData for protection of data at rest (PCI 3.4)
• SecurLib/SSL-AT for encryption of ATM or POS traffic
22Copyright comForte 2014
Copyright comForte 2014 23
We talked about how proper tools can help to move from an isolated, legacy BASE24 system to a service-enabled,
modern and secure BASE24 system – without requiring any source code changes
24Copyright comForte 2014
To keep BASE24/the NonStop relevant …
…It is about the business case!
… and about the application (BASE24 classic) and platform (HP NonStop) being perceived as flexible
25Copyright comForte 2014
Any questions please use http://comforte.com/company/contactform/
26Copyright comForte 2014

More Related Content

What's hot

Cusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp ExtensionsCusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
August Detlefsen
 
LAEF Annual Report 2013-14
LAEF Annual Report 2013-14LAEF Annual Report 2013-14
LAEF Annual Report 2013-14
laef_laef
 
Fraud detection system
Fraud detection systemFraud detection system
Fraud detection system
baladutt
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
Maxime ALAY-EDDINE
 
MIgrating from Single Instance to RAC via Dataguard
MIgrating from Single Instance to RAC via DataguardMIgrating from Single Instance to RAC via Dataguard
MIgrating from Single Instance to RAC via Dataguard
Fuad Arshad
 
Trace File Analyzer - Usage and Features
Trace File Analyzer - Usage and Features Trace File Analyzer - Usage and Features
Trace File Analyzer - Usage and Features
Sandesh Rao
 
Offensive Payment Security
Offensive Payment SecurityOffensive Payment Security
Offensive Payment Security
Payment Village
 
Hybrid Data Guard to Cloud GEN2 ExaCS.pdf
Hybrid Data Guard to Cloud GEN2 ExaCS.pdfHybrid Data Guard to Cloud GEN2 ExaCS.pdf
Hybrid Data Guard to Cloud GEN2 ExaCS.pdf
ALI ANWAR, OCP®
 
Oracle RAC features on Exadata
Oracle RAC features on ExadataOracle RAC features on Exadata
Oracle RAC features on Exadata
Anil Nair
 
[WhaTap DevOps Day] 세션 6 : 와탭랩스 DevOps 이야기
[WhaTap DevOps Day] 세션 6 : 와탭랩스 DevOps 이야기[WhaTap DevOps Day] 세션 6 : 와탭랩스 DevOps 이야기
[WhaTap DevOps Day] 세션 6 : 와탭랩스 DevOps 이야기
WhaTap Labs
 
Oracle Flex ASM - What’s New and Best Practices by Jim Williams
Oracle Flex ASM - What’s New and Best Practices by Jim WilliamsOracle Flex ASM - What’s New and Best Practices by Jim Williams
Oracle Flex ASM - What’s New and Best Practices by Jim Williams
Markus Michalewicz
 
Big Data Analytics (ML, DL, AI) hands-on
Big Data Analytics (ML, DL, AI) hands-onBig Data Analytics (ML, DL, AI) hands-on
Big Data Analytics (ML, DL, AI) hands-on
Dony Riyanto
 
Microservices - Death of the Enterprise Service Bus (ESB)? (Update 2016)
Microservices - Death of the Enterprise Service Bus (ESB)? (Update 2016)Microservices - Death of the Enterprise Service Bus (ESB)? (Update 2016)
Microservices - Death of the Enterprise Service Bus (ESB)? (Update 2016)
Kai Wähner
 
Heat Map and Automatic Data Optimization with Oracle Database 12c
Heat Map and Automatic Data Optimization with Oracle Database 12cHeat Map and Automatic Data Optimization with Oracle Database 12c
Heat Map and Automatic Data Optimization with Oracle Database 12c
Digicomp Academy Suisse Romande SA
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
Marakana Inc.
 
Platform as a Service (PaaS) Providers
Platform as a Service (PaaS) ProvidersPlatform as a Service (PaaS) Providers
Platform as a Service (PaaS) Providers
Cloud Computing Wire
 
Apache Kafka as Data Hub for Crypto, NFT, Metaverse (Beyond the Buzz!)
Apache Kafka as Data Hub for Crypto, NFT, Metaverse (Beyond the Buzz!)Apache Kafka as Data Hub for Crypto, NFT, Metaverse (Beyond the Buzz!)
Apache Kafka as Data Hub for Crypto, NFT, Metaverse (Beyond the Buzz!)
Kai Wähner
 
Banking as a Service - An Overview
Banking as a Service - An OverviewBanking as a Service - An Overview
Banking as a Service - An Overview
Srini Peyyalamitta
 
Database Cloud Services Office Hours : Oracle sharding hyperscale globally d...
Database Cloud Services Office Hours : Oracle sharding  hyperscale globally d...Database Cloud Services Office Hours : Oracle sharding  hyperscale globally d...
Database Cloud Services Office Hours : Oracle sharding hyperscale globally d...
Tammy Bednar
 
Azure Infrastructure as Code and Hashicorp Terraform
Azure Infrastructure as Code and Hashicorp TerraformAzure Infrastructure as Code and Hashicorp Terraform
Azure Infrastructure as Code and Hashicorp Terraform
Alex Mags
 

What's hot (20)

Cusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp ExtensionsCusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
 
LAEF Annual Report 2013-14
LAEF Annual Report 2013-14LAEF Annual Report 2013-14
LAEF Annual Report 2013-14
 
Fraud detection system
Fraud detection systemFraud detection system
Fraud detection system
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
MIgrating from Single Instance to RAC via Dataguard
MIgrating from Single Instance to RAC via DataguardMIgrating from Single Instance to RAC via Dataguard
MIgrating from Single Instance to RAC via Dataguard
 
Trace File Analyzer - Usage and Features
Trace File Analyzer - Usage and Features Trace File Analyzer - Usage and Features
Trace File Analyzer - Usage and Features
 
Offensive Payment Security
Offensive Payment SecurityOffensive Payment Security
Offensive Payment Security
 
Hybrid Data Guard to Cloud GEN2 ExaCS.pdf
Hybrid Data Guard to Cloud GEN2 ExaCS.pdfHybrid Data Guard to Cloud GEN2 ExaCS.pdf
Hybrid Data Guard to Cloud GEN2 ExaCS.pdf
 
Oracle RAC features on Exadata
Oracle RAC features on ExadataOracle RAC features on Exadata
Oracle RAC features on Exadata
 
[WhaTap DevOps Day] 세션 6 : 와탭랩스 DevOps 이야기
[WhaTap DevOps Day] 세션 6 : 와탭랩스 DevOps 이야기[WhaTap DevOps Day] 세션 6 : 와탭랩스 DevOps 이야기
[WhaTap DevOps Day] 세션 6 : 와탭랩스 DevOps 이야기
 
Oracle Flex ASM - What’s New and Best Practices by Jim Williams
Oracle Flex ASM - What’s New and Best Practices by Jim WilliamsOracle Flex ASM - What’s New and Best Practices by Jim Williams
Oracle Flex ASM - What’s New and Best Practices by Jim Williams
 
Big Data Analytics (ML, DL, AI) hands-on
Big Data Analytics (ML, DL, AI) hands-onBig Data Analytics (ML, DL, AI) hands-on
Big Data Analytics (ML, DL, AI) hands-on
 
Microservices - Death of the Enterprise Service Bus (ESB)? (Update 2016)
Microservices - Death of the Enterprise Service Bus (ESB)? (Update 2016)Microservices - Death of the Enterprise Service Bus (ESB)? (Update 2016)
Microservices - Death of the Enterprise Service Bus (ESB)? (Update 2016)
 
Heat Map and Automatic Data Optimization with Oracle Database 12c
Heat Map and Automatic Data Optimization with Oracle Database 12cHeat Map and Automatic Data Optimization with Oracle Database 12c
Heat Map and Automatic Data Optimization with Oracle Database 12c
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 
Platform as a Service (PaaS) Providers
Platform as a Service (PaaS) ProvidersPlatform as a Service (PaaS) Providers
Platform as a Service (PaaS) Providers
 
Apache Kafka as Data Hub for Crypto, NFT, Metaverse (Beyond the Buzz!)
Apache Kafka as Data Hub for Crypto, NFT, Metaverse (Beyond the Buzz!)Apache Kafka as Data Hub for Crypto, NFT, Metaverse (Beyond the Buzz!)
Apache Kafka as Data Hub for Crypto, NFT, Metaverse (Beyond the Buzz!)
 
Banking as a Service - An Overview
Banking as a Service - An OverviewBanking as a Service - An Overview
Banking as a Service - An Overview
 
Database Cloud Services Office Hours : Oracle sharding hyperscale globally d...
Database Cloud Services Office Hours : Oracle sharding  hyperscale globally d...Database Cloud Services Office Hours : Oracle sharding  hyperscale globally d...
Database Cloud Services Office Hours : Oracle sharding hyperscale globally d...
 
Azure Infrastructure as Code and Hashicorp Terraform
Azure Infrastructure as Code and Hashicorp TerraformAzure Infrastructure as Code and Hashicorp Terraform
Azure Infrastructure as Code and Hashicorp Terraform
 

Similar to BASE24 classic - modernization options

2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production
Thomas Burg
 
Modernize your AS400 - the future proof, low cost solution.
Modernize your AS400 - the future proof, low cost solution.Modernize your AS400 - the future proof, low cost solution.
Modernize your AS400 - the future proof, low cost solution.
112Motion
 
Impact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP LandscapeImpact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP Landscape
Jos Feyaerts
 
How to do a successful wms implementation overcome common pitfalls
How to do a successful wms implementation overcome common pitfallsHow to do a successful wms implementation overcome common pitfalls
How to do a successful wms implementation overcome common pitfalls
Jade Global
 
The attack on TARGET: how was it done - lessons learned for protecting HP Non...
The attack on TARGET: how was it done - lessons learned for protecting HP Non...The attack on TARGET: how was it done - lessons learned for protecting HP Non...
The attack on TARGET: how was it done - lessons learned for protecting HP Non...
Thomas Burg
 
apidays LIVE Paris 2021 - EDI & API on One Integration Platform by Mir Mustha...
apidays LIVE Paris 2021 - EDI & API on One Integration Platform by Mir Mustha...apidays LIVE Paris 2021 - EDI & API on One Integration Platform by Mir Mustha...
apidays LIVE Paris 2021 - EDI & API on One Integration Platform by Mir Mustha...
apidays
 
6 Key Stages to CIF Self-Certified Status_v1.3 DR1115
6 Key Stages to CIF Self-Certified Status_v1.3 DR11156 Key Stages to CIF Self-Certified Status_v1.3 DR1115
6 Key Stages to CIF Self-Certified Status_v1.3 DR1115Jason Wyatt
 
B2B add on implementation scenarios po. part I inbound edi
B2B add on implementation scenarios po. part I inbound ediB2B add on implementation scenarios po. part I inbound edi
B2B add on implementation scenarios po. part I inbound edi
Roberto Cantero Segovia
 
Salesforce.com & Raspberry Pi - Giant Clouds, Tiny Computers
Salesforce.com & Raspberry Pi - Giant Clouds, Tiny ComputersSalesforce.com & Raspberry Pi - Giant Clouds, Tiny Computers
Salesforce.com & Raspberry Pi - Giant Clouds, Tiny Computers
ReidCarlberg
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
CA Technologies
 
Platform Showcase: Making the Ultimate Live Demo, by Gabriel Michaud
Platform Showcase: Making the Ultimate Live Demo, by Gabriel MichaudPlatform Showcase: Making the Ultimate Live Demo, by Gabriel Michaud
Platform Showcase: Making the Ultimate Live Demo, by Gabriel Michaud
Acumatica Cloud ERP
 
Placement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environmentPlacement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environment
Kim Clark
 
Faster and more efficient processes by combining BPM and Mobile – yes we can!
Faster and more efficient processes by combining BPM and Mobile – yes we can!Faster and more efficient processes by combining BPM and Mobile – yes we can!
Faster and more efficient processes by combining BPM and Mobile – yes we can!
Sebastian Faulhaber
 
A step by-step guide on i doc-ale between two sap servers
A step by-step guide on i doc-ale between two sap serversA step by-step guide on i doc-ale between two sap servers
A step by-step guide on i doc-ale between two sap servers
krishna RK
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
akquinet enterprise solutions GmbH
 
Positive pay edi process in sap
Positive pay edi process in sapPositive pay edi process in sap
Positive pay edi process in sap
Rajeev Kumar
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewDavid Barry
 
dokumen.tips_workorderinfosys-badi-coois-modefication.pdf
dokumen.tips_workorderinfosys-badi-coois-modefication.pdfdokumen.tips_workorderinfosys-badi-coois-modefication.pdf
dokumen.tips_workorderinfosys-badi-coois-modefication.pdf
Dipak Banerjee
 

Similar to BASE24 classic - modernization options (20)

2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production2014 11 data at rest protection for base24 - lessons learned in production
2014 11 data at rest protection for base24 - lessons learned in production
 
Modernize your AS400 - the future proof, low cost solution.
Modernize your AS400 - the future proof, low cost solution.Modernize your AS400 - the future proof, low cost solution.
Modernize your AS400 - the future proof, low cost solution.
 
Impact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP LandscapeImpact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP Landscape
 
BinionsIIa
BinionsIIaBinionsIIa
BinionsIIa
 
How to do a successful wms implementation overcome common pitfalls
How to do a successful wms implementation overcome common pitfallsHow to do a successful wms implementation overcome common pitfalls
How to do a successful wms implementation overcome common pitfalls
 
The attack on TARGET: how was it done - lessons learned for protecting HP Non...
The attack on TARGET: how was it done - lessons learned for protecting HP Non...The attack on TARGET: how was it done - lessons learned for protecting HP Non...
The attack on TARGET: how was it done - lessons learned for protecting HP Non...
 
Soa Test Methodology
Soa Test MethodologySoa Test Methodology
Soa Test Methodology
 
apidays LIVE Paris 2021 - EDI & API on One Integration Platform by Mir Mustha...
apidays LIVE Paris 2021 - EDI & API on One Integration Platform by Mir Mustha...apidays LIVE Paris 2021 - EDI & API on One Integration Platform by Mir Mustha...
apidays LIVE Paris 2021 - EDI & API on One Integration Platform by Mir Mustha...
 
6 Key Stages to CIF Self-Certified Status_v1.3 DR1115
6 Key Stages to CIF Self-Certified Status_v1.3 DR11156 Key Stages to CIF Self-Certified Status_v1.3 DR1115
6 Key Stages to CIF Self-Certified Status_v1.3 DR1115
 
B2B add on implementation scenarios po. part I inbound edi
B2B add on implementation scenarios po. part I inbound ediB2B add on implementation scenarios po. part I inbound edi
B2B add on implementation scenarios po. part I inbound edi
 
Salesforce.com & Raspberry Pi - Giant Clouds, Tiny Computers
Salesforce.com & Raspberry Pi - Giant Clouds, Tiny ComputersSalesforce.com & Raspberry Pi - Giant Clouds, Tiny Computers
Salesforce.com & Raspberry Pi - Giant Clouds, Tiny Computers
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
 
Platform Showcase: Making the Ultimate Live Demo, by Gabriel Michaud
Platform Showcase: Making the Ultimate Live Demo, by Gabriel MichaudPlatform Showcase: Making the Ultimate Live Demo, by Gabriel Michaud
Platform Showcase: Making the Ultimate Live Demo, by Gabriel Michaud
 
Placement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environmentPlacement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environment
 
Faster and more efficient processes by combining BPM and Mobile – yes we can!
Faster and more efficient processes by combining BPM and Mobile – yes we can!Faster and more efficient processes by combining BPM and Mobile – yes we can!
Faster and more efficient processes by combining BPM and Mobile – yes we can!
 
A step by-step guide on i doc-ale between two sap servers
A step by-step guide on i doc-ale between two sap serversA step by-step guide on i doc-ale between two sap servers
A step by-step guide on i doc-ale between two sap servers
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
Positive pay edi process in sap
Positive pay edi process in sapPositive pay edi process in sap
Positive pay edi process in sap
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of View
 
dokumen.tips_workorderinfosys-badi-coois-modefication.pdf
dokumen.tips_workorderinfosys-badi-coois-modefication.pdfdokumen.tips_workorderinfosys-badi-coois-modefication.pdf
dokumen.tips_workorderinfosys-badi-coois-modefication.pdf
 

More from Thomas Burg

HPE NonStop GTUG Berlin - 'Yuma' Workshop
HPE NonStop GTUG Berlin - 'Yuma' Workshop HPE NonStop GTUG Berlin - 'Yuma' Workshop
HPE NonStop GTUG Berlin - 'Yuma' Workshop
Thomas Burg
 
Comparing the TCO of HP NonStop with Oracle RAC
Comparing the TCO of HP NonStop with Oracle RACComparing the TCO of HP NonStop with Oracle RAC
Comparing the TCO of HP NonStop with Oracle RAC
Thomas Burg
 
HP NonStop applications: Modernization from the Ground-up and the User-in
HP NonStop applications: Modernization from the Ground-up and the User-inHP NonStop applications: Modernization from the Ground-up and the User-in
HP NonStop applications: Modernization from the Ground-up and the User-in
Thomas Burg
 
You may be compliant, but are you really secure?
You may be compliant, but are you really secure?You may be compliant, but are you really secure?
You may be compliant, but are you really secure?
Thomas Burg
 
The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...
Thomas Burg
 
comForte CSL: a messaging middleware framework for HP NonStop
comForte CSL: a messaging middleware framework for HP NonStopcomForte CSL: a messaging middleware framework for HP NonStop
comForte CSL: a messaging middleware framework for HP NonStop
Thomas Burg
 
2014 02 comForte SecurTape product
2014 02 comForte SecurTape product2014 02 comForte SecurTape product
2014 02 comForte SecurTape product
Thomas Burg
 
From Russia with Love - modern tools used in Cyber Attacks
From Russia with Love - modern tools used in Cyber AttacksFrom Russia with Love - modern tools used in Cyber Attacks
From Russia with Love - modern tools used in Cyber Attacks
Thomas Burg
 
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
Thomas Burg
 
Survival of the Fittest: Modernize your NonStop applications today
Survival of the Fittest: Modernize your NonStop applications todaySurvival of the Fittest: Modernize your NonStop applications today
Survival of the Fittest: Modernize your NonStop applications today
Thomas Burg
 

More from Thomas Burg (10)

HPE NonStop GTUG Berlin - 'Yuma' Workshop
HPE NonStop GTUG Berlin - 'Yuma' Workshop HPE NonStop GTUG Berlin - 'Yuma' Workshop
HPE NonStop GTUG Berlin - 'Yuma' Workshop
 
Comparing the TCO of HP NonStop with Oracle RAC
Comparing the TCO of HP NonStop with Oracle RACComparing the TCO of HP NonStop with Oracle RAC
Comparing the TCO of HP NonStop with Oracle RAC
 
HP NonStop applications: Modernization from the Ground-up and the User-in
HP NonStop applications: Modernization from the Ground-up and the User-inHP NonStop applications: Modernization from the Ground-up and the User-in
HP NonStop applications: Modernization from the Ground-up and the User-in
 
You may be compliant, but are you really secure?
You may be compliant, but are you really secure?You may be compliant, but are you really secure?
You may be compliant, but are you really secure?
 
The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...The attack against target - how was it done and how has it changed the securi...
The attack against target - how was it done and how has it changed the securi...
 
comForte CSL: a messaging middleware framework for HP NonStop
comForte CSL: a messaging middleware framework for HP NonStopcomForte CSL: a messaging middleware framework for HP NonStop
comForte CSL: a messaging middleware framework for HP NonStop
 
2014 02 comForte SecurTape product
2014 02 comForte SecurTape product2014 02 comForte SecurTape product
2014 02 comForte SecurTape product
 
From Russia with Love - modern tools used in Cyber Attacks
From Russia with Love - modern tools used in Cyber AttacksFrom Russia with Love - modern tools used in Cyber Attacks
From Russia with Love - modern tools used in Cyber Attacks
 
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
The Verizon 2012/2013 Data Breach Investigations Reports - Lessons Learned fo...
 
Survival of the Fittest: Modernize your NonStop applications today
Survival of the Fittest: Modernize your NonStop applications todaySurvival of the Fittest: Modernize your NonStop applications today
Survival of the Fittest: Modernize your NonStop applications today
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

BASE24 classic - modernization options

  • 1. BASE24 is a product of ACI Worldwide, all copyrights acknowledged. 1Copyright comForte 2014
  • 2. This part of the screen/slide are the so-called speaker notes Viewing instructions: please see actual slide Copyright comForte 2014 2
  • 4. In this presentation, we are assuming that we are a financial institution using BASE24 classic - and that we have no plans to change that in the next few years. ((Side note: we might be looking at other options but we are aware that fully migrating off BASE24 is a multi-year project)) That leaves us with a stable, yet old, unsecure and not-agile system. The word map above shows technologies and components which are deeply entrenched into BASE24. All of the technologies are decades old and are *not* what today is called ‘agile’. 4Copyright comForte 2014
  • 5. Here are a few trends which are shaking up the financial industry (and others!) 5Copyright comForte 2014
  • 6. This is what IBM is offering when it comes to modernizing “mainframe legacy applications”. Please note how they have managed to integrate the mainframe into modern worlds but (1) running Linux partitions right on the mainframe and (2) by providing “gateways” or “adaptors” running in this Linux component which enable the legacy applications to take part in modernization initiatives. Compare this with the way HP NonStop systems are typically NOT integrated into the Enterprise, more on this later 6Copyright comForte 2014
  • 7. Simply put, we don’t have the tools for the job. Assume your NonStop BASE24 system is supposed to be integrated in a new mobile app your business is developing: - implement new functionality in TAL?  Not really an option - How to provide a SOAP (or JSON/REST) wrapper around a ‘service’ provided by green screens? 7Copyright comForte 2014
  • 8. Using modern tools is the answer – we’ll look in more details next 8Copyright comForte 2014
  • 10. A rock-solid and proven application to process POS and ATM transaction. Looks good from a high level – but how correct is this picture? 10Copyright comForte 2014
  • 11. As we typically run BASE24 classic very much in legacy mode, this is how it looks like from the C-level and business folks perspective. Let us not kid ourselves though – BASE24 is *not* integrated well into the Enterprise – also it severely lacks in certain areas of compliance. That puts the application (and platform!) in danger of being replaced by something new. Also, even if there are plans for replacement they typically involve a rather long schedule – can you afford to wait that long given all the aforementioned business drivers? The good news: as we’ll see, BASE24 (and other ‘legacy’ NonStop applications) can easily be • SOA-enabled for better integrations • secured for better PCI compliance  But typically they are NOT 11Copyright comForte 2014
  • 12. Further good news: typically the changes can be done with very little or even NO source code changes 12Copyright comForte 2014
  • 14. Here the business process is to add an ATM to a BASE24 system. The current process typically involves entering the relevant data (description, IP address, ATM details) into a “green screen” user interface. That process is (1) manual and laborious and (2) error prone. 14Copyright comForte 2014
  • 15. In a SOA (Service Oriented Architecture) approach, the BASE24 system is presenting a service “Add ATM” (and “INFO ATM <name>) to the integration layer. That service is then invoked from existing business application/processes. The business benefits are: - Streamlined operation - “Live” view of all ATMs available for other applicatinos - Reduction of manual, error-prone work 15Copyright comForte 2014
  • 16. This presentation is not very technical by design – hence this slide only provides a short description of the technologies involved. 16Copyright comForte 2014
  • 17. (This example is taken from the UK, other geographies might not have this requirement). Today, customers in branch offices authenticate themselves via either a passport or a signature. In this example, the business wants to authenticate bank customers in the branch using their debit card and Chip and PIN technology. This is both easier for the end user as well as more convenient (no need to carry a passport or ID document) and more secure. Many BASE24 classic implementations already have Chip&PIN technology built-in, but not available as a service on BASE24. 17Copyright comForte 2014
  • 18. Here the technology involved is a bit more complex. But do not let this picture confuse you – interaction between multiple business applicationsof this complexity is perfectly normal in modern IT environments. Here is a bit detail on how this would work: BASE24 can provide a service via the integration layer to authenticatethe card (typically by converting it into a balance enquiry request at the integration layer). Pass or Fail is returned to the requestorof the service The implementation would be roughly as follows: • A ew “Authenticatewith debit card” Application (let’s call it AWDCA) at branch is developed from scratch • AWDCA has to be connected to the PeD ( PIN Encryption Device) via an internal network • The AWDCA starts a transactionat the PeD (step 1) • The customer swipes card, device does Offline PIN check. The PeD does *not* use offline PINverification but creates request for transaction • Step 2: the PeD transactioncan be any transactioncode which is sent to the FEP layer at the bank which forwards it to the comforte service wrapper for BASE24(step 3). The wrapper generates a BASE24 ISO Balance Inquiry request • (still step 3, see next slide): the Integrationlayers sends request to CSL • (still step 3, see next slide): CSL product receives WSDL and converts it into format readable by BASE24 • (still step 3, see next slide): CSL sends request into BASE24 and receives response • (still step 3, see next slide): BASE24 sees normal balancy inquiry and treats it as coming from an ATM – doing Chip/EMV authorization as side effect 18Copyright comForte 2014
  • 19. • (Step 4): Response is translatedinto “success”or “fail with error message” (balance inquiry result is tossed) and returned to AWDC • The bank teller would simply use the new AWDCA and could now happily authenticate its customers. Copyright comForte 2014 18
  • 20. Note the similarity to slide #16 19Copyright comForte 2014
  • 21. The last example is not about new business requirements but about being compliant with the PCI framework. Out-of-the box, BASE24 classic can NOT comply with PCI 3.4, also BASE24 can NOT encrypt TCP/IP connections between XPNET and ATMs or POS devices. 20Copyright comForte 2014
  • 22. Greg Swedosh gave a good presentation about compliance at the NonStop technical Bootcamp 2014 – see http://www.slideshare.net/thomasburg/you-may-be-compliant-but-are-you-really-secure 21Copyright comForte 2014
  • 23. The following two comForte products improve compliance and security for BASE24 classic – again without any source code changes: • SecurData for protection of data at rest (PCI 3.4) • SecurLib/SSL-AT for encryption of ATM or POS traffic 22Copyright comForte 2014
  • 25. We talked about how proper tools can help to move from an isolated, legacy BASE24 system to a service-enabled, modern and secure BASE24 system – without requiring any source code changes 24Copyright comForte 2014
  • 26. To keep BASE24/the NonStop relevant … …It is about the business case! … and about the application (BASE24 classic) and platform (HP NonStop) being perceived as flexible 25Copyright comForte 2014
  • 27. Any questions please use http://comforte.com/company/contactform/ 26Copyright comForte 2014