SlideShare a Scribd company logo
Simple, secure, scalable
© 2016ChinsayAB Private& Confidential 1
Chinsay is a specialised cloud platform for the creation
of Freight and commodities contracts
COMMODITIES
• Dry Cargo
• Crude Oil & Refined Products
• Metals
• Agriculture
• Energy
• Other Bulk Commodities
RECAP MANAGER (RM)
COMMODITY
CONTRACTS MANAGER (CCM)
FREIGHT
© 2016ChinsayAB Private& Confidential 2
Transforming contract creation into a digital value-driver
Traditional contract management Chinsay value proposition Primary value
Stacks of paper contracts
Cumbersome contract creation/review
Uncertain right contractand termsare used
Lack of contract overview
• E.g. deal activities and business exposure
Disconnectedsystem and processes
Centralonline repository
Easy review functionality
Full control of contracting process
• Audit trail, clause library and approval workflow
Business intelligencetools
Internal/externalcollaboration and APIs
Lesstimewasted
Risk mitigation
Lesstimewasted
Risk mitigation
Lesstimewasted
© 2016ChinsayAB Private& Confidential 3
Chinsay delivers value across the organisation
A real-time data source for all stakeholders
Legal Operations
Chartering
Risk analyticsFinance
Auditors
Contract creation
Management
Standardize workflow
Monitor risk
Control processes
Ensure compliance
Providing control and efficiencies
© 2016ChinsayAB Private& Confidential 4
Improveefficiency
Streamline workflow
Alwaysaccessible
Leverage your data
Advanced management of chartering agreements
© 2016ChinsayAB Private& Confidential 5
Advanced reporting- and BI capabilities
Enables the use of your fixture data:
Interactive
Flexible
VisualisesData
Real time
© 2016ChinsayAB Private& Confidential 6
2008 2009 2010 2011 2012 2013 2014 2015
Base of principal clients growing steadily
AlphaBulkers
Hellas
Anangel Centrofin
SeaTraders
Current Chinsay Principal examples
Navios
© 2016ChinsayAB Private& Confidential 7
Partnering with leading technology and service
providers
Microsoft .Net with web and databaseservers behind a firewall.Accessible via webbrowser,no additional installation or IT cost
Application hosted by Microsoftdistributedcloud technology
Contentdelivery network used by 1 in 3 Fortune 500 companies
Authorized distributor of ASBA and BIMCO contracts and clauses
Direct link to vessel questionnaires
Electronic signingfeature
IMOS integration
Softmar integration
Shipnet integration
© 2016ChinsayAB Private& Confidential 8
Application access
Username and password encrypted in SSL while in transmission
Strong passwords mandatory
Coding standards
Use of highest coding standards
Regular security review
Application security
Customer can only access own data
Security model reapplied with every request and enforced for the
entire duration of a user session
Network security
Hosted in the cloud by Microsoft Azure
Latest firewall protection and intrusion detection systems
Regular penetration tests
Chinsay applies state of the art data security
Data encryption
All data is encrypted in transfer
All passwords are stored as encrypted
The usage of Chinsay is protected by 256bit SSL encryption
Backup
Encrypted backups are transmitted to secure disaster recovery site on
daily basis
Disasterrecovery
Chinsay can resume service delivery from secondary data centre with
minimum service disruption
Monitoring and logging
Chinsay’s service is monitored for security violation attempts
Logs and audit is reviewed to detect any security violations
Europe (Head Office)
Blasieholmsgatan 5
111 48 Stockholm, Sweden
Phone: +46.8611.1420
Asia Pacific
Chinsay Pte Ltd
1 Keong Saik Road
#03-13, The Working Capitol Singapore
089109
Phone: +65.3158.2168

More Related Content

Similar to Chinsay AB Company Presentation

Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
Capgemini
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
jeffirby
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
DataSpace Academy
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
GSTF
 
Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery Platform
John Pollack
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
Hentsū
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
Intelligentia IT Systems Pvt. Ltd.
 
Transform Your Cloud Validation Strategy from Cloudy to Clear
Transform Your Cloud Validation Strategy from Cloudy to ClearTransform Your Cloud Validation Strategy from Cloudy to Clear
Transform Your Cloud Validation Strategy from Cloudy to Clear
TechWell
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedasTDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
tdc-globalcode
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Standards Customer Council
 
Pistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
Pistoia Alliance European Conference 2015 - Stuart Robertson / ExostarPistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
Pistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
Pistoia Alliance
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data Center
Jason Basye
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
RapidScale
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
CloudSmartz
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
Epoch Universal, Inc.
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
BlackBerry
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
Ciente
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
SaadZaman23
 
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Amazon Web Services
 

Similar to Chinsay AB Company Presentation (20)

Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Key Elements of a Security Delivery Platform
Key Elements of a Security Delivery PlatformKey Elements of a Security Delivery Platform
Key Elements of a Security Delivery Platform
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Transform Your Cloud Validation Strategy from Cloudy to Clear
Transform Your Cloud Validation Strategy from Cloudy to ClearTransform Your Cloud Validation Strategy from Cloudy to Clear
Transform Your Cloud Validation Strategy from Cloudy to Clear
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedasTDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
TDC2018FLN | Trilha Blockchain - BlockChain Casos de Usos alem das CryptoMoedas
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
Pistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
Pistoia Alliance European Conference 2015 - Stuart Robertson / ExostarPistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
Pistoia Alliance European Conference 2015 - Stuart Robertson / Exostar
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data Center
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
 

Chinsay AB Company Presentation

  • 2. © 2016ChinsayAB Private& Confidential 1 Chinsay is a specialised cloud platform for the creation of Freight and commodities contracts COMMODITIES • Dry Cargo • Crude Oil & Refined Products • Metals • Agriculture • Energy • Other Bulk Commodities RECAP MANAGER (RM) COMMODITY CONTRACTS MANAGER (CCM) FREIGHT
  • 3. © 2016ChinsayAB Private& Confidential 2 Transforming contract creation into a digital value-driver Traditional contract management Chinsay value proposition Primary value Stacks of paper contracts Cumbersome contract creation/review Uncertain right contractand termsare used Lack of contract overview • E.g. deal activities and business exposure Disconnectedsystem and processes Centralonline repository Easy review functionality Full control of contracting process • Audit trail, clause library and approval workflow Business intelligencetools Internal/externalcollaboration and APIs Lesstimewasted Risk mitigation Lesstimewasted Risk mitigation Lesstimewasted
  • 4. © 2016ChinsayAB Private& Confidential 3 Chinsay delivers value across the organisation A real-time data source for all stakeholders Legal Operations Chartering Risk analyticsFinance Auditors Contract creation Management Standardize workflow Monitor risk Control processes Ensure compliance Providing control and efficiencies
  • 5. © 2016ChinsayAB Private& Confidential 4 Improveefficiency Streamline workflow Alwaysaccessible Leverage your data Advanced management of chartering agreements
  • 6. © 2016ChinsayAB Private& Confidential 5 Advanced reporting- and BI capabilities Enables the use of your fixture data: Interactive Flexible VisualisesData Real time
  • 7. © 2016ChinsayAB Private& Confidential 6 2008 2009 2010 2011 2012 2013 2014 2015 Base of principal clients growing steadily AlphaBulkers Hellas Anangel Centrofin SeaTraders Current Chinsay Principal examples Navios
  • 8. © 2016ChinsayAB Private& Confidential 7 Partnering with leading technology and service providers Microsoft .Net with web and databaseservers behind a firewall.Accessible via webbrowser,no additional installation or IT cost Application hosted by Microsoftdistributedcloud technology Contentdelivery network used by 1 in 3 Fortune 500 companies Authorized distributor of ASBA and BIMCO contracts and clauses Direct link to vessel questionnaires Electronic signingfeature IMOS integration Softmar integration Shipnet integration
  • 9. © 2016ChinsayAB Private& Confidential 8 Application access Username and password encrypted in SSL while in transmission Strong passwords mandatory Coding standards Use of highest coding standards Regular security review Application security Customer can only access own data Security model reapplied with every request and enforced for the entire duration of a user session Network security Hosted in the cloud by Microsoft Azure Latest firewall protection and intrusion detection systems Regular penetration tests Chinsay applies state of the art data security Data encryption All data is encrypted in transfer All passwords are stored as encrypted The usage of Chinsay is protected by 256bit SSL encryption Backup Encrypted backups are transmitted to secure disaster recovery site on daily basis Disasterrecovery Chinsay can resume service delivery from secondary data centre with minimum service disruption Monitoring and logging Chinsay’s service is monitored for security violation attempts Logs and audit is reviewed to detect any security violations
  • 10. Europe (Head Office) Blasieholmsgatan 5 111 48 Stockholm, Sweden Phone: +46.8611.1420 Asia Pacific Chinsay Pte Ltd 1 Keong Saik Road #03-13, The Working Capitol Singapore 089109 Phone: +65.3158.2168