The document discusses eWise's client-side aggregation technology and Aegis platform. eWise's technology uses a Personal Data Vault implemented on the end-user device to aggregate user data without disclosing credentials to third parties. All aggregation and encryption occurs on the user's device. The Aegis platform goes beyond PSD2 XS2A by allowing aggregation of both direct banking APIs and indirect channels to provide a more comprehensive view of users' financial data and accounts.
Looking closely at the security implications of PSD2 , existing technology standards that can be used in meeting the requirements and how WSO2 products can be leveraged for faster adaption of PSD2.
This slide deck was used comprehensively discuss 'OpenBanking' based on PSD2 standard and touch on GDPR. Discuss the technologies to be used to cater for PSD2 requirements. Finally it looks at the Sri Lankan financial industry and how PSD2 concepts can be applied there.
Using externally verified strong identities can reduce the risk of fraud and improve the customer experience in registering and engaging with your services.
apidays LIVE Singapore - Engineering Open Banking with Singpass for Financial...apidays
apidays LIVE Singapore 2021 - Digitisation, Connected Services and Embedded Finance
April 21 & 22, 2021
Engineering Open Banking with Singpass for Financial Planning
Eric Chang, Lead Solution Architect at Singapore Government Technology Agency (GovTech)
PSD2 XS2A Core is an interface that provides third-party providers
with access to client accounts that are managed by an ASPSP.
Developed and supported by Golden Dimension in partnership with adorsys GmbH & CO KG
OpenID Foundation/Open Banking Workshop - Open Banking UpdateMikeLeszcz
The OpenID Foundation and the Open Identity Exchange co-hosted an Open Banking Workshop on Tuesday, January 30, 2018 in London. This presentation is an update on the Open Banking initiative that was presented by members of the Open Banking Implementation Entity (OBIE).
Looking closely at the security implications of PSD2 , existing technology standards that can be used in meeting the requirements and how WSO2 products can be leveraged for faster adaption of PSD2.
This slide deck was used comprehensively discuss 'OpenBanking' based on PSD2 standard and touch on GDPR. Discuss the technologies to be used to cater for PSD2 requirements. Finally it looks at the Sri Lankan financial industry and how PSD2 concepts can be applied there.
Using externally verified strong identities can reduce the risk of fraud and improve the customer experience in registering and engaging with your services.
apidays LIVE Singapore - Engineering Open Banking with Singpass for Financial...apidays
apidays LIVE Singapore 2021 - Digitisation, Connected Services and Embedded Finance
April 21 & 22, 2021
Engineering Open Banking with Singpass for Financial Planning
Eric Chang, Lead Solution Architect at Singapore Government Technology Agency (GovTech)
PSD2 XS2A Core is an interface that provides third-party providers
with access to client accounts that are managed by an ASPSP.
Developed and supported by Golden Dimension in partnership with adorsys GmbH & CO KG
OpenID Foundation/Open Banking Workshop - Open Banking UpdateMikeLeszcz
The OpenID Foundation and the Open Identity Exchange co-hosted an Open Banking Workshop on Tuesday, January 30, 2018 in London. This presentation is an update on the Open Banking initiative that was presented by members of the Open Banking Implementation Entity (OBIE).
Blockchain Account Aggregation oct 2019 rev nciTaras Kuzin
Application of blockchain, distributed ledger, to FI account aggregation. Today, FI account aggregation is handled by a handful of aggregators, which mostly use customers’ credentials. We believe distributed ledger technology could be successfully applied to the account aggregation. The technical implementation is relatively straight forward and would require a private, permission based distributed ledger. Naturally, there is a strong network effect. Therefore, for our model to be successful, we need to create a consortium, which can be comprised of various participants, including (but not limited to) top banks.
Bank Information Share Authorized Through Distributed Ledger Technologies
Patent date Issued Nov 12, 2019 Patent issuer and numberus 10,474,834
Blockchain Technology And Innovation In Insurance SectorBlockchain Council
Despite being existent for centuries, unfortunately, the Insurance industry has not yet overcome the inefficient practices and slow processes continuing from the past. The trend of paper contracts, purchase of new policies on phone calls, and many more conventional trends are still going on. In short, the insurance industry still has obstacles to overcome. It seems possible only with Blockchain technology implementation as it can provide complete accountability, transparency, and superior security assurance. These features of Blockchain technology can help insurers save time and costs of processing, and it can also improve customer satisfaction levels.
These possibilities with Blockchain have made banking and insurance industries embracing Blockchain. The insurance industry is sure that Blockchain will evolve to stay competitive, and it has the potential of streamlining processes and meeting the demands of technology-savvy customers. Blockchain platforms help insurance companies deal with current challenges and develop a transparent operations system built on trust and stability.
CodeStore Technologies is a leading web and mobile app development company with a special focus on providing the best digital transformation services. We develop the best and the most flexible E-Wallet mobile apps for your business.
If you have any requirements share them at - sales@codestoresolutions.com.
An Introduction to PCI Compliance on IBM Power SystemsHelpSystems
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms.
The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
This slideshow will help you understand:
- How PCI requirements relate to IBM i systems
- IBM i-specific barriers to compliance
-How PowerTech security solutions help you fulfill PCI requirements, meet compliance guidelines, and satisfy auditors
You’ll have the knowledge and confidence you need to evaluate PCI compliance requirements and prepare your IBM i system for today’s regulatory challenges.
This presentation covers the key facts you need to know about the current and upcoming PCI compliance requirements.
Key take-aways:
*What are the new PCI Compliance changes (current and planned)
*When the changes go into effect & how they impact your business
*How to automate the PCI Compliance processes
This talk was presented in NULL Delhi chapter meet in 2014, as an insight into the world of PCI (Payment Card Industry) and the 12 requirements of PCI DSS
The Banking Gateway is a Payment Initiation and Account Information Service that is PSD2 compliant.
Developed and supported by Golden Dimension in partnership with adorsys GmbH & CO KG
Building a Fool Proof Security Strategy for PSD2 ComplianceWSO2
PSD2 is centered around exposing sensitive customer data. This means the security measures you take to expose this data cannot have any loopholes. Just like your API management strategy, your security strategy is critical to implementing successful compliance.
WSO2 Open Banking comes with inbuilt capabilities to support Strong Customer Authentication (SCA) and access management. Built around the key requirements of the Regulatory Technical Standards (RTS) it provides the end to end security requirements for compliance, while ensuring that customer experience is not compromised.
This webinar will cover
The key requirements of the RTS for PSD2 Compliance - Strong Customer Authentication (SCA), federated authentication, consent management and more
The capabilities of WSO2 Open Banking to meet these security requirements
How to ensure a secure yet frictionless customer experience
A demonstration of WSO2 Open Banking
Blockchain Account Aggregation oct 2019 rev nciTaras Kuzin
Application of blockchain, distributed ledger, to FI account aggregation. Today, FI account aggregation is handled by a handful of aggregators, which mostly use customers’ credentials. We believe distributed ledger technology could be successfully applied to the account aggregation. The technical implementation is relatively straight forward and would require a private, permission based distributed ledger. Naturally, there is a strong network effect. Therefore, for our model to be successful, we need to create a consortium, which can be comprised of various participants, including (but not limited to) top banks.
Bank Information Share Authorized Through Distributed Ledger Technologies
Patent date Issued Nov 12, 2019 Patent issuer and numberus 10,474,834
Blockchain Technology And Innovation In Insurance SectorBlockchain Council
Despite being existent for centuries, unfortunately, the Insurance industry has not yet overcome the inefficient practices and slow processes continuing from the past. The trend of paper contracts, purchase of new policies on phone calls, and many more conventional trends are still going on. In short, the insurance industry still has obstacles to overcome. It seems possible only with Blockchain technology implementation as it can provide complete accountability, transparency, and superior security assurance. These features of Blockchain technology can help insurers save time and costs of processing, and it can also improve customer satisfaction levels.
These possibilities with Blockchain have made banking and insurance industries embracing Blockchain. The insurance industry is sure that Blockchain will evolve to stay competitive, and it has the potential of streamlining processes and meeting the demands of technology-savvy customers. Blockchain platforms help insurance companies deal with current challenges and develop a transparent operations system built on trust and stability.
CodeStore Technologies is a leading web and mobile app development company with a special focus on providing the best digital transformation services. We develop the best and the most flexible E-Wallet mobile apps for your business.
If you have any requirements share them at - sales@codestoresolutions.com.
An Introduction to PCI Compliance on IBM Power SystemsHelpSystems
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms.
The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
This slideshow will help you understand:
- How PCI requirements relate to IBM i systems
- IBM i-specific barriers to compliance
-How PowerTech security solutions help you fulfill PCI requirements, meet compliance guidelines, and satisfy auditors
You’ll have the knowledge and confidence you need to evaluate PCI compliance requirements and prepare your IBM i system for today’s regulatory challenges.
This presentation covers the key facts you need to know about the current and upcoming PCI compliance requirements.
Key take-aways:
*What are the new PCI Compliance changes (current and planned)
*When the changes go into effect & how they impact your business
*How to automate the PCI Compliance processes
This talk was presented in NULL Delhi chapter meet in 2014, as an insight into the world of PCI (Payment Card Industry) and the 12 requirements of PCI DSS
The Banking Gateway is a Payment Initiation and Account Information Service that is PSD2 compliant.
Developed and supported by Golden Dimension in partnership with adorsys GmbH & CO KG
Building a Fool Proof Security Strategy for PSD2 ComplianceWSO2
PSD2 is centered around exposing sensitive customer data. This means the security measures you take to expose this data cannot have any loopholes. Just like your API management strategy, your security strategy is critical to implementing successful compliance.
WSO2 Open Banking comes with inbuilt capabilities to support Strong Customer Authentication (SCA) and access management. Built around the key requirements of the Regulatory Technical Standards (RTS) it provides the end to end security requirements for compliance, while ensuring that customer experience is not compromised.
This webinar will cover
The key requirements of the RTS for PSD2 Compliance - Strong Customer Authentication (SCA), federated authentication, consent management and more
The capabilities of WSO2 Open Banking to meet these security requirements
How to ensure a secure yet frictionless customer experience
A demonstration of WSO2 Open Banking
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetSafeNet
To ensure their compliance with the PCI Data Security Standard, many businesses have turned to SafeNet technology for a solution. To meet these demands, SafeNet offers a range
of products, proprietary and through partner alliance. SafeNet, a global leader in information security, provides the industry’s most comprehensive range of solutions to help companies achieve compliance with the PCI Data Security Standard. Through its own proven set of products, along with an extensive partner network, SafeNet can provide merchants with the assurance that sensitive and valuable cardholder information is protected from all types of threats, and that regulatory compliance is not only being met, but
exceeded.
Website Compliance Requirements To Integrate A Payment GatewayITIO Innovex
Want to start your own payment gateway business but clueless about how to get started? In today's digital age, integrating a payment gateway is crucial for businesses looking to accept online payments. Visit us at: https://itio.in/
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
As European financial institutions work towards compliance with PSD2, there's an intense focus on securing customer data as it's opened up to third parties. Essential requirements around securing APIs to enable direct payments and account aggregation are accompanied by increased regulations for strong customer authentication. Financial institutions are looking to improve their management of digital identities to ensure customer data remains private.
Not only can a modern digital identity platform help companies with API security and authentication requirements, it can also drive innovation in areas like consent management, with dashboards that allow customers to control their personal data at a granular level. Banks can embed identity into their digital platforms in order to use PSD2 as a strategic opportunity to build trusted relationships with their customers.
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHForgeRock
OLIVER STAMPFLI, SECURITY ARCHITECT IDENTITY & ACCESS MANAGEMENT, SWISSCOM
JENS SONNENTRÜCKER, HEAD OF IDENTITY ACCESS MANAGEMENT & GOVERNANCE, SWISSCOM
The goal for Swisscom was to be able to offer one ID Broker for all services, so that subscribers essentially would be able to “Bring Your Own Identity” (BYOI). If not done this way, each application or service offered by Swisscom would have required a connection with each IDP. By implementing a ForgeRock solution, Swisscom was able to reduce costs spent on administration and significantly upgrade ease of use for the customer base, while also increasing sharing options across service offerings.
Get Strong Customer Authentication Ready for PSD2WSO2
Banks are standing face to face with the PSD2 go-live deadline, however, they are still not ready to roll out their interfaces with Strong Customer Authentication (SCA). For this reason, the Financial Conduct Authority (FCA) agreed to give an extra 18 months for the roll-out of SCA.
SCA ensures that the consumption of financial APIs by the third party is done with the explicit consent of the customer and with multiple levels of assurance in the authentication, to ensure customer authenticity. WSO2 Open Banking allows compliance of SCA and provides extendability, allowing configuration of custom authentication methods such as SMS one-time password, out-of-band authentication, etc.
This deck covers in detail:
- An introduction to PSD2 AIS, PIS Flows
- The basics of SCA
- Configuration of Multi-Factor Authentication with WSO2 Open Banking
- Additional Adaptive Authentication with WSO2 Open Banking Business Intelligence
Watch the webinar on-demand here - https://wso2.com/library/webinars/2019/10/get-strong-customer-authentication-sca-ready-for-psd2/
In this webinar you will learn:
• Which benefits you gain from 3D-Secure 2.2 adaptations?
• Tips and tricks on how to make a seamless transition to 3DS 2.2 version!
• How to increase the security level and improve the user experience?
• Get an overview of 3D Secure from the expert perspective.
For more information contact us at https://3dsecure.asseco.com/
ControlCase covers the following:
•What is PCI DSS?
•What does PCI DSS stand for?
•What is the purpose of PCI DSS?
•Who does PCI DSS apply to?
•What are the 12 requirements of PCI DSS?
•What are the 6 Principles of PCI DSS?
•What are the potential liabilities for not complying with PCI DSS?
•How can we achieve compliance in a cost effective manner?
Disrupting Traditional Payment Systems Architecture with AWS (FSV320) - AWS r...Amazon Web Services
In Financial Services, payments have evolved from a commodity into a key differentiator, driven by customer demand for faster, easier, and more seamless payment processing. Expectations from regulators for PCI DSS-compliant workloads have evolved with increased focus on risk reduction, transparency, and standardization. In this space, the need to replace legacy systems, address security concerns, and support a highly seasonal 24/7/365 operation present barriers to innovation. In this chalk talk, we examine how our customers address these concerns by using the AWS Cloud to rapidly build their own scalable payment systems, leveraging PCI DSS-compliant AWS services across compute, database, analytics, and security. Together, we explore traditional design patterns based on our PCI DSS Quick Start, as well as the evolution to managed services, microservices, and serverless services.
Performing PCI DSS Assessments Using Zero Trust PrinciplesControlCase
- PCI DSS Requirements & Secure Remote Working
- Assessments In Work From Home (WFH) Scenario
- Remote Security Testing
- Key Aspects For Remote Assessments
Security & Seamless CX in User Authentication: How to Achieve Both?Ivona M
Watch our webinar and learn:
-How to satisfy the existing security compliance criteria in the era of impatient customers?
-Industry best practices in ensuring the highest security and improved user experience in the authentication process.
-Practical steps to planning and implementing optimal authentication ecosystems without unnecessary expenses.
-From OTP to push and biometry – which authentication methods will be best suited to your business needs?
-How to ensure strong authentication for remote work?
For more info go to https://sxs.asseco.com/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. 2
www.ewise.com
Patented Worldwide
Client-side Aggregation
SECURE NETWORK ACCESS
Our client-side aggregation technology is patented in the U.S.A., Europe, Asia and Australia.
ü Personal Data Vault (PDV) implemented on end-
user device
ü NO Disclosure of credentials or tokens to any third-
party
ü ALL Aggregation takes place from end-user device,
NOT the server
ü ALL data encrypted on end-user device using AES256
- encryption keys stored on ‘zero knowledge’ server
ü Data Sharing from Personal Data Vault using consent
based permissioning
3. 3
www.ewise.com
Users can choose to share their personal data with value added services.
DATA BROKER
Aggregate all of your customers’ financial accounts.
ACCOUNT AGGREGATION
Your user’s personal data store for financial services.
PERSONAL DATA VAULT
Provide the user with full control and privacy over their personal data.
PERMISSION MANAGEMENT
5. 5
www.ewise.com
XS2A will open up access by authorised Third Party Processors
(TPPs) to consumer data and banking infrastructure. New
service providers, defined under the Payment Service Directive
2 as Payment Initiation Service Providers (PISPs) and
Account Information Service Providers (AISPs), will be able
to offer innovative payment and account aggregation services to
end users throughout the European Union.
End-users will be provided with aggregated online information on
one or more payment accounts held with one or more
payment service providers and accessed via online interfaces of
the account servicing payment service provider.
Users are thus able to have an overall view of their financial
situation at any given moment.
What is PSD2 XS2A?
6. 6
www.ewise.com
Risks & limitations of
XS2A
SCOPE LIMITED TO
PAYMENT
ACCOUNTS
PSD2 XS2A scope includes
only payments accounts.
To build a comprehensive
picture, it is needed to
manage multiple channels:
Direct & In-Direct
UN-UNIFIED API
STRUCTURE
Each bank will develop its
own API according to its own
standard and structure.
The development efforts to
integrate with each banks
are big.
RISK OF LOSING
CUSTOMER
RELATIONSHIP
Competition to innovative
tools will increase as third
parties get easier access to
user’s financial data and win
customer main relationship.
DATA SECURITY
Even with PSD2 Direct
Channel (APIs), end-user
credentials (tokens etc.)
need to be secure.
8. 8
www.ewise.com
Aegis goes beyond XS2A
Solving the issue of a PSD2 XS2A limited scope narrowed to payment accounts
To build a comprehensive picture you need to manage multiple channels: Direct & In-Direct
The Aegis SDK allows to connect both to
direct channels like PSD2 APIs and to
indirect channels for non payments accounts
10. 10
www.ewise.com
Ensuring a complete picture
under PSD2 XS2A
In-Direct Channel
aggregates only out-of-
scope accounts to
complete the picture
Direct Channel (API)
aggregates in-scope
account data and
establishes exception list