SlideShare a Scribd company logo
Securely Exchange
CATIA Data Outside Your
Enterprise
Paul W. Downing
PROSTEP Inc.
Session DEM 5101
How to Securely Exchange CATIA
Data Outside Your Enterprise
• Take Away Topics
» How your organization is leaking information.
» Why information leakage is so hard to control.
» Which free or paid options are available to help
mitigate this problem.
Is IP Protection
your concern? Should it be?
Is IP Theft really
a problem?
Not Just “basement hackers”
Others … HIPAA
ITAR / Export Control Increased Fines
ITAR Violation Settled Between 2010 and 2016
Company Name Number of Violations Final Amount Paid Year
Marc Turi and Turi Defense Group, Inc. 2 $200,000 2016
Microwave Engineering Corporation 1 $100,000 2016
Intersil Corporation 339 $10,000,000 2014
Esterline Technologies Corporation 282 $20,000,000 2014
Meggitt-USA, Inc. 67 $25,000,000 2013
Aeroflex, Inc. 158 $8,000,000 2013
Raytheon Company 125 $8,000,000 2013
United Technologies Corporation 576 $55,000,000 2012
Alpine Aerospace 9 $50,000 2012
BAE Systems plc 2591 $79,000,000 2011
Xe Services LLC 288 $42,000,000 2010
AAR International, Inc. 13 $0 2010
Interturbine Aviation Logistics GmbH 7 $1,000,000 2010
Total 4458 $248,350,000.00
Average fine per violation $55,708.84
source:http://pmddtc.state.gov/compliance/poa.html
It’s OK you only send data securely!
Right ?
Audience Survey
Typical Concerns
Data Exchange vs. IP Protection
How old are your protocols?
• Simple Mail Transfer Protocol (SMTP) is an Internet
standard for electronic mail (e-mail) transmission across
Internet Protocol (IP) networks. SMTP was first defined by
RFC 821 in 1982 and grew out of standards developed
during the 1970s.
• File Transfer Protocol (FTP) is a standard network
protocol used to transfer files from one host to another
host over a TCP-based network, such as the Internet.
FTP is built on a client-server architecture and uses
separate control and data connections between the client
and the server typically with clear text authentication and
published as RFC 114 in 1971.
Paraphrased from <http://en.wikipedia.org/wiki/FTP>
Why do we keep doing it?
CONVENIENCE!
“increasing
convenience almost
always reduces
security”
…. but does it really have to be that way?
Convenient and Secure?
• Secure exchange needs to start as close possible
to the end users daily working environment
» Desktop Integration
» Email Integration
» PLM Integration
» Purchasing / Bid Systems
• If users have to leave their default working
environment to send secure information, they are
less likely to use the approved solution.
Ease of Deployment vs. Adoption
April 2016
BASE MODUL
OPTIONS
OS Integration
Windows "Send to"
Web Browser
PDM / CAD Integrations
Mobile Apps
Automated Services
Email Integration
Alternate Formats
(3DPDF, JT,….)
Standalone “Simple” Portal Solution
Supplier / ConsumerOEM / Sponsor
Standalone Portal Solutions
 Quick / Easy to Deploy
 Simple Administration
 Affordable (sometimes free)
 Good Basic Security (outside of email)
 Often Hosted outside of company *
Not Integrated (“Swivel Chair” Solution) –
Less Convenient (must be logged in and online) –
Can be hard to customize (if at all) –
*Monthly Fees for users / volume add up quickly –
“Advanced” Portal Concepts Automated Processes
 Upload and download with Agent,
installed at the user's desktop
Agent
Location 2
Database FileVault
Server
CAD
Converter
Gateway
KeyStore
Server Location
 Main OEM Server Location
 Authentication
 Encrypted data storage
 PKI-Management
 User right definitions
 Processing control
 Logging
 E-Mail notification
 Data routing
 Data conversion, …
Gateway
Location 3
 Batch Mode
 Data are temporary stored quickly
in local network drive
 Transfer of data to run completely
in a batch mode Gateway
FileVault
CAD
Converter
Location 4 Advanced Functionality
 Encryption
 Local File Vaults
 Local conversion of data
WAN /
Internet
 Manual Processes
 User sign on over WEB-Browser and up- or
download data manually, interactively
Location 1
WAN /
Internet
Robot
Partner
Internet
 System to System
 Automated / Integrated
 Remote Data Vaults
 Supplier signs in over WEB-Browser
 Data is uploaded from a data vault
close to the end user
Supplier
Internet
Advanced Portal Solutions
 Deeply integrated into systems and processes
 Fully automated and work behind the scenes
 Installed in the enterprise or the cloud
 Centralized or Distributed
 Designed for customization
Upfront Infrastructure Costs –
Upfront Planning Requirement –
Administrative Overhead –
Demo: Email Secure DX
• Email (Outlook) Secure DX Integration Demo (1 min.)
» Internal User Initiates an email in Outlook and attached a large file
» Data is sent via Secure DX Server (not the exchange server)
» External user is sent a link to a download portal.
» External user downloads file via web portal
Email Integration
• BENEFITS OF EMAIL BASED SECURE DX
» END USER DOES NOT CHANGE ANY PRACTICES
» ZERO TRAINING REQUIRED
» POLICIES ARE 100% ENFORCED
» Audit Logs are kept separate from Clients and Mail Servers
» Data is always encrypted before transport outside of enterprise
» No data Load on Mail Server
Demo: Desktop Integration
• Windows Desktop DX Integration Demo (1 min.)
» User registers accessible workspace in Windows Explorer
» Drag and Drop or Copy / Paste files into workspace folder
» Files are securely sent to workspace
» New Files Are Received as well
OS Integration
• BENEFITS of DESKTOP INTEGRATION
» Works like a network shared drive
» Data is always encrypted before transport
» Securely share files with a team without an external client
Demo: Windows “Send-To”
• Windows “Send-To” Demo (30 seconds)
» User Right Clicks on a File
» “Send-To” Secure Portal User
• BENEFITS of “Send-To” INTEGRATION
» Familiar process for many users
» Data is always encrypted before transport
» No Extra Apps to Log into (No “Swivel Chair”)
Windows "Send to"
Scaling up Complexity with back end
systems integration and automation
• Dealing with Engineering Data (of course) plus
» ERP Data
» MRP Data
» Bids
» Financials
» More
• Centralized Reporting on all confidential
Information
Integrated Solutions
Requirements
ERP
PLM
Other
………...
Purchasing
Demo: Sending from Enovia
• Sending from Enovia Demo (1.5 min.)
» User Selects Files to Send from Enovia Client
» Selected is passed to back end server for export and checking
» User Selects recipient
» User approves transfer
• BENEFITS of Sending from Enovia
» Familiar process for engineers
» Work is done on the export server not the client
» No Extra Apps to Log into (No “Swivel Chair”)
PDM / CAD Integrations
Demo: Neutral and Lightweight files
• Creating a 3DPDF from Enovia Demo (1.5 min.)
» User Selects assembly from Enovia Client
» Selected is passed to back end server for conversion
» 3DPDF files is checked back into Enovia
• BENEFITS of integration into Enovia
» Familiar process for engineers
» Work is done on the export server not the client
» Can be part of existing workflow and release process
Alternate Formats
(3DPDF, JT,….)
CASE STUDY: Nordam
CASE STUDY: Nordam
CASE STUDY: Nordam
CASE STUDY: Nordam
CASE STUDY: Nordam
CASE STUDY: Nordam
CASE STUDY: Nordam
CASE STUDY: Nordam
CASE STUDY: Nordam
CASE STUDY: Nordam
DX Requirements
36
Integration
Back-end system
integration
Communication
Status notifications
for high transparency
Data transfer
High volume, robust,
high performance
Security
Adjustable security
levels
Automation
Robots and Gateways
for transfer
automation
Flexibility
Versatile user
interfaces & flexible
software
Documentation
Documentation for
users &
administrators
Processing
Process engine for
data processing
Reports
Research, KPI‘s,
automated reports
Scalability
Flexible software &
license model
• DRM Protected Documents
» Limit Access to named users
» Revoke Rights in the field
» Force Updates to Latest
Document Versions
» Authentic via PKI, AD, LDAP,
RSA, Others
• Limit Document Features
» Read Only
» Save
» Print
» Copy
» Measure
» Cross Sections
» Etc
• Traceability Logs by Document
DRM Requirements
Final Advice From the Field
• Start Today
• Use Free Trials to get a feeling for what does and does not work for your enterprise
• Look for a mix of Hosted or Self Installed Options
• Look for technology that integrates not only front end applications (Outlook, Desktop,
Mobile) but back end applications like PLM, ERP, Etc
• Low Hanging Fruit to go after for DX Security
» Outlook
» Desktop
» Web Based
• Don’t forget about protecting your data once it leaves your enterprise. Getting it there
is only part of the equation.
» Strip unneeded IP
» Consider DRM solutions for when your data is in the wild.
» Too much DRM is counter productive !
Shareholders
Over 23 years experience
with engineering interoperability, migration, intelligent documents,
benchmarking, more
Approximately 250 employees and consultants
based from international locations throughout Europe and in North America
More than 500 Customers
that are leading companies across most industries
A vendor neutral / independent engineering services and software company since 1993
infocenter@prostep.com / 8-PROSTEP01 300 Park St – Suite 410 – Birmingham MI 48009
Reseller
Our CustomersCar Manufacturers Automotive Suppliers
•
Electrical / Electronic
40
Our CustomersAerospace Industry Shipbuilding & Marine Engineering
Mechanical Engineering, Plant Construction and Rail Vehicles
•
Other sectors
•
41
Questions:

More Related Content

What's hot

Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...3camp
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Sectricity
 
#MFSummit2016 Operate: The race for space
#MFSummit2016 Operate: The race for space#MFSummit2016 Operate: The race for space
#MFSummit2016 Operate: The race for spaceMicro Focus
 
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationLarry Covert
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapOracleIDM
 
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...Micro Focus
 
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Peter Ocasek
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppttswong
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoMarcoTechnologies
 
CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)Michael King
 
V mware view 5 customer presentation
V mware view 5 customer presentationV mware view 5 customer presentation
V mware view 5 customer presentationsolarisyourep
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Desktone
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1Paul O'Doherty
 

What's hot (19)

Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszłości. Śmierte...
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
#MFSummit2016 Operate: The race for space
#MFSummit2016 Operate: The race for space#MFSummit2016 Operate: The race for space
#MFSummit2016 Operate: The race for space
 
IT__forum_11
IT__forum_11IT__forum_11
IT__forum_11
 
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementation
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 
V mware view
V mware viewV mware view
V mware view
 
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...
 
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppt
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - Marco
 
CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
V mware view 5 customer presentation
V mware view 5 customer presentationV mware view 5 customer presentation
V mware view 5 customer presentation
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1
 
Intermedia Overview
Intermedia OverviewIntermedia Overview
Intermedia Overview
 

Similar to Securely Exchange CATIA Data Outside Your Enterprise

SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
EarthLink Cloud Workspace
EarthLink Cloud WorkspaceEarthLink Cloud Workspace
EarthLink Cloud WorkspaceMike Ricca
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 
Microsoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for NonprofitsMicrosoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for NonprofitsTechSoup
 
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing DemystifiedNJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing DemystifiedExigent Technologies LLC
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022TechSoup
 
30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love CloudVuzion
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Remote Worker Series (Part 3)
Remote Worker Series (Part 3)Remote Worker Series (Part 3)
Remote Worker Series (Part 3)Ivanti
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Eduardo Patrocinio
 
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -finalPeter de Haas
 
Office 365 introduction
Office 365 introductionOffice 365 introduction
Office 365 introductionGlobal News
 
From Desktop to the Cloud: Why Organizations Are Converting
From Desktop to the Cloud: Why Organizations Are ConvertingFrom Desktop to the Cloud: Why Organizations Are Converting
From Desktop to the Cloud: Why Organizations Are ConvertingTechSoup
 
Scanning To Cloud Presentation
Scanning To Cloud PresentationScanning To Cloud Presentation
Scanning To Cloud Presentationguest3a3ab
 
AWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinarAWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinarAmazon Web Services
 
Cloud computing 2013
Cloud computing 2013Cloud computing 2013
Cloud computing 2013John Owens
 
How to Securely Exchange Data Outside Your Enterprise
How to Securely Exchange Data Outside Your EnterpriseHow to Securely Exchange Data Outside Your Enterprise
How to Securely Exchange Data Outside Your EnterpriseJoseph Lopez, M.ISM
 

Similar to Securely Exchange CATIA Data Outside Your Enterprise (20)

SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
EarthLink Cloud Workspace
EarthLink Cloud WorkspaceEarthLink Cloud Workspace
EarthLink Cloud Workspace
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
Microsoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for NonprofitsMicrosoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for Nonprofits
 
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing DemystifiedNJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022
 
30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Remote Worker Series (Part 3)
Remote Worker Series (Part 3)Remote Worker Series (Part 3)
Remote Worker Series (Part 3)
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
 
Office 365 introduction
Office 365 introductionOffice 365 introduction
Office 365 introduction
 
From Desktop to the Cloud: Why Organizations Are Converting
From Desktop to the Cloud: Why Organizations Are ConvertingFrom Desktop to the Cloud: Why Organizations Are Converting
From Desktop to the Cloud: Why Organizations Are Converting
 
Scanning To Cloud Presentation
Scanning To Cloud PresentationScanning To Cloud Presentation
Scanning To Cloud Presentation
 
AWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinarAWS Webcast - Amazon work spaces public sector webinar
AWS Webcast - Amazon work spaces public sector webinar
 
Cloud computing 2013
Cloud computing 2013Cloud computing 2013
Cloud computing 2013
 
How to Securely Exchange Data Outside Your Enterprise
How to Securely Exchange Data Outside Your EnterpriseHow to Securely Exchange Data Outside Your Enterprise
How to Securely Exchange Data Outside Your Enterprise
 

More from Joseph Lopez, M.ISM

PROSTEP Api for the Digital Thread
PROSTEP Api for the Digital ThreadPROSTEP Api for the Digital Thread
PROSTEP Api for the Digital ThreadJoseph Lopez, M.ISM
 
PROSTEP system interoperability with OpenPDM
PROSTEP system interoperability with OpenPDMPROSTEP system interoperability with OpenPDM
PROSTEP system interoperability with OpenPDMJoseph Lopez, M.ISM
 
Prostep enterprise data exchange
Prostep enterprise data exchangeProstep enterprise data exchange
Prostep enterprise data exchangeJoseph Lopez, M.ISM
 
Prostep PLM consluting and services
Prostep PLM consluting and servicesProstep PLM consluting and services
Prostep PLM consluting and servicesJoseph Lopez, M.ISM
 
Oslc case study (poc results) v1.1
Oslc case study (poc results) v1.1Oslc case study (poc results) v1.1
Oslc case study (poc results) v1.1Joseph Lopez, M.ISM
 
Successfully Integrating MBSE Data Without Replication Using OSLC
Successfully Integrating MBSE Data Without Replication Using OSLCSuccessfully Integrating MBSE Data Without Replication Using OSLC
Successfully Integrating MBSE Data Without Replication Using OSLCJoseph Lopez, M.ISM
 
Insufficient Communication In Shipbuilding - Communication Data Exchange
Insufficient Communication In Shipbuilding - Communication Data ExchangeInsufficient Communication In Shipbuilding - Communication Data Exchange
Insufficient Communication In Shipbuilding - Communication Data ExchangeJoseph Lopez, M.ISM
 
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPData Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPJoseph Lopez, M.ISM
 
3D Formats in the Field of Engineering - A Comparison
3D Formats in the Field of Engineering - A Comparison3D Formats in the Field of Engineering - A Comparison
3D Formats in the Field of Engineering - A ComparisonJoseph Lopez, M.ISM
 
The Challenges of PLM Collaboration
The Challenges of PLM CollaborationThe Challenges of PLM Collaboration
The Challenges of PLM CollaborationJoseph Lopez, M.ISM
 
Smart Engineering - The Impact of Industry 4.0 on PLM
Smart Engineering - The Impact of Industry 4.0 on PLMSmart Engineering - The Impact of Industry 4.0 on PLM
Smart Engineering - The Impact of Industry 4.0 on PLMJoseph Lopez, M.ISM
 
Do-It-Yourself ENOVIA PLM MIgration
Do-It-Yourself ENOVIA PLM MIgrationDo-It-Yourself ENOVIA PLM MIgration
Do-It-Yourself ENOVIA PLM MIgrationJoseph Lopez, M.ISM
 
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"Joseph Lopez, M.ISM
 

More from Joseph Lopez, M.ISM (15)

PROSTEP Api for the Digital Thread
PROSTEP Api for the Digital ThreadPROSTEP Api for the Digital Thread
PROSTEP Api for the Digital Thread
 
PROSTEP system interoperability with OpenPDM
PROSTEP system interoperability with OpenPDMPROSTEP system interoperability with OpenPDM
PROSTEP system interoperability with OpenPDM
 
Prostep enterprise data exchange
Prostep enterprise data exchangeProstep enterprise data exchange
Prostep enterprise data exchange
 
PROSTEP 3D PDF Technologies
PROSTEP 3D PDF TechnologiesPROSTEP 3D PDF Technologies
PROSTEP 3D PDF Technologies
 
Prostep PLM consluting and services
Prostep PLM consluting and servicesProstep PLM consluting and services
Prostep PLM consluting and services
 
Oslc case study (poc results) v1.1
Oslc case study (poc results) v1.1Oslc case study (poc results) v1.1
Oslc case study (poc results) v1.1
 
Successfully Integrating MBSE Data Without Replication Using OSLC
Successfully Integrating MBSE Data Without Replication Using OSLCSuccessfully Integrating MBSE Data Without Replication Using OSLC
Successfully Integrating MBSE Data Without Replication Using OSLC
 
Insufficient Communication In Shipbuilding - Communication Data Exchange
Insufficient Communication In Shipbuilding - Communication Data ExchangeInsufficient Communication In Shipbuilding - Communication Data Exchange
Insufficient Communication In Shipbuilding - Communication Data Exchange
 
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPData Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEP
 
3D PDF Technology from PROSTEP
3D PDF Technology from PROSTEP3D PDF Technology from PROSTEP
3D PDF Technology from PROSTEP
 
3D Formats in the Field of Engineering - A Comparison
3D Formats in the Field of Engineering - A Comparison3D Formats in the Field of Engineering - A Comparison
3D Formats in the Field of Engineering - A Comparison
 
The Challenges of PLM Collaboration
The Challenges of PLM CollaborationThe Challenges of PLM Collaboration
The Challenges of PLM Collaboration
 
Smart Engineering - The Impact of Industry 4.0 on PLM
Smart Engineering - The Impact of Industry 4.0 on PLMSmart Engineering - The Impact of Industry 4.0 on PLM
Smart Engineering - The Impact of Industry 4.0 on PLM
 
Do-It-Yourself ENOVIA PLM MIgration
Do-It-Yourself ENOVIA PLM MIgrationDo-It-Yourself ENOVIA PLM MIgration
Do-It-Yourself ENOVIA PLM MIgration
 
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

Securely Exchange CATIA Data Outside Your Enterprise

  • 1. Securely Exchange CATIA Data Outside Your Enterprise Paul W. Downing PROSTEP Inc. Session DEM 5101
  • 2. How to Securely Exchange CATIA Data Outside Your Enterprise • Take Away Topics » How your organization is leaking information. » Why information leakage is so hard to control. » Which free or paid options are available to help mitigate this problem.
  • 3. Is IP Protection your concern? Should it be?
  • 4. Is IP Theft really a problem?
  • 5. Not Just “basement hackers”
  • 7. ITAR / Export Control Increased Fines
  • 8. ITAR Violation Settled Between 2010 and 2016 Company Name Number of Violations Final Amount Paid Year Marc Turi and Turi Defense Group, Inc. 2 $200,000 2016 Microwave Engineering Corporation 1 $100,000 2016 Intersil Corporation 339 $10,000,000 2014 Esterline Technologies Corporation 282 $20,000,000 2014 Meggitt-USA, Inc. 67 $25,000,000 2013 Aeroflex, Inc. 158 $8,000,000 2013 Raytheon Company 125 $8,000,000 2013 United Technologies Corporation 576 $55,000,000 2012 Alpine Aerospace 9 $50,000 2012 BAE Systems plc 2591 $79,000,000 2011 Xe Services LLC 288 $42,000,000 2010 AAR International, Inc. 13 $0 2010 Interturbine Aviation Logistics GmbH 7 $1,000,000 2010 Total 4458 $248,350,000.00 Average fine per violation $55,708.84 source:http://pmddtc.state.gov/compliance/poa.html
  • 9. It’s OK you only send data securely! Right ?
  • 12. Data Exchange vs. IP Protection
  • 13. How old are your protocols? • Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. SMTP was first defined by RFC 821 in 1982 and grew out of standards developed during the 1970s. • File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and uses separate control and data connections between the client and the server typically with clear text authentication and published as RFC 114 in 1971. Paraphrased from <http://en.wikipedia.org/wiki/FTP>
  • 14. Why do we keep doing it? CONVENIENCE! “increasing convenience almost always reduces security” …. but does it really have to be that way?
  • 15. Convenient and Secure? • Secure exchange needs to start as close possible to the end users daily working environment » Desktop Integration » Email Integration » PLM Integration » Purchasing / Bid Systems • If users have to leave their default working environment to send secure information, they are less likely to use the approved solution.
  • 16. Ease of Deployment vs. Adoption April 2016 BASE MODUL OPTIONS OS Integration Windows "Send to" Web Browser PDM / CAD Integrations Mobile Apps Automated Services Email Integration Alternate Formats (3DPDF, JT,….)
  • 17. Standalone “Simple” Portal Solution Supplier / ConsumerOEM / Sponsor Standalone Portal Solutions  Quick / Easy to Deploy  Simple Administration  Affordable (sometimes free)  Good Basic Security (outside of email)  Often Hosted outside of company * Not Integrated (“Swivel Chair” Solution) – Less Convenient (must be logged in and online) – Can be hard to customize (if at all) – *Monthly Fees for users / volume add up quickly –
  • 18. “Advanced” Portal Concepts Automated Processes  Upload and download with Agent, installed at the user's desktop Agent Location 2 Database FileVault Server CAD Converter Gateway KeyStore Server Location  Main OEM Server Location  Authentication  Encrypted data storage  PKI-Management  User right definitions  Processing control  Logging  E-Mail notification  Data routing  Data conversion, … Gateway Location 3  Batch Mode  Data are temporary stored quickly in local network drive  Transfer of data to run completely in a batch mode Gateway FileVault CAD Converter Location 4 Advanced Functionality  Encryption  Local File Vaults  Local conversion of data WAN / Internet  Manual Processes  User sign on over WEB-Browser and up- or download data manually, interactively Location 1 WAN / Internet Robot Partner Internet  System to System  Automated / Integrated  Remote Data Vaults  Supplier signs in over WEB-Browser  Data is uploaded from a data vault close to the end user Supplier Internet Advanced Portal Solutions  Deeply integrated into systems and processes  Fully automated and work behind the scenes  Installed in the enterprise or the cloud  Centralized or Distributed  Designed for customization Upfront Infrastructure Costs – Upfront Planning Requirement – Administrative Overhead –
  • 19. Demo: Email Secure DX • Email (Outlook) Secure DX Integration Demo (1 min.) » Internal User Initiates an email in Outlook and attached a large file » Data is sent via Secure DX Server (not the exchange server) » External user is sent a link to a download portal. » External user downloads file via web portal Email Integration • BENEFITS OF EMAIL BASED SECURE DX » END USER DOES NOT CHANGE ANY PRACTICES » ZERO TRAINING REQUIRED » POLICIES ARE 100% ENFORCED » Audit Logs are kept separate from Clients and Mail Servers » Data is always encrypted before transport outside of enterprise » No data Load on Mail Server
  • 20. Demo: Desktop Integration • Windows Desktop DX Integration Demo (1 min.) » User registers accessible workspace in Windows Explorer » Drag and Drop or Copy / Paste files into workspace folder » Files are securely sent to workspace » New Files Are Received as well OS Integration • BENEFITS of DESKTOP INTEGRATION » Works like a network shared drive » Data is always encrypted before transport » Securely share files with a team without an external client
  • 21. Demo: Windows “Send-To” • Windows “Send-To” Demo (30 seconds) » User Right Clicks on a File » “Send-To” Secure Portal User • BENEFITS of “Send-To” INTEGRATION » Familiar process for many users » Data is always encrypted before transport » No Extra Apps to Log into (No “Swivel Chair”) Windows "Send to"
  • 22. Scaling up Complexity with back end systems integration and automation • Dealing with Engineering Data (of course) plus » ERP Data » MRP Data » Bids » Financials » More • Centralized Reporting on all confidential Information
  • 24. Demo: Sending from Enovia • Sending from Enovia Demo (1.5 min.) » User Selects Files to Send from Enovia Client » Selected is passed to back end server for export and checking » User Selects recipient » User approves transfer • BENEFITS of Sending from Enovia » Familiar process for engineers » Work is done on the export server not the client » No Extra Apps to Log into (No “Swivel Chair”) PDM / CAD Integrations
  • 25. Demo: Neutral and Lightweight files • Creating a 3DPDF from Enovia Demo (1.5 min.) » User Selects assembly from Enovia Client » Selected is passed to back end server for conversion » 3DPDF files is checked back into Enovia • BENEFITS of integration into Enovia » Familiar process for engineers » Work is done on the export server not the client » Can be part of existing workflow and release process Alternate Formats (3DPDF, JT,….)
  • 36. DX Requirements 36 Integration Back-end system integration Communication Status notifications for high transparency Data transfer High volume, robust, high performance Security Adjustable security levels Automation Robots and Gateways for transfer automation Flexibility Versatile user interfaces & flexible software Documentation Documentation for users & administrators Processing Process engine for data processing Reports Research, KPI‘s, automated reports Scalability Flexible software & license model
  • 37. • DRM Protected Documents » Limit Access to named users » Revoke Rights in the field » Force Updates to Latest Document Versions » Authentic via PKI, AD, LDAP, RSA, Others • Limit Document Features » Read Only » Save » Print » Copy » Measure » Cross Sections » Etc • Traceability Logs by Document DRM Requirements
  • 38. Final Advice From the Field • Start Today • Use Free Trials to get a feeling for what does and does not work for your enterprise • Look for a mix of Hosted or Self Installed Options • Look for technology that integrates not only front end applications (Outlook, Desktop, Mobile) but back end applications like PLM, ERP, Etc • Low Hanging Fruit to go after for DX Security » Outlook » Desktop » Web Based • Don’t forget about protecting your data once it leaves your enterprise. Getting it there is only part of the equation. » Strip unneeded IP » Consider DRM solutions for when your data is in the wild. » Too much DRM is counter productive !
  • 39. Shareholders Over 23 years experience with engineering interoperability, migration, intelligent documents, benchmarking, more Approximately 250 employees and consultants based from international locations throughout Europe and in North America More than 500 Customers that are leading companies across most industries A vendor neutral / independent engineering services and software company since 1993 infocenter@prostep.com / 8-PROSTEP01 300 Park St – Suite 410 – Birmingham MI 48009 Reseller
  • 40. Our CustomersCar Manufacturers Automotive Suppliers • Electrical / Electronic 40
  • 41. Our CustomersAerospace Industry Shipbuilding & Marine Engineering Mechanical Engineering, Plant Construction and Rail Vehicles • Other sectors • 41
  • 42.
  • 43.