SlideShare une entreprise Scribd logo
1  sur  71
Télécharger pour lire hors ligne
1
1
Contents
2
Push for business - Peter Broekroelofs
Push and IT - Harry ten Berge
Push and legal - Derk Tegeler
Push mobile engagement to the next level
Consumers adopt push
notifications but
want to be in control
Push notifications
enable better
engagement
The challenge is to integrate
push notifications into a
direct marketing strategy
3
3
4
Consumers adopt push notifications
•  Consumers opting in offer you a unique privilige
•  76% of European mobile app users receive push notifications
•  26% receiving them several times a day
•  Perceived extremely intrusive if not
relevant or timely (bad push)
•  Consumers want to be in control
4
Forrester, Oct 2013
5
Bad push results in opt-out and app removal
Relevant in gender

Try the new waterproof mascara
Relevant in age 

Discount on new ultra running shoes
Relevant in Time/Location

Ajax scores!
5
6
Know when to send and to whom
•  Customer segmentation
•  Customer preferences
•  Up to individual level
Push notifications improve engagement
8 | Technology
KL Air now"
We have 6 chairs with extra
legroom available on your
flight to Rome It’s possible for
you to upgrade now"
slide to view!
KL Air now
Buy extra award miles this
week and earn up to 50%
bonus miles!"
slide to view!!
We have 6 chairs with extra
legroom available on your
flight to Rome It’s possible for
you to upgrade now!
Deliver additional benefits
8
Push engagement to support your business
Acquisition
 Retention
 Efficiency
8
Relevancy and context
Push integration points: Backend and app
App on the deviceEnterprise backend
Device registration,
Message handlers
Message composition
Business rules
Push server
Notification
networks
GPS Location
Beacon proximity
Time, schedule, zones
Phone sensors
•  Camera
•  G-sensors
Wifi proximity
Other sensors
•  Security cameras
•  Babyphone
•  Water leakage
•  Burglar alarms
•  In-car sensors
•  Broken devices
Other push messages
Combining technologies for context
Push
App actions
Backend business logic
ERP/CRM/etc
11
Pops	
  up	
  your	
  boarding	
  pass	
  
Get	
  a	
  free	
  drink	
  at	
  ‘Nacho	
  Hippo’	
  
“Please	
  switch	
  off	
  your	
  phone”	
  
Example: BLE Beacon
center
radius
Example: Home automation
CERTA
Secure Push
All	
  lights	
  and	
  hea-ng	
  
are	
  switched	
  off.	
  
Example: Home automation
CERTA
Secure Push
Alert:	
  Your	
  burglar	
  
alarm	
  is	
  ac-vated.	
  Do	
  
you	
  want	
  to	
  view	
  
your	
  webcam?	
  
Example: Local news
CERTA
Secure Push
Dam-­‐tot-­‐damloop	
  
veroorzaakt	
  grote	
  
verkeerschaos.	
  
15
Integrate push into your CRM and Marketing strategy
Mobile
 Email
 Web
15
Push will be key in mobile messaging:
more engaging, in-depth measurement, detailed targeting, inexpensive	
  	
  
Desktop push
16
Soon on other devices, like wearables
18
CUSTOMER	
  CASES	
  
Push case NOS
19
NOS case: Core part of the product experience
"Push notifications enable NOS to
instantly inform a vast amount of
customers on big news and sports stories.
This is vital for NOS to fulfill its mission. 

By helping us reaching these customers
with notifications on platforms as Android,
iOS, Windows Phone but also on the web,
CERTA helps us focus on what we're good
at: telling you about news and sports.”

Tom van den Broek
NOS Mobile Product Manager
20
Push effect: optimizing app usage
+25%
21
25% Increase of App Traffic Volume
2.5%
Of app visitors convert to a
product or paid service
 € 625,000
Intent Guide’s 3 Key Benefits
€ 1,875,000 per year
Additional revenue per year (€ 156,250 *12) 
Is the percentage of additional
product and service sales
Estimated value per transaction
€ 25
Is the commercial monthly value
25%
=
1,000,000
App opens per month
25% Increase of App Traffic Volume!
Hypothetical retail case:
22
Push case Emesa
One-to-one dialog
23
24
•  20,000 messages per day
•  50% of all app opens are a
direct triggers from a push
notification
Business Case:
Creating Engagement by Relevancy an Context
Vakantieveilingen now
Je bent overboden!
slide to view!
Vakantieveilingen now
Je hebt een veiling
gewonnen!!
slide to view!
25
80% Increased App retention after using
push notification services
Push effect
Vakantieveilingen now
Je hebt een veiling
gewonnen!!
slide to view!
26
Good Push: Personal and in Context
Service Retention New Business
Emesa now
Bied vandaag mee op Robin!
Thicke kaarten en maak kans
op een VIP arrangement!!
schuif om te bekijken
!
Emesa now
De veiling, 2 overnachtingen
voor 2 personen in hartje
Amsterdam loopt bijna af. !
schuif om te bekijken
!
Emesa now
Hi Marc, jouw favoriete veiling!
Is weer online. Bekijk hem in de
app. schuif om te bekijken
!
27
Good Push: Personal and in Context


•  Involvement
•  Location Based


Emesa now
Hoi Marc, vanavond is het zover!!
De toppers in concert. Vergeet
niet jouw geprinte e-ticket mee te
nemen. Veel plezier!!
slide to view!
Emesa now
Welkom in de Arena.!
Vakantieveilingen.nl wenst je veel
plezier bij de Toppers!!
slide to view!
28
Push case MyOrder


Thomas Brinkman, Founder and CCO:
By using Push, Geo location and BigData
we make sure we are relevant
in the right context for our users.
Push is the perfect way to facilitate this
interaction.
29
Make push integrated part of your app strategy
Get deeper customer behavioral understanding
Measure
customer journey
	
  
Capture
user preferences
	
  
Test your
customer behavior
	
  
29
30
PUSH	
  AND	
  IT	
  
Harry	
  ten	
  Berge	
  
31
Client implementation
•  Native SDK (iOS, Android, WP8)
•  Cordova Plugin for HTML5 apps
•  So…. How difficult is this actually?
32
Client implementation
1.  Make an account on CERTA.io
2.  Download the SDK
3.  Follow the documentation
4.  And send your first push!
5.  We can help!
33
Designed for high volumes of notifications
•  High performance
•  Fault tolerant
•  Scalable
33
34
Push Manager Interface
REST HTTPS,
IP filtering
App Backend
or
Portal
App
Push Interface
REST HTTPS
Push networks – Apple, Android, etc…
CERTA Push
Push Manager
webservice
Push webservice
Registertoken
Registerpreference
Register/deregister
(Certificate, preferences)
Wipe
(Tokens, preferences)
Query
(preferences, token)
Push
DB
Tokens
preferences
CERTA architecture
35
How can you connect to the back-end?
•  REST API
•  SSL
•  IP filtering
35
Push networks fragmentation
Apple APNS
Google CGM
Google C2DM
Microsoft MPS
Microsoft WNS
BlackBerry
Push
YOUR
ENTERPRISE
BACK END
Push networks fragmentation
Apple APNS
Google CGM
Google C2DM
Microsoft MPS
Microsoft WNS
BlackBerry
Push
CERTA
YOUR
ENTERPRISE
BACK END
CERTA.io portal
CERTA.io portal
40
Filter profiles consist of logical expressions, e.g.:
!(Airport == "AMS")!
!
!(Category == “Delay”)!
!
!(Flight == “KL0845”!
!
!((AIRPORT == "AMS") && (Category == “Delay”))!
CERTA Push unique filtering
41
“Rich” push
CLIENT	
  
CLIENT	
  
SERVER	
  
SERVER	
  
BACKEND	
  
BACKEND	
  
registerService()	
  
You	
  are	
  registered	
  OK	
  
registerPreference(“customerid=1234”)	
  
OK	
  
RichPush(“customerid=1234”,	
  	
  
“richpushid=“56”,	
  “your	
  bill	
  is	
  ready”)	
  
Message	
  sent	
  OK	
  
RichPush(“your	
  bill	
  is	
  ready”,	
  “richpushid=56”)	
  
process	
  msg	
  
RetrieveRichPush(“id=56”)	
  
StoreRichPush(“id=56”,	
  RICH_PUSH_CONTENT)	
  
RichPushContent(“id=56”,	
  RICH_PUSH_CONTENT)	
  
42
Performance thoughts
Over 1.5 million recipients in 2.5 minutes!
43
Silent push
44
PUSH	
  AND	
  LEGAL	
  
Derk	
  Tegeler	
  
Because conversation between you and your customer is private
Contents
46
•  Where is your data and is that allowed?
•  Security & Privacy leaks and threats
•  Certa Push and Private Data
•  Push, secured.
Expectations…
47
•  I’m going to drag you through the ‘legaleze’
•  I’m going to depress you
•  I’ll reassure you
•  … bear with me
Legal…
48
•  Shift from ‘owner’ to ‘custodian’
•  Increased responsibilities
•  Increased penalties
49
Push	
  Data?	
  
Wet Bescherming Persoonsgegevens (WBP)
50
•  Dutch Data Protection Act
•  Protect against data abuse.
•  European Economic Area (EEA)
•  Protect personal data
•  Opt-in
Patriot Act & Consorts
51
•  Validity, purpose and scope
•  Designed as an anti-terrorism weapon (sect 201), in reality very broad
–  computer fraud, abuse offenses, sect 202
–  foreign intelligence information, sect 218
•  Impact in NL
•  Other countries
•  Data confidentiality and integrity are under threat.
•  Microsoft, Skype, Google and others have reported such occurrences and are now in the
public domain.
Legal Basis for Push
52
•  The WBP and Patriot Act are incompatible
•  Personal data must remain in the EEA
•  Relevance of data collection
•  Data protection measures
Future
53
European law and directives
tend towards:
	
  
•  Increasingly make use of multichannel authentication
•  Criminalise enterprises responsible for data leaks
•  Oblige enterprises to divulge data leaks
•  Penalise enterprises with fines up to 2-5% of yearly turnover
•  Personal data belongs to the individual, not the holder or processor,
meaning that enterprises holding or processing personal data are
custodians, like banks are for money.
The role of Telecom Operators
54
•  ACM* + CIOT
•  Telco’s
Technical means for ‘Lawful Data Interception’
Daily reports to the CIOT containing comprehensive metadata
*ex-OPTA
Sources
55
•  Agentschap Telecom (agenschaptelecom.nl)
•  Autoriteit Consument & Markt (acm.nl)
•  Rijksoverheid (rijksoverheid.nl)
•  ‘Zin en onzin over PRISM, Patriot Act en de Wet
bescherming persoonsgegevens’, Allen & Overy and
Schuberg Philis, feb 2014
56
EU	
  Partner	
  
EU Partner
57
•  Conforms to European Data Protection Acts
•  You know the location of the data you are responsible for
•  You know who handles your messages
•  You have a contract and an SLA
58
Leaks	
  &	
  Threats	
  
Push security is …
59
… A leap of faith, not a chain of trust
•  Third-parties with no SLA or other legal relationship
•  Message confidentiality and integrity
•  90% of messages transit through 2 organisations
Push security risks
60
•  Insecure network traffic
Whilst posting the message
•  Insecure network traffic
Whilst delivering the message
•  Credentials
61
Push	
  data	
  confidenEality	
  
CERTA Push security
62
•  Secure login
•  IP filtering
•  ISO 27001 like processes and procedures for data access
(databases and infrastructure)
•  We only hold:
–  Your credentials
–  Your push certificates
–  Push tokens ID’s
–  Optionally, ‘expressions’
CERTA Push confidentiality
63
•  No personal data
•  Unique ID’s
–  App instance ID (CERTA ID)
–  User ID
•  Anonymous data
64
Filter profiles consist of logical expressions, e.g.:
•  One to many
!
(Airport == "AMS")!
!
(Category == “Delay”)!
!
(Flight == “KL0845”!
!
((AIRPORT == "AMS") && (Category == “Delay”))!
!
!
•  One to one
!
(UID == “0x0cb77b161b283d95a7e4343922c8cd19dc1131face7a2efe08caae19e42ac78b”)!
Push unique filtering
65
Push,	
  secured.	
  
Push, secured.
66
•  Why?
–  Confidentiality (may be a legal requirement)
–  Integrity (anti-fraud, etc.)
•  2 Options
–  Encrypted messages
–  Use push as a trigger to retrieve encrypted messages
(ie. Secure Rich Push)
Push, secured.
67
What is it?
Push, secured.
68
Encrypted	
  messages	
   Secure	
  Rich	
  Push	
  
Single	
  transmission	
   Triggered	
  retrieval	
  
Only	
  small	
  messages	
  <160	
  bytes	
   No	
  size	
  limita-ons	
  
No	
  outgoing	
  connec-on	
  or	
  message	
  store	
  
required	
  
Message	
  store	
  is	
  separate	
  from	
  the	
  Certa	
  Push	
  
server,	
  meaning	
  that	
  the	
  message	
  delivery	
  path	
  
is	
  different,	
  and,	
  much	
  closer	
  
Decryp-on	
  key	
  must	
  be	
  shared	
  before	
  receiving	
  
the	
  message	
  
Decryp-on	
  key	
  must	
  be	
  shared	
  before	
  receiving	
  
the	
  message	
  
Encrypted	
  messages	
  pass	
  through	
  foreign	
  third	
  
par-es,	
  that	
  may	
  try	
  decryp-ng	
  messages	
  or	
  
demand/obtain	
  decryp-on	
  keys	
  
	
  
The	
  only	
  way	
  to	
  keep	
  your	
  data	
  in	
  your	
  country	
  
App Enrolment
69
Decryption key must be shared before receiving the message
•  App Enrolment binds
–  the user to the app instance,
–  the app instance to your back end infrastructure,
–  register with CERTA Push.
•  App enrolment creates
–  encryption/decryption keys,
–  Optionally create tech prerequisites for
•  Secure transmissions,
•  Secure storage,
•  Non-Repudiation.
Push, secured.
70
We have dealt with
•  your legal risks and obligations,
•  your role in the design of the solution,
•  the technical security risks.
è Push with CERTA ç
with today’s and tomorrow’s risks under wraps.
https://certa.io
71
Closing	
  remarks	
  
+	
  
QuesEons	
  
	
  

Contenu connexe

Tendances

Mobile Maturity Model
Mobile Maturity ModelMobile Maturity Model
Mobile Maturity ModelSTART Houston
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachRapidValue
 
Webinar Push & Beacons
Webinar Push & BeaconsWebinar Push & Beacons
Webinar Push & BeaconsService2Media
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentationAlessandro Bottega
 
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Nitin Gaur
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategyAjit Gokhale
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise MobilityMatthew David
 
Mobile roadmap & maturity model
Mobile roadmap & maturity modelMobile roadmap & maturity model
Mobile roadmap & maturity modelPatrick McLean
 
Mobility needs at an enterprise level
Mobility needs at an enterprise levelMobility needs at an enterprise level
Mobility needs at an enterprise levelConvergeGurgaon
 
Bluemix digital innovation_platform
Bluemix digital innovation_platformBluemix digital innovation_platform
Bluemix digital innovation_platformNitin Gaur
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...RapidValue
 
Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.DMI
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 

Tendances (20)

Mobile Maturity Model
Mobile Maturity ModelMobile Maturity Model
Mobile Maturity Model
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approach
 
Webinar Push & Beacons
Webinar Push & BeaconsWebinar Push & Beacons
Webinar Push & Beacons
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategy
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility
 
Mobile roadmap & maturity model
Mobile roadmap & maturity modelMobile roadmap & maturity model
Mobile roadmap & maturity model
 
Mobility needs at an enterprise level
Mobility needs at an enterprise levelMobility needs at an enterprise level
Mobility needs at an enterprise level
 
Bluemix digital innovation_platform
Bluemix digital innovation_platformBluemix digital innovation_platform
Bluemix digital innovation_platform
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
4 Stages of a Smart Mobile Strategy
4 Stages of a Smart Mobile Strategy4 Stages of a Smart Mobile Strategy
4 Stages of a Smart Mobile Strategy
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.Creating a mobile enterprise application business case.
Creating a mobile enterprise application business case.
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 

Similaire à CERTA Push Messaging - Product Launch

Shoutlet and IBM's Executive Social Marketing Summit
Shoutlet and IBM's Executive Social Marketing SummitShoutlet and IBM's Executive Social Marketing Summit
Shoutlet and IBM's Executive Social Marketing SummitShoutlet, a Spredfast Company
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
Mobile Bang Theory - Gartner Mobile & Wireless 2009
Mobile Bang Theory - Gartner Mobile & Wireless 2009Mobile Bang Theory - Gartner Mobile & Wireless 2009
Mobile Bang Theory - Gartner Mobile & Wireless 2009Relayware
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP securityERPScan
 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business
 
JFS 2021 - The Process Automation Map
JFS 2021 - The Process Automation MapJFS 2021 - The Process Automation Map
JFS 2021 - The Process Automation MapBernd Ruecker
 
Connecting Above the Cloud
Connecting Above the CloudConnecting Above the Cloud
Connecting Above the CloudPeter Coffee
 
Impact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP LandscapeImpact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP LandscapeJos Feyaerts
 
Scot Cloud 2016
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016Ray Bugg
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesJohn Mancini
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Digital Disruptives
Digital Disruptives Digital Disruptives
Digital Disruptives Jeremy Caine
 
EVAM_Streaming Analytics_v1.5
EVAM_Streaming Analytics_v1.5EVAM_Streaming Analytics_v1.5
EVAM_Streaming Analytics_v1.5John Nikolaidis
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at MerakiCisco Canada
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtechSvetlanaUsikava
 
20170613 iasa architecture - Tim Willoughby presentation
20170613   iasa architecture  - Tim Willoughby presentation20170613   iasa architecture  - Tim Willoughby presentation
20170613 iasa architecture - Tim Willoughby presentationTim Willoughby
 
4 Reasons Accounting Firms Should Migrate To The Cloud
4 Reasons Accounting Firms Should Migrate To The Cloud4 Reasons Accounting Firms Should Migrate To The Cloud
4 Reasons Accounting Firms Should Migrate To The CloudAvni Rajput
 
Presentation @Datanews Business Forum - 20/09/2012
Presentation @Datanews Business Forum - 20/09/2012Presentation @Datanews Business Forum - 20/09/2012
Presentation @Datanews Business Forum - 20/09/2012Christophe Leenknecht
 

Similaire à CERTA Push Messaging - Product Launch (20)

Shoutlet and IBM's Executive Social Marketing Summit
Shoutlet and IBM's Executive Social Marketing SummitShoutlet and IBM's Executive Social Marketing Summit
Shoutlet and IBM's Executive Social Marketing Summit
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Lecot: Raf Maesen
Lecot: Raf MaesenLecot: Raf Maesen
Lecot: Raf Maesen
 
Mobile Bang Theory - Gartner Mobile & Wireless 2009
Mobile Bang Theory - Gartner Mobile & Wireless 2009Mobile Bang Theory - Gartner Mobile & Wireless 2009
Mobile Bang Theory - Gartner Mobile & Wireless 2009
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for Business
 
JFS 2021 - The Process Automation Map
JFS 2021 - The Process Automation MapJFS 2021 - The Process Automation Map
JFS 2021 - The Process Automation Map
 
Connecting Above the Cloud
Connecting Above the CloudConnecting Above the Cloud
Connecting Above the Cloud
 
Impact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP LandscapeImpact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP Landscape
 
Scot Cloud 2016
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three Slides
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Digital Disruptives
Digital Disruptives Digital Disruptives
Digital Disruptives
 
EVAM_Streaming Analytics_v1.5
EVAM_Streaming Analytics_v1.5EVAM_Streaming Analytics_v1.5
EVAM_Streaming Analytics_v1.5
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
Innovation at Meraki
Innovation at MerakiInnovation at Meraki
Innovation at Meraki
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtech
 
20170613 iasa architecture - Tim Willoughby presentation
20170613   iasa architecture  - Tim Willoughby presentation20170613   iasa architecture  - Tim Willoughby presentation
20170613 iasa architecture - Tim Willoughby presentation
 
4 Reasons Accounting Firms Should Migrate To The Cloud
4 Reasons Accounting Firms Should Migrate To The Cloud4 Reasons Accounting Firms Should Migrate To The Cloud
4 Reasons Accounting Firms Should Migrate To The Cloud
 
Presentation @Datanews Business Forum - 20/09/2012
Presentation @Datanews Business Forum - 20/09/2012Presentation @Datanews Business Forum - 20/09/2012
Presentation @Datanews Business Forum - 20/09/2012
 

Plus de Service2Media

Webinar SAP connected mobile apps with the app lifecycle platform
Webinar SAP connected mobile apps with the app lifecycle platformWebinar SAP connected mobile apps with the app lifecycle platform
Webinar SAP connected mobile apps with the app lifecycle platformService2Media
 
M2 active cloud push
M2 active cloud pushM2 active cloud push
M2 active cloud pushService2Media
 
Service2 media interview brookz
Service2 media interview brookzService2 media interview brookz
Service2 media interview brookzService2Media
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Webinar The App Lifecycle Platform
Webinar The App Lifecycle PlatformWebinar The App Lifecycle Platform
Webinar The App Lifecycle PlatformService2Media
 
Webinar Media Apps: 10 Question we are most asked
Webinar Media Apps: 10 Question we are most askedWebinar Media Apps: 10 Question we are most asked
Webinar Media Apps: 10 Question we are most askedService2Media
 
Energy Insight Utilities Webinar Service2Media
Energy Insight Utilities Webinar Service2MediaEnergy Insight Utilities Webinar Service2Media
Energy Insight Utilities Webinar Service2MediaService2Media
 
Webinar Service2Media: new era of financial engagement apps 15.03.12
Webinar Service2Media: new era of financial engagement apps 15.03.12Webinar Service2Media: new era of financial engagement apps 15.03.12
Webinar Service2Media: new era of financial engagement apps 15.03.12Service2Media
 
Global alliance network
Global alliance networkGlobal alliance network
Global alliance networkService2Media
 

Plus de Service2Media (20)

Webinar SAP connected mobile apps with the app lifecycle platform
Webinar SAP connected mobile apps with the app lifecycle platformWebinar SAP connected mobile apps with the app lifecycle platform
Webinar SAP connected mobile apps with the app lifecycle platform
 
M2 active cloud push
M2 active cloud pushM2 active cloud push
M2 active cloud push
 
Service2 media interview brookz
Service2 media interview brookzService2 media interview brookz
Service2 media interview brookz
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Webinar The App Lifecycle Platform
Webinar The App Lifecycle PlatformWebinar The App Lifecycle Platform
Webinar The App Lifecycle Platform
 
Webinar Media Apps: 10 Question we are most asked
Webinar Media Apps: 10 Question we are most askedWebinar Media Apps: 10 Question we are most asked
Webinar Media Apps: 10 Question we are most asked
 
Energy Insight Utilities Webinar Service2Media
Energy Insight Utilities Webinar Service2MediaEnergy Insight Utilities Webinar Service2Media
Energy Insight Utilities Webinar Service2Media
 
Webinar Service2Media: new era of financial engagement apps 15.03.12
Webinar Service2Media: new era of financial engagement apps 15.03.12Webinar Service2Media: new era of financial engagement apps 15.03.12
Webinar Service2Media: new era of financial engagement apps 15.03.12
 
Apps for insurance
Apps for insuranceApps for insurance
Apps for insurance
 
Global alliance network
Global alliance networkGlobal alliance network
Global alliance network
 
Apps for banking
Apps for bankingApps for banking
Apps for banking
 
Corporate brochure
Corporate brochureCorporate brochure
Corporate brochure
 
Apps for travel
Apps for travelApps for travel
Apps for travel
 
Apps for publishers
Apps for publishersApps for publishers
Apps for publishers
 
Apps for mobile tv
Apps for mobile tvApps for mobile tv
Apps for mobile tv
 
Apps for media
Apps for mediaApps for media
Apps for media
 
Apps for healthcare
Apps for healthcareApps for healthcare
Apps for healthcare
 
Apps for enterprise
Apps for enterpriseApps for enterprise
Apps for enterprise
 
Apps for healthcare
Apps for healthcareApps for healthcare
Apps for healthcare
 
Apps for Enterprise
Apps for EnterpriseApps for Enterprise
Apps for Enterprise
 

Dernier

Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Anthony Dahanne
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 

Dernier (20)

Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 

CERTA Push Messaging - Product Launch

  • 1. 1 1
  • 2. Contents 2 Push for business - Peter Broekroelofs Push and IT - Harry ten Berge Push and legal - Derk Tegeler
  • 3. Push mobile engagement to the next level Consumers adopt push notifications but want to be in control Push notifications enable better engagement The challenge is to integrate push notifications into a direct marketing strategy 3 3
  • 4. 4 Consumers adopt push notifications •  Consumers opting in offer you a unique privilige •  76% of European mobile app users receive push notifications •  26% receiving them several times a day •  Perceived extremely intrusive if not relevant or timely (bad push) •  Consumers want to be in control 4 Forrester, Oct 2013
  • 5. 5 Bad push results in opt-out and app removal Relevant in gender Try the new waterproof mascara Relevant in age Discount on new ultra running shoes Relevant in Time/Location Ajax scores! 5
  • 6. 6 Know when to send and to whom •  Customer segmentation •  Customer preferences •  Up to individual level
  • 7. Push notifications improve engagement 8 | Technology KL Air now" We have 6 chairs with extra legroom available on your flight to Rome It’s possible for you to upgrade now" slide to view! KL Air now Buy extra award miles this week and earn up to 50% bonus miles!" slide to view!! We have 6 chairs with extra legroom available on your flight to Rome It’s possible for you to upgrade now! Deliver additional benefits
  • 8. 8 Push engagement to support your business Acquisition Retention Efficiency 8
  • 9. Relevancy and context Push integration points: Backend and app App on the deviceEnterprise backend Device registration, Message handlers Message composition Business rules Push server Notification networks
  • 10. GPS Location Beacon proximity Time, schedule, zones Phone sensors •  Camera •  G-sensors Wifi proximity Other sensors •  Security cameras •  Babyphone •  Water leakage •  Burglar alarms •  In-car sensors •  Broken devices Other push messages Combining technologies for context Push App actions Backend business logic ERP/CRM/etc
  • 11. 11 Pops  up  your  boarding  pass   Get  a  free  drink  at  ‘Nacho  Hippo’   “Please  switch  off  your  phone”   Example: BLE Beacon center radius
  • 12. Example: Home automation CERTA Secure Push All  lights  and  hea-ng   are  switched  off.  
  • 13. Example: Home automation CERTA Secure Push Alert:  Your  burglar   alarm  is  ac-vated.  Do   you  want  to  view   your  webcam?  
  • 14. Example: Local news CERTA Secure Push Dam-­‐tot-­‐damloop   veroorzaakt  grote   verkeerschaos.  
  • 15. 15 Integrate push into your CRM and Marketing strategy Mobile Email Web 15 Push will be key in mobile messaging: more engaging, in-depth measurement, detailed targeting, inexpensive    
  • 17. Soon on other devices, like wearables
  • 20. NOS case: Core part of the product experience "Push notifications enable NOS to instantly inform a vast amount of customers on big news and sports stories. This is vital for NOS to fulfill its mission. By helping us reaching these customers with notifications on platforms as Android, iOS, Windows Phone but also on the web, CERTA helps us focus on what we're good at: telling you about news and sports.” Tom van den Broek NOS Mobile Product Manager 20
  • 21. Push effect: optimizing app usage +25% 21
  • 22. 25% Increase of App Traffic Volume 2.5% Of app visitors convert to a product or paid service € 625,000 Intent Guide’s 3 Key Benefits € 1,875,000 per year Additional revenue per year (€ 156,250 *12) Is the percentage of additional product and service sales Estimated value per transaction € 25 Is the commercial monthly value 25% = 1,000,000 App opens per month 25% Increase of App Traffic Volume! Hypothetical retail case: 22
  • 24. 24 •  20,000 messages per day •  50% of all app opens are a direct triggers from a push notification Business Case: Creating Engagement by Relevancy an Context Vakantieveilingen now Je bent overboden! slide to view! Vakantieveilingen now Je hebt een veiling gewonnen!! slide to view!
  • 25. 25 80% Increased App retention after using push notification services Push effect Vakantieveilingen now Je hebt een veiling gewonnen!! slide to view!
  • 26. 26 Good Push: Personal and in Context Service Retention New Business Emesa now Bied vandaag mee op Robin! Thicke kaarten en maak kans op een VIP arrangement!! schuif om te bekijken ! Emesa now De veiling, 2 overnachtingen voor 2 personen in hartje Amsterdam loopt bijna af. ! schuif om te bekijken ! Emesa now Hi Marc, jouw favoriete veiling! Is weer online. Bekijk hem in de app. schuif om te bekijken !
  • 27. 27 Good Push: Personal and in Context •  Involvement •  Location Based Emesa now Hoi Marc, vanavond is het zover!! De toppers in concert. Vergeet niet jouw geprinte e-ticket mee te nemen. Veel plezier!! slide to view! Emesa now Welkom in de Arena.! Vakantieveilingen.nl wenst je veel plezier bij de Toppers!! slide to view!
  • 28. 28 Push case MyOrder Thomas Brinkman, Founder and CCO: By using Push, Geo location and BigData we make sure we are relevant in the right context for our users. Push is the perfect way to facilitate this interaction.
  • 29. 29 Make push integrated part of your app strategy Get deeper customer behavioral understanding Measure customer journey   Capture user preferences   Test your customer behavior   29
  • 30. 30 PUSH  AND  IT   Harry  ten  Berge  
  • 31. 31 Client implementation •  Native SDK (iOS, Android, WP8) •  Cordova Plugin for HTML5 apps •  So…. How difficult is this actually?
  • 32. 32 Client implementation 1.  Make an account on CERTA.io 2.  Download the SDK 3.  Follow the documentation 4.  And send your first push! 5.  We can help!
  • 33. 33 Designed for high volumes of notifications •  High performance •  Fault tolerant •  Scalable 33
  • 34. 34 Push Manager Interface REST HTTPS, IP filtering App Backend or Portal App Push Interface REST HTTPS Push networks – Apple, Android, etc… CERTA Push Push Manager webservice Push webservice Registertoken Registerpreference Register/deregister (Certificate, preferences) Wipe (Tokens, preferences) Query (preferences, token) Push DB Tokens preferences CERTA architecture
  • 35. 35 How can you connect to the back-end? •  REST API •  SSL •  IP filtering 35
  • 36. Push networks fragmentation Apple APNS Google CGM Google C2DM Microsoft MPS Microsoft WNS BlackBerry Push YOUR ENTERPRISE BACK END
  • 37. Push networks fragmentation Apple APNS Google CGM Google C2DM Microsoft MPS Microsoft WNS BlackBerry Push CERTA YOUR ENTERPRISE BACK END
  • 40. 40 Filter profiles consist of logical expressions, e.g.: !(Airport == "AMS")! ! !(Category == “Delay”)! ! !(Flight == “KL0845”! ! !((AIRPORT == "AMS") && (Category == “Delay”))! CERTA Push unique filtering
  • 41. 41 “Rich” push CLIENT   CLIENT   SERVER   SERVER   BACKEND   BACKEND   registerService()   You  are  registered  OK   registerPreference(“customerid=1234”)   OK   RichPush(“customerid=1234”,     “richpushid=“56”,  “your  bill  is  ready”)   Message  sent  OK   RichPush(“your  bill  is  ready”,  “richpushid=56”)   process  msg   RetrieveRichPush(“id=56”)   StoreRichPush(“id=56”,  RICH_PUSH_CONTENT)   RichPushContent(“id=56”,  RICH_PUSH_CONTENT)  
  • 42. 42 Performance thoughts Over 1.5 million recipients in 2.5 minutes!
  • 44. 44 PUSH  AND  LEGAL   Derk  Tegeler  
  • 45. Because conversation between you and your customer is private
  • 46. Contents 46 •  Where is your data and is that allowed? •  Security & Privacy leaks and threats •  Certa Push and Private Data •  Push, secured.
  • 47. Expectations… 47 •  I’m going to drag you through the ‘legaleze’ •  I’m going to depress you •  I’ll reassure you •  … bear with me
  • 48. Legal… 48 •  Shift from ‘owner’ to ‘custodian’ •  Increased responsibilities •  Increased penalties
  • 50. Wet Bescherming Persoonsgegevens (WBP) 50 •  Dutch Data Protection Act •  Protect against data abuse. •  European Economic Area (EEA) •  Protect personal data •  Opt-in
  • 51. Patriot Act & Consorts 51 •  Validity, purpose and scope •  Designed as an anti-terrorism weapon (sect 201), in reality very broad –  computer fraud, abuse offenses, sect 202 –  foreign intelligence information, sect 218 •  Impact in NL •  Other countries •  Data confidentiality and integrity are under threat. •  Microsoft, Skype, Google and others have reported such occurrences and are now in the public domain.
  • 52. Legal Basis for Push 52 •  The WBP and Patriot Act are incompatible •  Personal data must remain in the EEA •  Relevance of data collection •  Data protection measures
  • 53. Future 53 European law and directives tend towards:   •  Increasingly make use of multichannel authentication •  Criminalise enterprises responsible for data leaks •  Oblige enterprises to divulge data leaks •  Penalise enterprises with fines up to 2-5% of yearly turnover •  Personal data belongs to the individual, not the holder or processor, meaning that enterprises holding or processing personal data are custodians, like banks are for money.
  • 54. The role of Telecom Operators 54 •  ACM* + CIOT •  Telco’s Technical means for ‘Lawful Data Interception’ Daily reports to the CIOT containing comprehensive metadata *ex-OPTA
  • 55. Sources 55 •  Agentschap Telecom (agenschaptelecom.nl) •  Autoriteit Consument & Markt (acm.nl) •  Rijksoverheid (rijksoverheid.nl) •  ‘Zin en onzin over PRISM, Patriot Act en de Wet bescherming persoonsgegevens’, Allen & Overy and Schuberg Philis, feb 2014
  • 57. EU Partner 57 •  Conforms to European Data Protection Acts •  You know the location of the data you are responsible for •  You know who handles your messages •  You have a contract and an SLA
  • 59. Push security is … 59 … A leap of faith, not a chain of trust •  Third-parties with no SLA or other legal relationship •  Message confidentiality and integrity •  90% of messages transit through 2 organisations
  • 60. Push security risks 60 •  Insecure network traffic Whilst posting the message •  Insecure network traffic Whilst delivering the message •  Credentials
  • 62. CERTA Push security 62 •  Secure login •  IP filtering •  ISO 27001 like processes and procedures for data access (databases and infrastructure) •  We only hold: –  Your credentials –  Your push certificates –  Push tokens ID’s –  Optionally, ‘expressions’
  • 63. CERTA Push confidentiality 63 •  No personal data •  Unique ID’s –  App instance ID (CERTA ID) –  User ID •  Anonymous data
  • 64. 64 Filter profiles consist of logical expressions, e.g.: •  One to many ! (Airport == "AMS")! ! (Category == “Delay”)! ! (Flight == “KL0845”! ! ((AIRPORT == "AMS") && (Category == “Delay”))! ! ! •  One to one ! (UID == “0x0cb77b161b283d95a7e4343922c8cd19dc1131face7a2efe08caae19e42ac78b”)! Push unique filtering
  • 66. Push, secured. 66 •  Why? –  Confidentiality (may be a legal requirement) –  Integrity (anti-fraud, etc.) •  2 Options –  Encrypted messages –  Use push as a trigger to retrieve encrypted messages (ie. Secure Rich Push)
  • 68. Push, secured. 68 Encrypted  messages   Secure  Rich  Push   Single  transmission   Triggered  retrieval   Only  small  messages  <160  bytes   No  size  limita-ons   No  outgoing  connec-on  or  message  store   required   Message  store  is  separate  from  the  Certa  Push   server,  meaning  that  the  message  delivery  path   is  different,  and,  much  closer   Decryp-on  key  must  be  shared  before  receiving   the  message   Decryp-on  key  must  be  shared  before  receiving   the  message   Encrypted  messages  pass  through  foreign  third   par-es,  that  may  try  decryp-ng  messages  or   demand/obtain  decryp-on  keys     The  only  way  to  keep  your  data  in  your  country  
  • 69. App Enrolment 69 Decryption key must be shared before receiving the message •  App Enrolment binds –  the user to the app instance, –  the app instance to your back end infrastructure, –  register with CERTA Push. •  App enrolment creates –  encryption/decryption keys, –  Optionally create tech prerequisites for •  Secure transmissions, •  Secure storage, •  Non-Repudiation.
  • 70. Push, secured. 70 We have dealt with •  your legal risks and obligations, •  your role in the design of the solution, •  the technical security risks. è Push with CERTA ç with today’s and tomorrow’s risks under wraps. https://certa.io
  • 71. 71 Closing  remarks   +   QuesEons