SlideShare une entreprise Scribd logo
1  sur  24
idEA E Commerce Short Course
Sutedjo Tjahjadi
Managing Director,
Datacomm Cloud Business
cloud.datacomm.co.id
E-Commerce Sales Growth
Source: Internet Retailer Top 500 | eMarketer | SHOP.org State of Retail Online Report 2014
E- Commerce di Indonesia
E- Commerce Infrastucture Options
Hosted
e-Store
Dedicated
Hardware
Cloud
Computing
E-Commerce Platform Consideration
5
Scalability Reliability User ExperienceSecurity
E-Commerce Facts
6
OF ONLINE RETAILERS WORRY THAT 
their current eCommerce platform
can't support their global goals.
78%
STUDIES SHOW THAT PAGE LOADS
OVER 2 SECONDS NEGATIVELY
AFFECTS CONVERSATIONS
OF RETAILERS HAVE 
DIFFICULTY INTEGRATING
back-office technology across their channels
40%
WITH ECOMMERCE
Can Deliver An Omnichannel*
Customer Experience
40%ONLY
Source :
-CenturyLink internal survey
-Statista: http://www.statista.com/statistics/232285/reasons-for-online-shopping-cart-abandonment
* Omnichannel is the use of a variety of channels in a customer's shopping experience including research before a purchase.
OF CUSTOMERS stated that DATA
SECURITY is a major factor when they
choose who to shop from online
50% of customers abandoned their
shopping cart due to concerns
over PAYMENT SECURITY
17%
7
Cost in lost traffic or revenues when a customer-facing website is down for one hour
Cost in lost traffic or revenues when a customer-facing website is down for one hour on Cyber Monday
Source : http://www.emc.com/collateral/analyst-reports/h12493-ar-2013-ecommerce-cyber-crime-report.pdf
E-Commerce Facts
8
Source : http://www.emc.com/collateral/analyst-reports/h12493-ar-2013-ecommerce-cyber-crime-report.pdf
E-Commerce Facts
9
ScalabilityReliability
We guarantee superior
performance and uptime
SLA 99.99%
Our platform enables you to
increase or decrease
capacity within minutes, not
hours or days.
Agility Means
10
Autoscale your infrastructure
Horizontal Autoscale
Ensure the number of servers
increases automatically during
demand spikes to maintain
performance, and decreases
automatically during demand lulls to
minimize costs.
Efficiently Respond to Peak Usage with Autoscale
Vertical Autoscale
Automatically rightsize the compute
capacity of your servers during
demand spikes and lulls.
Scalability
Scalable
11
Automatically respond to Peak Usage with Autoscale
Vertical autoscale Horizontal autoscale
Scalability
Cloud - Automate IT Operation
12
Control Portal & API. Our intuitive
management interface reduces the
time required to administer cloud
environments. In addition, API
enables integration with existing IT
systems.
Orchestration & Environment
Templates. Use Cloud Blueprints to
automate common deployments, and
create your own custom templates to
replicate in future rollouts.
Self-Service. Create and manage
complex cloud environments with
seamlessly.
Automate Routine Tasks. Patching,
disaster recovery, and other activities
can be done in a fraction of the time
with Control Portal.
Automation
Cloud Management API
13
Security Trend
• Increasing threads, increasing complexity and easier to plan the attach !!
14
Common e-Commerce Lifecycle
Technical Elements of e-Commerce Strategy
Source: Rackspace, Building Your e-Commerce Strategy
http://www.rackspace.com/knowledge_center/whitepaper/building-your-ecommerce-strategy
1
Pemilihan Platform,
termasuk strategi re-
platforming
2
Security dan
compliance, sesuai
standar industri
etc
....... ....... ....... ....... ....... .......
....... ....... ....... ....... ....... .......
....... ....... ....... ....... ....... .......
Why e-Commerce Need Security?
Customer sangat memperhatikan keamanan data, privacy, dan keamanan pembayaran
50% 80% 17%
50% customer menyatakan
bahwa keamanan data
adalah faktor utama ketika
mereka memilih tempat
belanja online
80% customer memilih untuk
belanja dari online shop yang
mereka rasa dapat memberikan
keamanan terhadap informasi
personal mereka
customer membatalkan
belanja mereka karena
khawatir terhadap
keamanan pembayaran.
Sumber:
1.Deloitte University Press: http://dupress.com/articles/consumer-data-privacy-strategies/
2.Statista: http://www.statista.com/statistics/232285/reasons-for-online-shopping-cart-abandonment/
E-Commerce Security Breaches
The malicious software, or malware, was placed on Home Depot point-of-sale terminals, or cash registers, from April to
September, the company said in a news release. The malware was found in Home Depot stores in the USA and Canada.
E-Commerce Security Breaches
In the Target breach, hackers were able to steal information on up to 110 million customers during the holiday shopping
season, including the financial information of up to some 40 million people.
E-Commerce Security Perspective
Customer Perspective
•Data and information
security
•Privacy
Platform Perspective
•Code and Database
Security
•Web Security
•Payment Security
•Fraud Prevention
System Perspective
•System Hardening
•Patch and Update
Management
Network Perspective
•Detection and
Prevention System
•Perimeter Security
•Access Control
What Can You Do?
Ada banyak pendekatan dalam keamanan e-commerce. Dengan adanya sertifikasi standar
keamanan dalam industri, hal tersebut dapat dijadikan tolak ukur.
Menyatakan bahwa Anda memiliki
sistem dan metodologi yang dapat
menjamin keamanan informasi
perusahaan.
Menyatakan bahwa sistem Anda
terlindungi dalam hal keamanan,
ketersediaan, kerahasiaan data,
dan privasi
Standar yang dibuat untuk
meyakinkan pelanggan
mengenai keamanan informasi
kartu kredit mereka.
Sebagai penyedia jasa e-commerce, memiliki semua sertifikasi di atas merupakan
hal kunci, namun sertifikasi PCI DSS adalah hal yang harus Anda fokuskan.
PCI DSS Requirements
Firewall
Management
Vendor Default
Controls
Data Protection
Data
Transmission
Encryption
Anti-virus
Controls
System and
Application
Security
Data Access
Controls
Personal Access
Controls
Physical Access
Controls
Data and
Network Access
Controls
Security Testing
Organization
Policy
People
Policy
Process
Policy
Technology
Policy
Build and
Maintain
Secure
Network
Protect
Cardholder
Data
Vulnerability
Management
Program
Strong Access
Control
Measures
Monitor and
Test Network
Information
Security
Policy
What We Can Help
Link Encryption,
Token Based,
Access Control,
Intrusion Detection
Firewalls, Content
and Malware
Protection, System
Authentication
User
Authentication,
Smart Cards and
Token, Content,
Assurance,
Privacy
Secure Application
Portals,
Permissions
Management,
Single Sign-On
Open Domain PKI,
CA, Transaction
Signing, Trust
Schemes,
Messaging
Trusted Business
Applications,
Payments,
Brokerage,
Exchanges,
Tendering
Consulting, Design, System Integration, Vulnerability Management, Monitoring
PKI, Smart Card, Digital Signature, Certificate Processing, Mobile
Trust Application Development
Terima Kasih
www.idea.or.id

Contenu connexe

Tendances

Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
SolarWinds
 
how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distribution
Santosh Satam
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
Steve Tester
 

Tendances (20)

World Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONE
 
Expectations in DRAAS from CSP
Expectations in DRAAS from CSPExpectations in DRAAS from CSP
Expectations in DRAAS from CSP
 
Product Assessment and Consulting Offerings
Product Assessment and Consulting OfferingsProduct Assessment and Consulting Offerings
Product Assessment and Consulting Offerings
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
 
how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distribution
 
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
 
Protecting National Critical Infrastructure Asiangames 2018
Protecting National Critical Infrastructure Asiangames 2018Protecting National Critical Infrastructure Asiangames 2018
Protecting National Critical Infrastructure Asiangames 2018
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
 
Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 

En vedette

Bisnis seks anak di indonesia
Bisnis seks anak di indonesiaBisnis seks anak di indonesia
Bisnis seks anak di indonesia
ECPAT Indonesia
 

En vedette (6)

Bisnis seks anak di indonesia
Bisnis seks anak di indonesiaBisnis seks anak di indonesia
Bisnis seks anak di indonesia
 
Transforming to Indonesia's Digital Economy (Menuju Digital Ekonomi Indonesia)
Transforming to Indonesia's Digital Economy (Menuju Digital Ekonomi Indonesia)Transforming to Indonesia's Digital Economy (Menuju Digital Ekonomi Indonesia)
Transforming to Indonesia's Digital Economy (Menuju Digital Ekonomi Indonesia)
 
aaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaa
 
Digital Transformation is Happening in Indonesia
Digital Transformation is Happening in IndonesiaDigital Transformation is Happening in Indonesia
Digital Transformation is Happening in Indonesia
 
7 insights of Indonesia
7 insights of Indonesia7 insights of Indonesia
7 insights of Indonesia
 
Digital, Social & Mobile in APAC in 2015
Digital, Social & Mobile in APAC in 2015Digital, Social & Mobile in APAC in 2015
Digital, Social & Mobile in APAC in 2015
 

Similaire à Indonesian e-Commerce requires Scalability, Reliability and Security to Achieve Optimal End User Experience

E Commerce
E CommerceE Commerce
E Commerce
jroloff
 
Artificial intelligence capabilities overview yashowardhan sowale cwin18-india
Artificial intelligence capabilities overview yashowardhan sowale cwin18-indiaArtificial intelligence capabilities overview yashowardhan sowale cwin18-india
Artificial intelligence capabilities overview yashowardhan sowale cwin18-india
Capgemini
 
Platform for Secure Digital Business
Platform for Secure Digital BusinessPlatform for Secure Digital Business
Platform for Secure Digital Business
Akana
 

Similaire à Indonesian e-Commerce requires Scalability, Reliability and Security to Achieve Optimal End User Experience (20)

Technology Management-Platform, Security & Content
Technology Management-Platform, Security & ContentTechnology Management-Platform, Security & Content
Technology Management-Platform, Security & Content
 
Adobe Commerce BI for Your E-commerce Business.
Adobe Commerce BI for Your E-commerce Business.Adobe Commerce BI for Your E-commerce Business.
Adobe Commerce BI for Your E-commerce Business.
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
E Commerce
E CommerceE Commerce
E Commerce
 
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
VMworld 2013: Create a Key Metrics-based Actionable Roadmap to Deliver IT as ...
 
#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6
 
integrating-on-premise-apps-cloud-300329.pdf
integrating-on-premise-apps-cloud-300329.pdfintegrating-on-premise-apps-cloud-300329.pdf
integrating-on-premise-apps-cloud-300329.pdf
 
Make from your it department a competitive differentiator for your business
Make from your it department a competitive differentiator for your businessMake from your it department a competitive differentiator for your business
Make from your it department a competitive differentiator for your business
 
Platform for Secure Digital Business
Platform for Secure Digital BusinessPlatform for Secure Digital Business
Platform for Secure Digital Business
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
Artificial intelligence capabilities overview yashowardhan sowale cwin18-india
Artificial intelligence capabilities overview yashowardhan sowale cwin18-indiaArtificial intelligence capabilities overview yashowardhan sowale cwin18-india
Artificial intelligence capabilities overview yashowardhan sowale cwin18-india
 
Connecting the dots – Industrial IoT is more than just sensor deployment
Connecting the dots – Industrial IoT is more than just sensor deploymentConnecting the dots – Industrial IoT is more than just sensor deployment
Connecting the dots – Industrial IoT is more than just sensor deployment
 
Data monetization webinar
Data monetization webinarData monetization webinar
Data monetization webinar
 
Platform for Secure Digital Business
Platform for Secure Digital BusinessPlatform for Secure Digital Business
Platform for Secure Digital Business
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Api management customer
Api management customerApi management customer
Api management customer
 
Developing Modern Applications in the Cloud
Developing Modern Applications in the CloudDeveloping Modern Applications in the Cloud
Developing Modern Applications in the Cloud
 

Plus de Sutedjo Tjahjadi

Plus de Sutedjo Tjahjadi (6)

Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Get to Know More About Cloud Computing Technology - FIND IT Universitas Gajah...
Get to Know More About Cloud Computing Technology - FIND IT Universitas Gajah...Get to Know More About Cloud Computing Technology - FIND IT Universitas Gajah...
Get to Know More About Cloud Computing Technology - FIND IT Universitas Gajah...
 
KOPI - Koperasi Online Pintar Indonesia - Overview
KOPI - Koperasi Online Pintar Indonesia - OverviewKOPI - Koperasi Online Pintar Indonesia - Overview
KOPI - Koperasi Online Pintar Indonesia - Overview
 
Bagaimana Cloud Computing dapat Mendigitalkan Koperasi dan lembaga keuangan m...
Bagaimana Cloud Computing dapat Mendigitalkan Koperasi dan lembaga keuangan m...Bagaimana Cloud Computing dapat Mendigitalkan Koperasi dan lembaga keuangan m...
Bagaimana Cloud Computing dapat Mendigitalkan Koperasi dan lembaga keuangan m...
 
Isolation Platform - Data Sheet
Isolation Platform - Data SheetIsolation Platform - Data Sheet
Isolation Platform - Data Sheet
 
Introduction to cloud computing & datacomm odoo event - ver 2.0 - apr 2...
Introduction to cloud computing & datacomm   odoo event - ver 2.0 - apr 2...Introduction to cloud computing & datacomm   odoo event - ver 2.0 - apr 2...
Introduction to cloud computing & datacomm odoo event - ver 2.0 - apr 2...
 

Dernier

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
instagramfab782445
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 

Dernier (20)

Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 

Indonesian e-Commerce requires Scalability, Reliability and Security to Achieve Optimal End User Experience

  • 1. idEA E Commerce Short Course Sutedjo Tjahjadi Managing Director, Datacomm Cloud Business cloud.datacomm.co.id
  • 2. E-Commerce Sales Growth Source: Internet Retailer Top 500 | eMarketer | SHOP.org State of Retail Online Report 2014
  • 3. E- Commerce di Indonesia
  • 4. E- Commerce Infrastucture Options Hosted e-Store Dedicated Hardware Cloud Computing
  • 5. E-Commerce Platform Consideration 5 Scalability Reliability User ExperienceSecurity
  • 6. E-Commerce Facts 6 OF ONLINE RETAILERS WORRY THAT  their current eCommerce platform can't support their global goals. 78% STUDIES SHOW THAT PAGE LOADS OVER 2 SECONDS NEGATIVELY AFFECTS CONVERSATIONS OF RETAILERS HAVE  DIFFICULTY INTEGRATING back-office technology across their channels 40% WITH ECOMMERCE Can Deliver An Omnichannel* Customer Experience 40%ONLY Source : -CenturyLink internal survey -Statista: http://www.statista.com/statistics/232285/reasons-for-online-shopping-cart-abandonment * Omnichannel is the use of a variety of channels in a customer's shopping experience including research before a purchase. OF CUSTOMERS stated that DATA SECURITY is a major factor when they choose who to shop from online 50% of customers abandoned their shopping cart due to concerns over PAYMENT SECURITY 17%
  • 7. 7 Cost in lost traffic or revenues when a customer-facing website is down for one hour Cost in lost traffic or revenues when a customer-facing website is down for one hour on Cyber Monday Source : http://www.emc.com/collateral/analyst-reports/h12493-ar-2013-ecommerce-cyber-crime-report.pdf E-Commerce Facts
  • 9. 9 ScalabilityReliability We guarantee superior performance and uptime SLA 99.99% Our platform enables you to increase or decrease capacity within minutes, not hours or days. Agility Means
  • 10. 10 Autoscale your infrastructure Horizontal Autoscale Ensure the number of servers increases automatically during demand spikes to maintain performance, and decreases automatically during demand lulls to minimize costs. Efficiently Respond to Peak Usage with Autoscale Vertical Autoscale Automatically rightsize the compute capacity of your servers during demand spikes and lulls. Scalability
  • 11. Scalable 11 Automatically respond to Peak Usage with Autoscale Vertical autoscale Horizontal autoscale Scalability
  • 12. Cloud - Automate IT Operation 12 Control Portal & API. Our intuitive management interface reduces the time required to administer cloud environments. In addition, API enables integration with existing IT systems. Orchestration & Environment Templates. Use Cloud Blueprints to automate common deployments, and create your own custom templates to replicate in future rollouts. Self-Service. Create and manage complex cloud environments with seamlessly. Automate Routine Tasks. Patching, disaster recovery, and other activities can be done in a fraction of the time with Control Portal.
  • 14. Security Trend • Increasing threads, increasing complexity and easier to plan the attach !! 14
  • 16. Technical Elements of e-Commerce Strategy Source: Rackspace, Building Your e-Commerce Strategy http://www.rackspace.com/knowledge_center/whitepaper/building-your-ecommerce-strategy 1 Pemilihan Platform, termasuk strategi re- platforming 2 Security dan compliance, sesuai standar industri etc ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... .......
  • 17. Why e-Commerce Need Security? Customer sangat memperhatikan keamanan data, privacy, dan keamanan pembayaran 50% 80% 17% 50% customer menyatakan bahwa keamanan data adalah faktor utama ketika mereka memilih tempat belanja online 80% customer memilih untuk belanja dari online shop yang mereka rasa dapat memberikan keamanan terhadap informasi personal mereka customer membatalkan belanja mereka karena khawatir terhadap keamanan pembayaran. Sumber: 1.Deloitte University Press: http://dupress.com/articles/consumer-data-privacy-strategies/ 2.Statista: http://www.statista.com/statistics/232285/reasons-for-online-shopping-cart-abandonment/
  • 18. E-Commerce Security Breaches The malicious software, or malware, was placed on Home Depot point-of-sale terminals, or cash registers, from April to September, the company said in a news release. The malware was found in Home Depot stores in the USA and Canada.
  • 19. E-Commerce Security Breaches In the Target breach, hackers were able to steal information on up to 110 million customers during the holiday shopping season, including the financial information of up to some 40 million people.
  • 20. E-Commerce Security Perspective Customer Perspective •Data and information security •Privacy Platform Perspective •Code and Database Security •Web Security •Payment Security •Fraud Prevention System Perspective •System Hardening •Patch and Update Management Network Perspective •Detection and Prevention System •Perimeter Security •Access Control
  • 21. What Can You Do? Ada banyak pendekatan dalam keamanan e-commerce. Dengan adanya sertifikasi standar keamanan dalam industri, hal tersebut dapat dijadikan tolak ukur. Menyatakan bahwa Anda memiliki sistem dan metodologi yang dapat menjamin keamanan informasi perusahaan. Menyatakan bahwa sistem Anda terlindungi dalam hal keamanan, ketersediaan, kerahasiaan data, dan privasi Standar yang dibuat untuk meyakinkan pelanggan mengenai keamanan informasi kartu kredit mereka. Sebagai penyedia jasa e-commerce, memiliki semua sertifikasi di atas merupakan hal kunci, namun sertifikasi PCI DSS adalah hal yang harus Anda fokuskan.
  • 22. PCI DSS Requirements Firewall Management Vendor Default Controls Data Protection Data Transmission Encryption Anti-virus Controls System and Application Security Data Access Controls Personal Access Controls Physical Access Controls Data and Network Access Controls Security Testing Organization Policy People Policy Process Policy Technology Policy Build and Maintain Secure Network Protect Cardholder Data Vulnerability Management Program Strong Access Control Measures Monitor and Test Network Information Security Policy
  • 23. What We Can Help Link Encryption, Token Based, Access Control, Intrusion Detection Firewalls, Content and Malware Protection, System Authentication User Authentication, Smart Cards and Token, Content, Assurance, Privacy Secure Application Portals, Permissions Management, Single Sign-On Open Domain PKI, CA, Transaction Signing, Trust Schemes, Messaging Trusted Business Applications, Payments, Brokerage, Exchanges, Tendering Consulting, Design, System Integration, Vulnerability Management, Monitoring PKI, Smart Card, Digital Signature, Certificate Processing, Mobile Trust Application Development