performances veille - Performances Group

Transcription

performances veille - Performances Group
PERFORMANCES VEILLE
Nouvelles Technologies de l’Information et
de la Communication – N T I C
Numéro 342 – Semaine du 22 au 28 août 2014
TABLE DES MATIÈRES

HEARTBLEED CONSTITUE TOUJOURS UNE MENACE ............................................................................................................. 1

LA FRANCE SE DOTE D’UNE POLITIQUE GLOBALE DE SECURITE ............................................................................................... 1

MOBILITE : CROISSANCE FULGURANTE DES APPLICATIONS METIERS ........................................................................................ 3

ICT MINISTRY NEEDS SH930B FOR ITS INVESTMENT PLAN .................................................................................................... 3

MEDIA IN LIFE : LES CHIFFRES CLES DE LA TABLETTE ............................................................................................................ 4

AUX USA, PLUS DE LA MOITIE DU TEMPS MEDIA DIGITAL EST REALISE SUR LES APPLICATIONS MOBILES ............................................ 6

L'EXPLOSION DES OBJETS CONNECTES ET DES APPLIS SANTE .................................................................................................. 7

LARGER IPAD HERALDS BLURRING AMONG APPLE DEVICES ................................................................................................. 9

MULTICHOICE LAUNCHES SINGLE VIEW DSTV HD DECODER .............................................................................................. 10

GOOGLE BUG IN SEARCHES SPURS TALK OF HACKING ...................................................................................................... 11

KENYA TO BENEFIT FROM SH44B SAP INVESTMENT IN AFRICA........................................................................................... 12

SAP UNFOLDS PLAN TO INVEST $500M IN NIGERIA, OTHERS ............................................................................................. 14
 HEARTBLEED
CONSTITUE TOUJOURS UNE MENACE
TIC, 26 AOUT 2014
Près de cinq mois après la révélation de la vulnérabilité Heartbleed, IBM dresse un
premier bilan, avec le rapport trimestriel de sa division X-Force, en s’appuyant sur les
informations retirées des infrastructures des clients de ses services de sécurité
managés. Et celui-ci s’avère contrasté.
La bonne nouvelle, c’est que l’intérêt malveillant pour la vulnérabilité semble s’être
sensiblement tassé : si IBM a enregistré jusqu’à plus de 300 000 attaques par jour
exploitant Heartbleed le 15 avril dernier, le chiffre est rapidement retombé, à quelques
centaines d’incidents par jour fin avril. L’effet de grandes entreprises qui ont été
capables de mettre rapidement en œuvre des contre-mesures. De quoi pousser les
attaquants à déplacer leurs efforts sur d’autres vulnérabilités. Pour autant, l’activité
malveillante liée à Heartbleed se maintient, explique IBM, estimant qu’environ « 50 %
des serveurs potentiellement vulnérables ont été laissés sans correctif ». De quoi faire,
pour le groupe, de la vulnérabilité « une menace continue et critique ».
Mais pour IBM, le plus important est peut-être à chercher du côté de la gestion de la
réaction : « disposer d’un plan de réaction aux incidents – et d’une base de données à
jour des actifs – s’est avéré absolument critique pour réduire l’exposition au risque. » En
outre, selon le groupe, si les pare-feux ont pu rapidement offrir une protection pour les
systèmes concernés, les dispositifs de détection et de prévention des intrusions ont pu «
fournir une protection encore plus importante en bloquant les attaques au niveau des
paquets ». D’autant plus que les attaquants semblent avoir privilégié la carte de
l’exploitation distribuée de la vulnérabilité Heartbleed, rendant plus difficile la protection
par des pare-feux.
Source : Technologies de l’Information et de la Communication
 LA FRANCE
SE DOTE D ’UNE POLITIQUE GLOBALE DE SECURITE
TIC, 26 AOUT 2014
C’est par une circulaire datée du 17 juillet et signée du Premier Ministre que la France a
été officiellement dotée de sa première politique globale de sécurité des systèmes
d’information (PSSIE). Elaborée par l’Agence nationale de la sécurité des systèmes
d’information (Anssi), cette politique concerne tous les systèmes informatiques de l’Etat
et « chaque ministère est désormais responsable de [son] application ».
Le témoignage d’une situation préoccupante ?
Comme rappelé en préambule, la PSSIE doit contribuer à « assurer la continuité des
activités régaliennes [de l’Etat], prévenir la fuite d’informations sensibles, renforcer la
confiance des citoyens et des entreprises dans les téléprocédures. » Elle définit pour cela
1
un large éventail de mesures de sécurité en partant de dix principes dits « stratégiques
». La pertinence de certains d’entre eux n’est pas forcément évidente de prime abord –
« lorsque la maîtrise de ses systèmes d’information l’exige, l’administration fait appel à
des opérateurs et des prestataires de confiance » - quand d’autres conduisent à
s’interroger sur la posture de sécurité actuelle des systèmes d’information de l’Etat – «
tout système d’information de l’Etat doit faire l’objet d’une analyse de risques
permettant une prise en compte préventive de sa sécurité, adaptée aux enjeux du
système considéré » ou encore « les opérations de gestion et d’administration des
systèmes d’information de l’Etat doivent être tracés et contrôlées. »
La PSSIE prévoit l’adoption de systèmes d’authentification forte des agents, ainsi que
leur formation et sensibilisation à la cybersécurité. Et « les mesures techniques mises en
place par l’Etat dans ce domaine doivent être connues de tous. » Et l’on comptera sur
les administrateurs de systèmes pour « appliquer, après formation, les règles
élémentaires d’hygiène informatique. »
Sans surprise, les deux derniers principes fondateurs de la PSSIE disposent que les «
produits et services acquis par les administrations et destinés à assurer la sécurité des
systèmes d’information de l’Etat » doivent être labellisés par l’Anssi, et que les
informations considérées comme « sensibles […] sont hébergées sur le territoire
national. »
Quelle mise en pratique ?
La PSSIE donne trois ans aux administrations de l’Etat pour se mettre « en conformité
totale » avec ses dispositions. Et toutes les entités concernées – « ministères,
établissements publics sous tutelle d’un ministère, services déconcentrés de l’Etat, et
autorités administratives indépendantes » - devront « au premier janvier 2015 avoir mis
en conformité leur politique de sécurité des systèmes d’information et défini un plan
d’action », lequel devra indiquer « les mesures à prendre dans l’immédiat puis à court et
à long terme. » De quoi laisser une latitude significative aux « entités » concernées,
quitte à limiter au passage la portée réelle du texte.
Dommage car le point apparaît d’autant plus crucial que, selon le texte, la PSSIE «
s’adresse à l’ensemble des agents de l’Etat » et « énonce des mesures techniques
générales, qui constituent un socle minimal. » Dès lors, sa mise œuvre semble
largement dépendre d’efforts de sensibilisation et de formation qui devront
indubitablement être planifiés. Mais là, pas plus de précision quant au calendrier
attendu.
Et si, très logiquement, la PSSIE est conçue comme vivante et appelée à évoluer dans le
temps, elle pêche encore par l’absence d’échéancier fixant des rendez-vous réguliers
pour travailler à son évolution.
Source : Technologies de l’Information et de la Communication
2
 MOBILITE :
CROISSANCE FULGURANTE DES APPLICATIONS METIERS
TIC, 26 AOUT 2014
L’index de la mobilité de Good Technology pour le second trimestre montre une
progression fulgurante de l’utilisation d’applications métiers sur les terminaux mobiles.
Ainsi, si l’édition de document reste l’application la plus fréquente des terminaux
mobiles, les activations d’applications développées sur-mesure ont progressé de 25 %
en volume par rapport au premier trimestre 2014, chez les clients de l’éditeur. Et sur la
même période, les activations d’application de décisionnel ont enregistré une croissance
de plus de 200 %. Good Technology y voit le témoignage « des workflows interapplicatifs les plus avancés que déploient les entreprises pour mobiliser leurs processus
métiers ». Quant aux activations d’applications de CRM, elles auraient progressé d’un
facteur 7 d’un trimestre à l’autre. L’éditeur attribue cette évolution au lancement de sa
solution Good for Salesforce à la fin du second trimestre.
L’index de la mobilité de Good Technology montre par ailleurs une progression de
l’adoption d’Android dans les entreprises. Les terminaux fonctionnant avec le système
d’exploitation mobile de Google ont ainsi représenté 32 % des activations au cours du
second trimestre, soit 5 points de mieux qu’au trimestre précédent. Mais les terminaux
iOS ont toutefois représenté 67 % des activations. Reste que la base installée du
système d’exploitation Apple reste conséquente : les activations d’applications
d’entreprises ont concerné iOS à 88 %, au second trimestre.
Source : Technologies de l’Information et de la Communication
 ICT
MINISTRY NEEDS SH 930B FOR ITS INVESTMENT PLAN
TIC, 27 AOUT 2014
THE Information and Communications Technology ministry requires sh930b to build
enough capacity which will enable Uganda move at the same pace with the rest of the
world in the ICT sector. The ministry is drafting a five year strategic and investment plan
for the sector. This was revealed on Tuesday by the ICT minister John Nasasira while
appearing with his ministry team and state minister for investment Aston Kajara. “If we
want to move at the same pace with the rest of the world in the ICT industry, we need
to allocate sufficient funds to it. The thinking that the private sector will develop our ICT
is a farce,” Nasasira told the MPs. The minister explained that whereas Uganda invests
only 7.5m dollars in the sector, Kenya invests $123m every year in its ICT sector and
Rwanda gives it $40m. Nasasira said their ICT investment plan will require government
to allocate a minimum of sh186b every financial year to the sector. The minister also
protested proposals by the finance ministry to reduce the 2% ICT ministry share of
taxes levied on telecom companies to 1%. “I think we need to give priority to the ICT
ministry. The sector is on the drip and if you remove the drip, it can just collapse. Even
others agencies retain a share of revenue collected in their area,” Nasasira argued. The
3
minister also dismissed reports that his ministry had a surplus of sh80b on its fixed
deposit which MPs were using as a justification for reducing its share to 1%.
Budadiri West MP wondered why the completion of the national backbone optic fibre
project had delayed yet parliament had appropriated $106m for the project. In
response, the minister explained that the third phase of the project failed to commence
as it had been delayed because the Exim bank of China had not yet released the money.
MPs Franca Akello, James Kakooza, Joseph Ssewungu and Amos Lugolobi demanded for
explanation on why the ministry had failed to rein in on the telecom companies which
charging Ugandans illegal charges in form of dropped calls, and unsolicited messages.
Nasasira said they are working on more stringent Bills and guidelines which will enable
them to stop the companies from exploiting their customers. Explaining why they
wanted the percentage share of the ICT ministry to be reduced, the investment minister,
Aston Kajara, said, “It is our duty to raise revenue and distribute it to the various
sectors depending on government priorities at a time.” The committee chairman Robert
Kasule said, “The demand for sh186b by the ICT ministry will be debated. But from what
I know, government always have priorities in every given period of time and major
priority now is on infrastructure and energy sectors after which other pertinent sectors
like ICT will be given the priority they deserve.” Anthony Okello and Amos Lugolobi
argued that putting the money in the consolidated fund controlled by the finance
ministry would promote transparency and accountability. But Nasasira said the
argument was immaterial since the auditor general audits the ICT ministry departments
on how the revenue funds and other funds are utilized.
Source : Technologies de l’Information et de la Communication
 MEDIA
IN
LIFE :
LES CHIFFRES CLES DE LA TABLETTE
TIC, 27 AOUT 2014
Les Français allument plutôt leur tablette en fin de journée,
à partir de 17 heures. Le surf sur Internet reste le principal
usage de la tablette avec l'utilisation des moteurs de
recherche et la consultation des emails.
Médiamétrie détaille les usages de la tablette en France à partir des derniers résultats de
ses études : Media in Life, Home Devices et Web Observatoire. Près d'un foyer français
sur 3 est équipé d'une tablette et 10,3% des individus de 13 ans et plus ont au moins un
contact quotidien avec la tablette, un chiffre qui grimpe à 14,1% chez les CSP+ et
15,6% chez les 25-34 ans.
4
La tablette est un écran de la maison : 86,5% des contacts avec ce support se font à
domicile. Les Français allument plutôt leur tablette en fin de journée, à partir de 17
heures. Le pic d'audience du device auprès des CSP+ âgés de 25-49 ans est atteint
entre 21h30 et 22 heures avec 5% d'individus connectés, contre moins de 2% pour
l'ensemble de la population. Entre 21h15 et 21h30, 610 000 personnes sont à la fois en
contact avec le téléviseur et la tablette.
5
Le surf sur Internet (78%) reste le principal usage de la tablette avec l'utilisation des
moteurs de recherche (70%) et la consultation des emails (58%). La consultation de
recettes de cuisine est pratiquée par 43% des tablonautes.
La tablette a été intégrée cette année dans l'étude Media in Life de Médiamétrie. Dans
cette étude, un contact avec une activité média ou multimédia est associé à un 1/4h,
sachant qu'il peut y avoir plusieurs activités (simultanées ou non) associées à un même
1/4h. La période d'étude est le bimestre janvier-février 2014, sur la base de 4 666
panélistes, âgés de 13 ans et plus, qui ont renseigné un journal d'activité sur une
journée, en version papier ou digitale.
Source : Technologies de l’Information et de la Communication
 AUX USA,
PLUS DE LA MOITIE DU TEMPS MEDIA DIGITAL EST REALISE
SUR LES APPLICATIONS MOBILES
TIC, 27 AOUT 2014
60% de la consommation média digitale a été passée sur le
mobile aux Etats-Unis en juin dernier, selon Comscore. 52%
sur des applications, 8% sur Internet mobile.
Aux Etats-Unis, "the app majority" est atteinte cette année selon
"The U.S. Mobile App Report" de comScore, c'est-à-dire que la
majorité du temps passé sur les médias digitaux a lieu sur les applications mobiles.
En juin 2014, l'institut de mesure d'audience relève que la consommation mobile a
atteint 60% de la consommation média digitale, dont 52% via les applications et 8% via
les sites web. La part de l'ordinateur a chuté de 13 points en 15 mois, passant de 53%
en mars 2013 à 40% en juin 2014.
Les utilisateurs d'applis sur smartphones consacrent 42% du temps concerné sur leur
application favorie et 69% sur les 3 applis qu'ils utilisent le plus.
Les utilisateurs d'applis sur smartphone Android sont plus nombreux que ceux sur
iPhone (76,1 millions vs 62,6 millions) mais ils y consacrent moins de temps : 55
heures/mois vs 64 heures/mois. Leur profil est plus âgé.
Les usages les plus importants en termes de temps passé sont le social networking
(25%), les jeux (16%) et l'écoute de la radio (8%). Le top 5 des applications les plus
fréquentées est composé de Facebook, avec 115 millions de VU en juin dernier, devant
YouTube (83 millions), Google Play, Google Search et Pandora Radio.
6
Source : Technologies de l’Information et de la Communication
 L'EXPLOSION
DES OBJETS CONNECTES ET DES APPLIS SANTE
TIC, 27 AOUT 2014
Le marché de l'e-santé, ou santé mobile, qui inclut aussi les applications santé,
en croissance exponentielle, pourrait dépasser 20 milliards d'euros en 2017.
7
Balances intelligentes dans les salles de bains, bracelets «trackers» d'activité et montres
intelligentes au poignet, systèmes de sommeil pour veiller sur nos nuits… De plus en
plus d'objets connectés collectent des informations sur la forme et le bien-être des
individus. Certains jouent en direct sur les comportements. Les ceintures Lumo Back
vibrent pour signaler un dos mou tandis que les Américains portent des serre-têtes
connectés pour augmenter leur concentration. «Melon t'aide à scruter ton état mental,
ton comportement, tes émotions et te permet de t'améliorer», signale l'entreprise qui
distribue ces bandeaux.
D'autres objets visent directement la santé: glucomètres pour les diabétiques, brassards
tensiomètres ou pacemakers. Si l'on y ajoute les colliers mesurant le rythme cardiaque
et la consommation de calories des chiens ou encore le pilulier électronique permettant
de suivre la consommation de médicaments du patient, quelques dizaines d'objets
connectés s'installent dans l'univers du bien-être et de la santé.
Le marché de l'e-santé, ou santé mobile, qui inclut aussi les applications santé, en
croissance exponentielle, pourrait dépasser 20 milliards d'euros en 2017. Galaxy S5, le
dernier-né de Samsung, comporte ainsi un cardiofréquencemètre pour prendre son
pouls, la société Jawbone propose des applications pour bien s'alimenter, analyser son
sommeil ou pratiquer de l'exercice tandis que Google et Novartis développent ensemble
des lentilles de vue connectées pour les diabétiques… Autres cibles, les femmes qui
souhaitent tomber enceintes ou celles qui vont accoucher.
De 20.000 en 2012, les applications santé et bien-être sont passées à 100.000, dont
40.000 médicales, en 2013. «Ce marché évolue très rapidement», explique le Dr
Guillaume Marchand, président de DMD Santé, un site qui fait évaluer les applications
par des médecins et des patients. Beaucoup sont de qualité médiocre, estime DMD
Santé, qui n'a sélectionné que 504 applis sur 8000 passées au crible. Et les trois quarts
des applications ont beau être gratuites en France, les utilisateurs sont encore rares.
Une étude indiquait en mars que la moitié des applications sont désinstallées après une
utilisation.
Source : Technologies de l’Information et de la Communication
8
 LARGER IPAD HERALDS BLURRING AMONG APPLE DEVICES
TIC, 27 AOUT 2014
The lines are blurring among Apple AAPL +0.12% product categories.
Apple is preparing to release an iPad with a 12.9-inch screen in the first quarter of 2015,
according to Bloomberg. The Journal had reported earlier this year that Apple was
working on a larger-screen iPad with a screen slightly smaller than 13-inches, measured
diagonally.
Apple’s current iPads are 7.9 inches and 9.7 inches diagonally.
Apple declined to comment.
A larger iPad could push the tablet onto the turf of Apple’s Mac notebook computers,
with screen sizes from 11 to 15 inches. At the same time, Apple is expected to release
two new iPhones next month with larger screens, one of which is expected to come with
a 5.5-inch display, encroaching on the iPad Mini’s terrain.
In the past, Apple carved out clear functional differences among its products by screen
size. Apple positioned iPhones as devices for listening to music, making phone calls, and
sending emails. The Mac was a more powerful productivity tool for creating documents
and editing videos. The iPad rested between the two as a device well-suited for Web
browsing, flipping through photos and watching videos.
The blurring of those lines among its forthcoming products suggests that the company is
shifting to offer more choice among screen sizes within product categories.
9
Apple has said it expects the performance differences between mobile devices and
personal computers to disappear over time, leaving consumers to choose products based
on form factor and lifestyle.
Apple is also working on creating a more seamless experience among its products. For
example, it is building a feature called Continuity into its next mobile and PC operating
systems that allows users to start typing an email on the iPhone and resume on a Mac.
Source : Technologies de l’Information et de la Communication
 MULTICHOICE
LAUNCHES SINGLE VIEW
DSTV HD D ECODER
TIC, 26 AOUT 2014
MultiChoice has revealed its first HD single
view decoder, the DStv HD Decoder. The
decoder is set to replace the existing standard
definition single view decoder.
According to MultiChoice, the DStv HD
Decoder’s user interface is very similar to the
DStv Explora. The company also stated that
most functions can be performed from DStv
Central, accessed through the blue DStv
button on the remote control.
Mark Rayner, COO for MultiChoice South Africa said: “We recently made HD channels
available to all DStv customers with the necessary HD equipment. This decoder now
makes those HD channels more accessible. High definition creates a far superior
television viewing experience in terms of picture quality and the Dolby Digital 5.1
surround sound adds a new dimension to the audio experience. The DStv HD Decoder
will open up a new world for many DStv customers.”
The decoder is XtraView capable and can be paired with selected XtraView compatible
decoders (excluding the SD PVR). MultiChoice has also revealed that the DStv HD
Decoder will be available at R499 without installation or R799 with installation.
Source : Technologies de l’Information et de la Communication
10
 GOOGLE B UG
IN
SEARCHES SPURS TALK
OF
HACKING
TIC, 26 AOUT 2014
A software bug disrupted some Google Inc. GOOGL -0.46% searches for roughly eight
hours early Tuesday, displaying multiple images of what appeared to be a car crash in
Russia and sparking speculation that Google had been hacked.
The image displayed in response to many searches showed a badly mangled car near a
sign that says "stop" in Russian. It wasn't clear if the image had been altered. It didn't
appear on every search.
The episode sparked speculation that the world's most popular search engine might have
been infiltrated by hackers trying to spread propaganda related to the fighting in Ukraine
between government forces and pro-Russian rebels.
Google later apologized for the problem and said it had been fixed. A person familiar
with the matter said the problem was caused by a software bug inside Google.
The problem may have been caused by an update to one of Google's search algorithms,
which control how queries are answered and results presented, according to Gabriel
Weinberg, CEO and founder of search engine DuckDuckGo.
Mr. Weinberg doesn't know how Google's search engine works. However, he said that
test queries for updates to search algorithms can sometimes remain inside the software
code when the update takes effect. In that case, different search queries can produce
the same result repeatedly, Mr. Weinberg explained.
This happened once during a DuckDuckGo update in the past and it took a few hours to
fix, Mr. Weinberg said.
The image of the car crash appeared in several areas of Google search results on
Tuesday morning. When searching Google for "Emmys," for example, the image was
included in the cluster of news stories. If a user switched the filter to "images," the crash
image appeared to endlessly repeat after a few legitimate results.
People speculated on various social media forums about the cause of the problem, and
whether anyone else was seeing it. The Google dashboard that monitors outages and
disruptions to its apps and services showed no signs of a disruption related to the
image.
"Everybody is confused about how this could happen on such a large scale," said A.J.
Ghergich, founder of Ghergich & Co., a search-engine marketing agency. "How does the
largest search engine in the world roll out an update and not notice that 90% of image
search results show a car crash in Russia?"
Mr. Ghergich tested the problem on Tuesday by searching for "puppy" images on Google
and got mostly the car crash photo. He said the fact that the glitch disrupted searches in
11
many countries at the same time made it less likely the result of a hack, because Google
search queries are handled by data centers in different regions of the world.
Source : Technologies de l’Information et de la Communication
 KENYA
TO BENEFIT FROM
SH44B SAP
INVESTMENT IN
AFRICA
TIC, 21 AOUT 2014
Global business software firm SAP has announced a seven-year $500 million plan to upskill local African talent and drive sustainable innovation and growth in Africa. Kenya will
be among the key beneficiaries of the investment along with four other core countries;
South Africa, Nigeria, Angola and Morocco.
The announcement comes on the back of an impressive double-digit growth rate
momentum for SAP Africa where the company serves 1,300 customers across 51
countries.
The investment will focus on accelerating industry growth in energy and natural
resources, utilities, public sector, financial service and telecos in the core countries.
Speaking at the launch of the growth plan, Robert Enslin, member of the Executive
Board of SAP SE and president of Global Customer Operations said the Board strongly
believes that it is the right time for SAP to increase engagement and commitment in
Africa.
12
“SAP’s additional investment in the continent reflects our vision to help the world run
better by delivering leading-edge innovation. In Africa, we plan to engage and invest in
even more markets while helping build the appropriate talent base for the IT industry
and support our customers and partners by actively contributing toward crucial
technology and business skills-sets and new employment opportunities in Africa,” said
Enslin.
A significant amount of human resource investment will go to SAP’s Skills for Africa
Programme. Kenya hosted the pilot programme which saw 67 IT graduates earn SAP
certification and all secured employment with partners and SAP.
Pfungwa Serima, CEO SAP Africa said the Skills for Africa Programme will be extended to
other parts of Africa.
“The launch of additional Skills for Africa Scholarship Programme sessions in South
Africa, Kenya, Nigeria and Angola by year end will foster an open business ecosystem of
SAP-qualified consultants to execute on various projects. This follows on the heels of the
announcement last year of SAP Africa’s skills development agreement with the World
Bank,” added Serima.
Kenya will also benefit from the company’s Emerging Entrepreneur Initiative which has
been on-going in South Africa. SAP selected Kenya as the next market for the initiative
due to the strength and potential of the Kenyan market to grow and support a thriving
entrepreneur ecosystem.
East Africa SAP MD, Andrew Waititu, expressed confidence that Kenya, and the region
will continue to grow by providing innovative solutions for public service, utilities and
SMEs.
“Innovative technologies such as mobility and the cloud are among the fastest growing
IT segments and are already having a significant impact on businesses’ ability to grow
and innovate,” said Mark Walker, director: Insights and Vertical Industries, IDC Middle
East, Africa and Turkey, IDC.
Source : Technologies de l’Information et de la Communication
13
 SAP
UNFOLDS PLAN TO INVEST
$500M
IN
NIGERIA,
OTHERS
TIC, 19 AOUT 2014
Electronic commerce, initially a consumer
market phenomenon, is becoming firmly
entrenched in the corporate space. The
emergence of cloud-based treasury solutions
and the digitisation of trade flows represent
step changes in treasury and trade finance.
Combined, digitisation and cloud technology
have the potential to transform the way
market participants communicate and transact
with each other.
Business is happening between corporates in
an increasingly digital way, says André Casterman, Head of Corporates and Supply
Chain, SWIFT. “The digitisation of corporate trade flows has come a very long way and
now even the most difficult to digitise processes are being transformed.”
Cloud-based treasury solutions are transforming corporate treasuries. The amount of
treasury time and effort required to manage a cloud-based solution is lower and
implementation timelines are shorter. Corporates that previously could not afford
standalone solutions from the main treasury systems vendors now find new capabilities
have opened up to them. The subscription based pricing of cloud solutions also offers
significant cash flow advantages for these corporates when compared with the large upfront capital cost of a software licence for a standalone system. As a result, a new
segment of corporates can afford to improve their treasury processes by using purposebuilt treasury management solutions.
At the same time, ecommerce and electronic invoice hubs, which enable businesses to
communicate with each other digitally, have proliferated. Such platforms connect buyers
and suppliers around the world, enabling manufacturers, wholesalers and exporters to
discover trade opportunities. At present the market is diverse, ranging from very large
business-to-business hubs through to hundreds of smaller, country-specific or niche
industry hubs. Many of these hubs are also based on cloud applications and services.
The digital supply chain
The combination of cloud technology and hubs has set the scene for a new, digital era of
the supply chain. The supply chain finance (SCF) market – the term used by banks to
refer to approved payables financing or early payment services – has grown significantly
during the past five years. The now widely available SCF solutions offered by banks and
non-bank technology providers have been built on the fact that buyers and sellers wish
to work collaboratively, where both parties gain advantage, as large buyers aim to
support their suppliers’ working capital needs.
14
“Accelerating the lifecycle of trade transactions enhances the attractiveness of both the
buyer and seller as it mitigates risk in international trade while also enabling
improvements in payment terms. Banks also stand to benefit from lower costs and
reduced operational risks associated with the manual processing of LCs,” André
Casterman adds.
“We have seen a trend lately that banks and corporates are beginning to adopt trade
finance messages to communicate with each other and further automate their trade
finance activities,” notes Yves Smeyers, Principal Consultant, SWIFT.
Typically buyers facilitate early payments to their suppliers via one of their banking
partners. Buyers therefore approve invoices as early as possible in the process in order
to maximise the financing opportunity for suppliers in need of working capital.
SCF services also validate the fact that banks are ready to extend financing to their
clients using electronic and automated transaction flows as they have done in payments
and cash management services for more than 20 years.
The digitisation of the supply chain is well illustrated by the transformation of one of the
most manual processes in world trade – the bill of lading. The document, issued by a
carrier, contains details of a shipment of merchandise and gives title of that shipment to
a specified party. Bills of lading are important documents used in international trade to
help guarantee that exporters receive payment and importers receive merchandise.
Organisations such as essDOCS and Dubai Trade have been involved in the digitisation
of bills of lading, working with the freight forwarders that issue them. Because electronic
bills of lading are legally and functionally the same as paper bills of lading, they are
ideally suited for automated handling by bank systems.
The automated handling is made possible via another new digital trade instrument, the
Bank Payment Obligation (BPO). An alternative means of settlement in international
trade, the BPO provides the benefits of a letter of credit (LC) in an automated
environment. Importantly for banks, it offers the possibility of intermediation earlier in
the supply chain by offering risk mitigation and financing services.
A BPO is an irrevocable undertaking given by one bank to another bank that payment
will be made on a specified date after a specified event (such as delivery of goods) has
taken place. The specified event is evidenced by a match report that is generated by
transaction matching applications (such as SWIFT’s Trade Services Utility). BPOs can be
incorporated into matching applications through a buyer’s bank or a third party bank.
The BPO is due when data is accurately matched or when all financial institutions
involved in the transaction have accepted any mismatches or discrepancies.
This process results in a fully electronic alternative to the letter of credit (LC), which will
enable efficiency gains, working capital reduction and cost saving. This electronic
alternative can be processed in a much shorter time than traditional, paper-based LCs –
15
estimates are as low as 10-15 days. Reduced processing times result in significant cost
savings: Brazilian mining company Vale estimates that a combination of electronic bills
of lading and BPOs is saving it $37 million per year on its exports of iron ore to China
alone.
Accelerated cash flow through the faster collections made possible by the BPO can
reduce days sales outstanding (DSO) by 50-65%. Furthermore, operational costs can be
reduced from 10-30% as fewer full time staff are involved in the preparation of paper
documents. Finally, liquidity can be more rapidly released from the financial supply chain
to boost working capital and banking fees can be reduced by up to a half as handling
fees are reduced.
Risk management benefits of automation
The cost savings that result from combining electronic bills of lading with the BPO are
attractive, but Casterman adds there is an even greater benefit: “Accelerating the
lifecycle of trade transactions enhances the attractiveness of both the buyer and seller
as it mitigates risk in international trade while also enabling improvements in payment
terms. Banks also stand to benefit from lower costs and reduced operational risks
associated with the manual processing of LCs,” he says.
The adoption rate of BPOs is steadily increasing, but it is likely use will be predominantly
for ongoing and recurring trade flows where some level of trust has been already
established between the counterparties. Industries such as commodities, electronics and
retail, which have established trade flows between suppliers and buyers, will represent
the greatest opportunity for growth. Cloud solutions and digitised trade flows require
economies of scale to really flourish – the more banks that issue BPOs, the more
correspondent trade relationships will become electronic and therefore the more trade
transactions can become electronic.
“The automation of the supply chain is not solely about technology; it is an area that
also requires collaboration between all of the parties involved in trade,” says Casterman.
“The development of the BPO has proved that the industry can come together to solve a
problem and that as a result, everyone stands to gain.”
Standards have played an important role in this collaboration as they facilitate
competition between commercial offerings while enabling those offerings to interoperate.
In supply chain finance, banks have developed new legal and technology standards to
address interoperability challenges and to grow the size of this emerging market.
Another automation trend, based on standards, is emerging in the corporate-to-bank
space, says Yves Smeyers. Increasingly, corporates and banks are adopting the trade
finance messages to communicate with each other. “Most of the message flows between
corporates and banks are payments and cash management series,” he says. “However,
we have seen a trend lately that banks and corporates are beginning to adopt trade
16
finance messages as well to communicate with each other and further automate their
trade finance activities.”
Source : Technologies de l’Information et de la Communication
17