Agile Big Data and Many-Particle approach change Marketing and Sales effectiveness

Big data projects have broad impact on organizations. Big Data implementation overtakes
what normally Many-Particle data aggregation goodcould be considered a new way to conduct data management to business alignment. With Big Data the path from data sources to data intelligence changes drastically. The way to design and implement data intelligence definitively changed access, ingest, distil, processes and data visualization as well. Big data projects meet agile implementation, shorten the data intelligence lifecycle by increasing services capability and adequacy to fast-growing datasets, fast moving business. Accordingly, agile practice and many-particle approach minimize data entropy together with data access time cycles everywhere, preserve data security and enhance user experience to business instant realignment.

Contents
Introduction
Data Topology and Agile Big Data
The Many-Particle approach
Conclusion
Acknowledgment
References

Introduction
The way to move from today business data into Big Data intelligence could be a costly and time consuming process that could decrease the tremendous advantage of the Big Data and Cloud paradigms. Today, information is still misaligned with the business although the huge efforts of the past business intelligence projects: companies still use partial quantities of the real corporate data heritage. As a consequence, the data spectrum exploited is unpredictable and the process to align data and business is a long-term process. Agile Big Data aligns instantly data heritage and business data. Continuous data ingestion and distillation drastically reduces ETL process to run intelligence on the “big data-lake” when needed. Then, on-premise big data topology and functional data intelligence have a crucial role to meet profitability, customer affinity and fast moving business goals. This paper introduces the business case for Big Data to avoid Marketing and Sales data entropy, reduce risks and increase the likelihood of an aware and successful Big Data implementation.

Data Topology and Agile Big Data
Documenting data evolution and updating in the past could be considered a good practice in managing data. In the beginning of cloud paradigm, due to the cost cut down attraction, the practice to have a map of the company data heritage became a great benefit especially when services have to be subscribed in the cloud. Data models, a way to document the data heritage, evolved into MaaS (Model as a Service) that supports agile design and deliver of data services in the Cloud and makes the difference in planning a Big Data implementation project.

Considering data models doesn’t mean structured data only. On-premise models map data coming from structured, semi-structured and non-structured sources. Data models maps defined services topology would be moved on-premise or in the cloud. Still data models is needed for early exploration analysis and “ab-initio” services classifying parameters which define services boundaries (to personal cloud, financial parameters or healthcare positions, for example); data models (on SQL, No-SQL, Vectors or Graph structures) essentially doesn’t address the meaning the data have but identify the services’ classes before creating the data-lake. Of course, into the data-lake converge unusable data, unstructured or denormalized raw datasources as well. The more aware is the on-premise topology, the more secure and localizable is the big data usage both on-premise and in the Cloud. Further, agile MaaS approach reveals business process affected, operating requirements and stakeholders.

Big Data CorporateFig. 1 – Corporate Data-Lake and Agile Big Data approach

Accordingly, agile Big Data practice sets the link among on-premise data topologies and on-premise or in the cloud data intelligence. Topology leverages the company services asset into specific business objectives and will determine the successful user experience requirements and the proper rapid alignment with respect to the competitors.

This means that two crucial aspects have to be taken care:

  • Data is the “compass” to understand services capacity, stakeholders, culture of the organization: big data agility is based on data-driven approach. Therefore, in the incoming project setup minimize functional data behaviour. Use MaaS topology to define projects use cases data-driven. Data-driven project design defines data ingestion architecture and data landing into the data-lake and assist in understanding the best policy for continuous data feeding. Do not disregard this aspect: accurate data feeding is the core of Big Data approaches;
  • Move data analysis and functional aggregation to data intelligence applied on the data-lake. During ingestion and data landing data treatments have to be minimized Agile Big Data approach considers 2 zones: the in-memory one, based on data topology and on-premise supported by MaaS and data intelligence based on functional analysis and programming working on spare data.

Still, minimize any approach based on “ab-inizio” technology and software development. The Big Data ecosystem provides excellent platforms and MaaS agile approach helps to shift later the final technology choice/selection. Further, MaaS agile practice assists to clarify successes and failures zone and set expectations by time. This happens why when services have been set by on-premise topology then a link has been stretched among the data heritage and the data intelligence. There are no constraints between the raw data (documented or not) and the user experience that will leverage functional and business alignment. In the middle, only the data-lake exists, continuously changing and growing, continuously supplying information for the data intelligence ending.

The Many-Particle approach
Today, more of 70 percent of the world’s information is unstructured, not classified and, above all, misused: we are assisting to the greatest Marketing and Sales data myopia since they exist. Still, there is no awareness of the Big Data benefits for service and/or product companies, and again how the product’s companies can change their services based on goods production: great amount of data, exceptionally growing, high entropy, unknown correlations and limited data usage. The concept of on-premise topology introduces services as data-driven aggregation states applied to given parts of the data-lake. But this is what happens to many-particle system instability (yottabyte is 1024 byte with a binary usage of 280). Big data storages dimension near data-lake to many-particle systems. This vision destroys any traditional approach to Marketing and Sales.

If we consider the big data-lake, it contains fast moving content in order of data affinity and mass correlation. Depending upon dynamic data aggregation, data topologies may change by tuning on-premise data mapping. Consider data-lakes are mainly fed through:

– ingestion, distillation and landing from content based (datasources, datasets, operational and transactional DB’s);
– ingestion and distillation from collaborative feeding (dynamic collections of large amount of information on users’ behaviours coming from the internet, direct and/or indirect).

Collaborative ingestion can be managed as a content based as well in case of time needed to data intelligence ending has no strict constraints so to define a third method, the hybrid one.

This brief introduction tries to explain that the data-lake maps ab-initio topologies to services but also may classify more ecosystems the services are defined and applied to. Services live in the ecosystems and ecosystems depend upon data aggregation (why used, where used, how used, who uses) and just like aggregation states, big data density change dynamically. These changes are a consequence of datasources ingested, users experiences, customers behaviours, ecosystems interaction and, of course, business realignment. Marketing and Sales should change accordingly. But since data-lake may grow by 40 percent per year (in line with the estimation of the worldwide rate of information growth taking into account that unstructured data is growing 15 times faster than structured data – source IBM®), there is no way to get any (predictive) control for marketing and sales organization although data warehousing and/or sophisticated traditional data mining and analysis are in place.

Anyway, the data growth will be greater than ever in the next years and so the variance for data aggregation in the data-lake will have an exponential rising: this means many opportunities could be lost and again further marketing and sales entropy. Ab-initio topology by agile big data approach and functional programming applied to the data-lake supply the best answer for prescriptive analysis on many-particle big data systems. In fact, the data-lake allows to work on data cross-aggregation optimization, customer experience and aggregation states for services realignment with respect to the business ecosystems. Still, data-lake is an extraordinary real-time “what-if set” for prescriptive scenarios, data processing assumption and data risk propensity.

Data-Sea

Fig.2 – The Data-Lake is quickly becoming a Data-Sea with multi-particle-like data behaviour and dimension

Banking and Goods Production are 2 typical examples of Big Data agile implementation. Both are supplying services. Both are trying to align instantly and proactively offer and business changes. Banking and Financial services play a strategic role in relationship management, profitability performance to corporate groups, client companies and commercial banking networks. This is why financial applications need to be rapidly synchronized to ecosystems fluctuations states as ecosystem participants’ change everywhere their behaviour due to local and international business conditions. Functional big data paradigm working on many-particle data aggregation is prescriptive with respect to unpredictable services transition: it agilely realigns ecosystem services directions over on-premise data topologies mapping.

Goods production may tune services as a consequence of user’s experience by, for example, executing more focused and less time-consuming recommender systems. Goods production companies are in the run to provide personalized technical and commercial services, greater client loyalty and prescriptive offers starting soon when the clients interact or navigate the company website. With agile big data and many-particle approach, goods production potentially increases user similarity by data-lake massive data aggregations. Fast moving data aggregations constantly feed functional data intelligence to services realignment and topological correlations repositioning on-premise data similarities.

Two different paces, the same objective: be prescriptive, understanding “at earlier” which data aggregation state is the most proper along the data-lake instability and then contiguously realign products offer, services configuration and, consequently, keep ecosystems oversee: on-premise topology gauged on data-lake volume, data velocity and variety allows Marketing and Sales to tune on effective data aggregation to promptly adjust services to the ecosystem.

Conclusion
Client sentiment and user experience behaviour analytics allow rapid changes to product offerings or customer support which in turn enhance customer fidelity and business improvement. However data are growing exponentially and business alignment have to be provided in more decentralized environments. Agile MaaS approach based on data-driven raw volume, data velocity and variety together with on-premise services topology is a relatively low cost and light model. Topology does not influence data treatment. Data remains intact although services integrity and classification drive business, user experience and ecosystems alignment. Accordingly, agile practice and many particle approach we introduced minimize data entropy together with data access time cycles everywhere, preserve data security and enhance user experience to functional visualization realignment.

Acknowledgment
I sincerely thank Paolo La Torre for his precious feedback on contents and encouragement on publishing this paper. Paolo is working as Commercial, Technical and Compliance Project Supervisor for Big Data planning and engagement directions in finance and banking.

References
N. Piscopo, M. Cesino – Gain a strategic control point to your competitive advantage – https://www.youtube.com/watch?v=wSPKQJjIUwI
N. Piscopo – ID Consent: applying the IDaaS Maturity Framework to design and deploy interactive BYOID (Bring-Your-Own-ID) with Use Case
N. Piscopo – A high-level IDaaS metric: if and when moving ID in the Cloud
N. Piscopo – IDaaS – Verifying the ID ecosystem operational posture
N. Piscopo – MaaS (Model as a Service) is the emerging solution to design, map, integrate and publish Open Data
N. Piscopo – Best Practices for Moving to the Cloud using Data Models in the DaaS Life Cycle
N. Piscopo – Applying MaaS to DaaS (Database as a Service ) Contracts. An introduction to the Practice
N. Piscopo – MaaS applied to Healthcare – Use Case Practice
N. Piscopo – ERwin® in the Cloud: How Data Modeling Supports Database as a Service (DaaS) Implementations
N. Piscopo – CA ERwin® Data Modeler’s Role in the Relational Cloud
N. Piscopo – Using CA ERwin® Data Modeler and Microsoft SQL Azure to Move Data to the Cloud within the DaaS Life Cycle

Disclaimer – This document is provided AS-IS for your informational purposes only. In no event the contains of “Agile Big Data and Many-Particle approach change Marketing and Sales effectiveness ” will be liable to any party for direct, indirect, special, incidental, economical (including lost business profits, business interruption, loss or damage of data, and the like) or consequential damages, without limitations, arising out of the use or inability to use this documentation, regardless of the form of action, whether in contract, tort (including negligence), breach of warranty, or otherwise, even if an advise of the possibility of such damages there exists. Specifically, it is disclaimed any warranties, including, but not limited to, the express or implied warranties of merchantability, fitness for a particular purpose and non-infringement, regarding this document use or performance. All trademarks, trade names, service marks, figures and logos referenced herein belong to their respective companies/offices.

ID Consent: applying the IDaaS Maturity Framework to design and deploy interactive BYOID (Bring-Your-Own-ID) with Use Case

Introductionidentity

Current approaches to IDaaS on one hand enforce trust of consumer data using legal compliance, risk and impact assessment and the other hand require technical implementation of access controls to personal data held by an enterprise. Balancing trust has to be done across all layers, verifying person’s identities, showing the individual and the service is real, creating short term relationships and verifying and maintaining all long the Cloud service the user mapping between the enterprise and the cloud user account in a mesh federation. This makes sense only if enterprises design “on-premise” with MaaS their own flexible ID data model and can verify ID maturity and consistency before moving, and along, the ID service in the Cloud. Based on MaaS, the BYOID concept is a possible solution to ID models for consent policy design, management and deployment. The BYOID model is a means to expressing, tracing and updating consumer’s personal data policy requirements; however enterprise users’ privacy preferences are provided as well. The IDaaS Maturity Framework (IMF) defines and directs the BYOID practice. MaaS guide properties and personal preferences from the consent metamodel design to the ID deployment. Both ensure that ecosystem compliance is achieved and ID in the Cloud meets trustworthy relationships.

IMF supports flexible BYOID design and deployment

IDaaS is authentication and authorization infrastructure that is built, hosted and managed through different models by third-party service providers, resident in ID ecosystem frameworks. IDaaS for the enterprise is typically purchased as a subscription-based managed service.  One or more cloud service providers, depending upon the IDaaS model the enterprise deploys, may host applications and provide subscribers with role-based web access to specific applications or even entire virtualized infrastructure. IDaaS makes enterprises responsible in evaluating privacy risks and grade of confidence when moving the ID to the cloud. Accordingly, before externalizing the corporate IdM, consider the different IDaaS models are supported depending upon the maturity levels of:

– IdM/IAM system, in terms of implementation, maintenance and IdM/IAM governance capacity. ID, by its nature is de-centralized and then the maturity rank should consider the whole IdM/IAM system including data protection, data manageability, data security and organization ID awareness at all levels;

IMF BYOID Fluid LifecycleFig. 1 – An example of enterprise BYOID consent model lifecycle to IDaaS deployment and reconciliation

– SOA system, to really understand policies by applied processes’ de-coupling (privileges by user role, accreditations, de-accreditations …) and procedures dynamically acting into the organization;

– ID ecosystem reliability and adherence to the frameworks’ security criteria that measure service provider(s) compliance.

However, the levels of maturity gauged along the organization enables the enterprise to design its own ID as a consequence of the appropriate IDaaS model. The enterprise is able to bring in the ID ecosystem a configurable IDaaS model based on MaaS design to satisfy enterprise business rules. Business rules have impact on enterprise identity requirements and they balance and reconcile consumer identities needs. This “fluid” multiple-way enterprises-consumers solution, or BYOID, creates a high assurance level of ID ecosystem participants’ identities that could be used for enterprise access by respecting privacy and security requirements: IDaaS models contain BYOID properties and define “on-premise” BYOID maturity and consistency.

A new concept of ID consent: the BYOID fluid model

When registering to an Identity Platform, users would like represent themselves according to their behaviour having the option to approve selective or discretionary sharing of their private information and looking for the ability to obfuscate, mask or mesh some parts of personal data. So, ID platform and user are creating interactively a bond of trust as a part of the whole ID service. This is possible only if the consent of the individuals, the data protection conditions for processing their personal data and consent policies might be modelled “on-premise” by the enterprise IdM.

Looking at the IMF, the ID metamodel might sprout in the IdM/IAM maturity appraisal stage, according to the properties and requirements the enterprise needs to protect personal data and sensible information. The question now is the following: if the ID metamodel is designed in the company IdM, could the consent model be considered proprietary? The metamodel gathers the properties corresponding to the real enterprise requirements but it will be tested and appraised firstly in IdM/IAM system and then in the SOA maturity system. At that point features like interoperability, expression of functionality and user’s behaviour will be explicit aspects of the BYOID data model such as the following:

1)    Trust properties;
2)    Verification;
3)    Scalability and performance;
4)    Security;
5)    Privacy;
6)    Credential Types;
7)    Usability;
8)    Attributes;
9)    User Centricity/User Control.

The above properties are matter for the ID ecosystem public consent data model structure (basic/incoming tables of the BYOID metamodel). In the beginning, those metadata are properties of the company: the company’s BYOID metamodel. Once the BYOID metamodel has been defined, tested and approved as BYOID company data model, it will be released to the ID ecosystem as an IDaaS model subscription. Despite of different approach, each enterprise may then adopt and release his BYOID. Before deploying BYOID services in the Cloud, the BYOID model should be compared with other BYOID models already running into the ID ecosystem frameworks. To be accepted, BYOIDs have to meet a set of common requirements enforced by the consent public ID ecosystem framework authority: the more adaptive is the public consent model (continuously and rigorously improved), the more flexible, secure and reliable are the BYOIDs shared. It makes interactive, fluid and safe BYOIDs deployed through IDaaS. Still, this enables user’s behaviour can be captured both at high level (enterprise-ecosystem reconciliation) and at low level (personal-enterprise-ecosystem reconciliation). Therefore BYOID can be reconciled, renormalized and constantly trusted at all levels. Since BYOID metamodel contains the enterprise identity requirements, it might include and integrate the ID ecosystem identity properties and, if approved by the user (obligation to maintain the personal data securely), his personal properties. This aspect is very important: in fact, there’s significant risk for a company when both customer/user relationships and company data are stored on personal devices. Using BYOID deployed as an IDaaS subscription, company information is centralized based upon “on-premise” consent metamodels: this means that company information stored on personal devices is minimized and always centrally controlled.

BYOID Model Recon

Fig. 2 – Fluid BYOID update and reconciliation: IDaaS User Experience vs. BYOID IDaaS subscription

User’s personal properties might reside on the same company (central) metamodel/consent model or not depending upon user approval and, always possible, withdrawal (i.e. personal data should comply with data protection legislation and, where necessary, the approval of the individual must be obtained). In the figure 2 here is an example. In 1 the User tries a new behaviour (statistically relevant or as a recommender system outcome); in 2 the IDaaS user experience has to be changed and updated. Above we show 3 data models but in the MaaS representation they consist of a unique model containing the BYOID IDaaS subscription (master) that includes 2 sub-models: the company consent model and the user personal model. In 3, the consent model is modified to keep compliance with the company business rules/conduct mapped to the BYOID IDaaS subscription. In 4, finally the update is executed and the User might find his conduct as a new function. However, take note in the figure 2 a relational model-like formalism is applied. This is just a simplification. In effect, we are in a multi-level relational data model that can be represented with NoSQL, Vector or Graph DB else, depending upon the data analytics domain.

USE CASE: the fluid BYOID approach

Scenario

IDaaS models to move ID to the Cloud enable organizations to externalize identities data more knowingly and securely. Employees and customers behaviour changed: they continuously have business contacts, calls and meetings with personal devices. Since an increasing quantity of employees uses their mobile devices everywhere, identities can be resident and so associated to applications running on different framework in a multi-topology cloud configuration. What should be then the best IDaaS model satisfying this new employees/customers conduct? Could be managed all users, across multiple locations, while securing company data? Because of each identity may be managed by different identity management services, authentication and validation of identities by the cloud infrastructure could not be sufficient. Companies have to verify and control “on-premise” their ID maturity. BYOID based upon IDaaS models allows to identifying and securing identity properties. Further IDaaS models assist ID integrity control over shared topologies with a variety of ID ecosystem frameworks. IMF plays a crucial role in identifying the most appropriate IDaaS model before deploying the BYOID to the Cloud. Then the BYOID is an IDaaS model and can be designed “on-premise” and controlled along deployment and subscription.

Properties and Directions

This use case is concerned with enterprises deploying their BYOID in the Cloud using IDaaS models and IMF. There is a need for evaluating “on-premise” organization IdM/IAM and SOA maturity before moving the ID to the Cloud. Evaluating the organization maturity levels involves three steps:

  1. IdM/IAM maturity: measure the IdM/IAM maturity level;
  2. SOA maturity: measure SOA maturity level – policies (privileges by user role, accreditations, de-accreditations …) and processes dynamically acting;
  3. Identity Ecosystem reliability/maturity: measure the ecosystem maturity/reliability, and above all, the secure service continuity because in hybrid topologies identities may be owned by different cloud providers resident in multi-topologies.

Objectives are the following:

  • Enable organization to identify and set the best BYOID through IDaaS model based upon internals levels of IdM/IAM and SOA maturity compared to the ID ecosystem framework’s baseline adherence. This sets maturity in classifying the ID ecosystem framework and in evaluating the reliability the ID ecosystem may provide;
  • Deploy the proper BYOID model applying the correct subscription and adherence with respect to the IDaaS ecosystem;
  • Periodically measure the organization’s IdM/IAM and SOA maturity levels and verify the ID ecosystem reliability/maturity so to update, and eventually scale, the BYOID deployed.

However, accordingly with the objectives, the value of the ID ecosystem level of reliability/maturity is the outcome the company is expecting to:
–          Keep BYOID secure and controlled and supervise the IDaaS service subscription;
–          Contribute to the ecosystem as participant and/or as authority;
–          Be a participant/counterpart in setting and approving attributes providers, policies and relying party’s decisions and IDaaS ecosystem adherence;
–          Contribute to the IDaaS Trustmark definition and to the periodical appraisal and updating.

Tabella1Tabella21Tabella21

Table 1 – BYOID Use Case properties and directions

Process Flow along the IMF

Accordingly to this Use Case, the IMF process flow encompasses three steps:

Part 1: Appraise IdM/IAM Maturity Level – To cover definition, maintenance and upgrade of the organization IdM/IAM level of maturity. The IdM/IAM maturity value has to be periodically monitored and controlled to keep coherence with the IDaaS model deployed:

Use Case 1.1

Figure 3 – BYOID: IDM/IAM Maturity Level Appraisal

The Identity and Access Manager verifies the Maturity level of the IdM/IAM system:

  • The IdM Manager controls and regulates the accesses to information assets by providing policy controls of who can use a specific system based on an individual’s role and the current role’s permissions and restrictions. This ensures that access privileges are granted according to one interpretation of policy and all users and services are properly authenticated, authorized and audited;
  • The BYOID Manager reconciles BYOID metadata and update the BYOID metamodel.

The IAM Manager controls if users’ identities can be extended beyond corporate employees to include vendors, customers, machines, generic administrator accounts and electronic access badges, all ruled by policy controls.

Part 2: Appraise the SOA Maturity Level – To cover definition, maintenance and upgrade of the organization SOA maturity level. The SOA maturity level has to be periodically monitored and controlled to keep coherence with the BYOID released:

Use Case 1.2

Figure 4 – BYOID: SOA maturity level appraisal

The SOA Manager verifies the Maturity level of the SOA system through the SOA interoperability and defines the organization maturity in sharing services among departments:

  • The SOA Manager verifies that the map of communications between services is drawn starting from IdM/IAM system and achieved maturity
  • The SOA Manager controls and reports about the following crucial aspects:
  • SOA reference architecture achievements and evolution;
  • education to broaden SOA culture through the organization;
  • methods and guidelines that organization adopts to apply SOA;
  • policy for SOA appliance and governance.
  • The BYOID Practice Manager tests and executes BYOID consent model reconciliation based on metamodel reconciliation and update. If necessary, BYOID Manager renormalizes the consent model by roundtrip with the BYOID metadata at IdM/IAM maturity level.

Part 3: Appraise the ID Ecosystem Reliability/Maturity – To establish the maturity/ reliability of the ID Ecosystem Posture. The comparative maturity of BYOID (Company vs. ID Ecosystem participants vs. user preferences) has to be continually monitored: points of discontinuity, unmatched policies, and untrusted relationships have to be time by time acknowledged. This helps to better qualifying frameworks accountability, federation assets, and participants’ reliability and level of contribution:

Use Case 1.3

Figure 5 – BYOID: ID Ecosystem Maturity/Reliability Appraisal

The Service Manager verifies the Maturity/ Reliability level of the ID Ecosystem framework:

  • The Service Manager controls that contribution to the ecosystem by privacy aspects, security components and accountability mechanism settings are congruent
  • The Service Manager controls that common guidelines keep coherence with the company policies and standards strategy. Since more than a framework exists inside the ecosystem, rules to ensure that accreditation authorities validate participants’ adherence to the ecosystem requirements are to be verified and updated
  • The Service Manager controls adherence to the ID ecosystem of the IDaaS deployed to verify reliability and service continuity;
  • The Service Manager verifies that accreditation authority to ensure participants and frameworks are adherent to the identity ecosystem interoperability standards accepted
  • The Service Manager controls that the ID ecosystem contains all trusted frameworks that satisfy the baseline standards established and they are compliant with the company maturity level
  • The BYOID Practice Manager verifies the framework ecosystem common levels of adherence (baseline) and test and compare BYOID reliability properties;
  • The ID Ecosystem Management Service verifies BYOID adherence and security with respect the IDaaS subscription.

The ID Ecosystem Management service provides a combination of criteria to determine the service providers’ compliance among frameworks and ID ecosystem topologies: the combination defines policies, rules and, eventually, a Trustmark. It gives confidence to participants in deciding who to trust in terms of BYOID framework adherence and among all ID providers.

Conclusion

Managing digital identities across ID ecosystems frameworks is crucial to improve efficiency of business collaborations. Using everywhere personal devices is becoming a preferred conduct but before sharing the ID among cloud domains, all involved parties need to be trusted. Still, to meet the demanding needs of security, big data analytics and business intelligence, users and consumers need a more efficient and flexible paradigms. In this paper, we identify how BYOID fluid model satisfies on one hand company security and user data protection and, on the other hand, rapid updating and reconciliation to the user conduct. IMF provides the necessary platform for collaboration in ID ecosystem topologies. We introduce also a USE CASE to point out how BYOID built across ID company consent model and ID ecosystem trusted access model, can be a foundation to gauge and govern BYOID strategies. Further, the paper can be used to compare different BYOID IDaaS subscription to establish what maturity levels the company might support compared with all business partners running existing IDaaS maturity models and to ensure ID in the Cloud meets trustworthy relationships.

Acknowledgements

I have to sincerely thank Susan Morrow for the precious feedback on contents and Anil Saldhana for the useful comments on the IDaaS Maturity Framework.

References

N. Piscopo – IDaaS. Verifying the ID ecosystem operational posture
N. Piscopo – A high-level IDaaS metric: if and when moving ID in the Cloud
N. Piscopo – MaaS implements Small Data and enables Personal Clouds
N. Piscopo – Best Practices for Moving to the Cloud using Data Models in the DaaS Life Cycle
N. Piscopo – MaaS (Model as a Service) is the emerging solution to design, map, integrate and publish Open Data
N. Piscopo – MaaS applied to Healthcare – Use Case Practice
N. Piscopo – Applying MaaS to DaaS (Database as a Service) Contracts. An introduction to the Practice
N. Piscopo – Enabling MaaS Open Data Agile Design and Deployment with CA ERwin®
N. Piscopo – ERwin® in the Cloud: How Data Modeling Supports Database as a Service (DaaS) Implementations
N. Piscopo – CA ERwin® Data Modeler’s Role in the Relational Cloud
N. Piscopo – Using CA ERwin® Data Modeler and Microsoft SQL Azure to Move Data to the Cloud within the DaaS Life Cycle
N. Piscopo – Page 16 in Transform2, MaaS and UMA implementation

Disclaimer – This document is provided AS-IS for your informational purposes only. In no event the contains of “ID Consent: applying the IDaaS Maturity Framework to design and deploy interactive BYOID (Bring-Your-Own-ID) with Use Case” will be liable to any party for direct, indirect, special, incidental, economical (including lost business profits, business interruption, loss or damage of data, and the like) or consequential damages, without limitations, arising out of the use or inability to use this documentation, regardless of the form of action, whether in contract, tort (including negligence), breach of warranty, or otherwise, even if an advise of the possibility of such damages there exists. Specifically, it is disclaimed any warranties, including, but not limited to, the express or implied warranties of merchantability, fitness for a particular purpose and non-infringement, regarding this document use or performance. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies/offices.

Vaultive and Turnberry Solutions Partner to Enable Secure Migration to the Cloud

New York, NY and Blue Bell, PA – Jan. 29, 2013 – Vaultive,  a provider of persistent encryption gateways to retain ownership and control of cloud data, and Turnberry Solutions,  a Microsoft Managed Partner with a proven track record of architecting, designing and implementing large-scale infrastructure projects, have announced a technology and services partnership. The combination of Turnberry’s capabilities and services in managing the implementation of and migration to Microsoft cloud-based services and Vaultive’s enterprise-grade cloud data encryption solutions optimized for Office 365 enables customers to make a seamless and secure transition to the cloud.

The Vaultive platform is optimized for Office 365 email encryption enabling customers to experience the flexibility, scalability and accessibility of cloud-based Exchange services while supporting best practices for the control and ownership of corporate data in the cloud.

“Our partnership with Vaultive allows us to add data encryption solutions to our cloud offerings. Our customers want to own, control and secure their cloud-based data. By adding Vaultive to our client solutions, we can address this business need,” noted Andy Thatcher, VP, business development at Turnberry Solutions. “Also, as a Microsoft Managed Partner, Turnberry Solutions can also supplement our Microsoft offerings with a security solution that ensures a smooth cloud migration for our customers.”

Implemented as part of the migration process, and employed to encrypt emails before they move to the cloud, Vaultive will enable Turnberry customers to protect cloud data across the entire lifecycle, incorporating data-at-rest, data-in-transit and data-in-use, in a format that can be searched, sorted and indexed. Even as Office 365 customers benefit from Microsoft’s ongoing investments in securing, managing and monitoring the Office 365 environment, customers can retain ownership and control of their emails in the cloud through retention of the encryption keys.

“Turnberry is well known for its highly skilled consultants and technologists and has designed, implemented and deployed some of the world’s most scalable business enablement platforms,” said Elad Yoran, CEO of Vaultive. “We look forward to working with the Turnberry team to bring the benefits of Vaultive’s advanced cloud encryption technology to Turnberry’s customer base.”

About Turnberry Solutions
Turnberry Solutions is a Microsoft Managed and Gold Certified Partner, offering full project lifecycle technology services that help companies adapt and respond to rapidly changing business conditions. Turnberry’s depth across Application Development, Information Worker, Unified Communications and Core Infrastructure includes world class Microsoft projects for highly recognizable, Fortune 1000 organizations. For 12 years, Turnberry has delivered successful IT solutions including systems architecture, design, implementation, quality assurance and operational support for mid-market and enterprise companies. For more information, visit http://www.turnberrysolutions.com, or Twitter @Turnberrysol

About Vaultive
Vaultive is a provider of persistent encryption gateways to retain ownership and control of cloud data. Vaultive’s encryption secures data at rest, data in transit and data in use in a format that can be searched, sorted and indexed — while the organization’s IT department retains control of the encryption keys.

This addresses the principal business challenges of migrating data to the cloud including data security, regulatory compliance, unauthorized data disclosure and access, and international privacy/ data residency regulations. Optimized for Microsoft(r) Office 365, the Vaultive platform supports best practices for the control and ownership of corporate data in the cloud as outlined by the Cloud Security Alliance. Vaultive has raised more than $10 million from leading venture capital firms .406 Ventures, New Science Partners, Harmony Partners and Security Growth Partners. For more information, visit www.vaultive.com or follow us on Twitter at https://twitter.com/vaultive.

CONTACT:
Jill Colna or Jordan Bouclin
SVM Public Relations
401-490-9700
jordan.bouclin@svmpr.com
jill.colna@svmpr.com

Anita O’Malley
anita.omalley@perspectiv3.com
908-596-1188

Cloud experts publish best practices guide for E-Health

Toronto, Canada – 15th Jan, 2013 – Rackspace, EMC, Vaultive and other Cloud Computing industry experts have helped create a Cloud best practices guide to describe how the technology can be applied to E-Health.

Issue 2 of a new ‘TRANSFORM‘ e-magazine from the Cloud Best Practices Network focuses on the recent Cloud adoption strategy published by Canada Health Infoway, which calls for a ‘greenfield’ suite of new SaaS applications to help accelerate adoption of E-Health.

Neil McEvoy, CEO of the Cloud Best Practices Network publishing the guide, says “TRANSFORM is intended to capture the business benefits that Cloud computing can enable.”

Robert Griffin, Chief Security Architect for EMC RSA and lead for the OASIS KMIP project, “As data encryption becomes more and more critical for securing data entrusted to the cloud, interoperation across key management capabilities in traditional IT, private clouds and public clouds will also become more and more important.

KMIP plays an essential role in enabling this interoperation, enabling the secure movement of keys across disparate key management and cryptographic environments in support of deployment flexibility so essential to the cloud.”

Co-author Elad Yoran, CEO of Vaultive, comments “The financial and operational benefits of moving IT infrastructure to the cloud are compelling for organizations worldwide, but the rate of adoption of cloud-based services within the healthcare industry is typically lower given the strict regulations that organizations must adhere to.”

“Advanced encryption technology can enable healthcare organizations to ensure maximum data security and compliance in the e-health model by encrypting data before it goes to the cloud, while the encryption keys are solely controlled by the organization that owns that data. As a result, it can never be decrypted outside of the organization.”

TRANSFORM issue 2 is available for download from http://EHealth-Cloud.info

— Contact:

Neil McEvoy
CEO, CloudBestPractices.net
neil.mcevoy@l5consulting.net

Gamification Meets The Cloud – Lush Use Memset Cloud To Deliver Gamification Employee Training

Guildford, Surrey – 9 January 2013 – Award-winning, British cloud provider, Memset have provided the cloud infrastructure to enable Lush Fresh Handmade Cosmetics to roll out their game-based, interactive, digital staff training programme across Europe.

The mobile and online learning game, called Lush Quests, introduces new staff to Lush’s brand and products with challenges and rewards throughout the digital gaming interface.

Memset have provided five Miniservers to host German, French, Italian, Spanish and English versions of the training programme. To date, over 2,000 employees have undertaken this exciting new online training programme, based on gamification, which is quickly becoming a successful and favoured trend in marketing and branding campaigns.

Lush Quests take the form of an interactive story, told in a fast paced manner over the course of about 20 minutes. Following the game’s completion, employees complete a 10-minute quiz to confirm their understanding of the material.

The programme is delivered by the cloud and is compatible with almost any device. Behind the scenes, the application is delivered by leveraging the capabilities of Memset’s public cloud platform. These capabilities include:

• Compute: Common REST-based web services powering the user interfaces and the HTML5 game user interface itself, both with the ability to scale up and down, allowing several hundred employees to download, install and play simultaneously.

• Storage and Data: Ability to store assets such as images and video leveraged across user interfaces with a centralised SQL database service for storing application data, as well as training results.

• Content Delivery: Increasing performance by delivering international versions to locations around the globe.

Richy Baxter-Freeman, International Support for Lush cosmetics who was responsible for the IT set up of the training programme said: “Using Memset’s cloud service has enabled us to quickly roll out the programme to other countries faster than we anticipated. We’ve been able to take snapshots of the Miniserver and recreate it quickly in the other languages required.”

He continued, “We can monitor traffic and performance via Memset’s control panel and easily scale up or down as load patterns fluctuate, which means we only pay for what we need in terms of compute infrastructure. In addition, we benefit from the maintenance, support, and deployment automation provided by Memset to reduce our operational costs.”

Kate Craig-Wood, MD of Memset said: “We’re delighted to be able to team up with Lush to provide the necessary platform to deliver their gamification training programme. As a keen gamer myself, I understand how important the reliability, security and responsiveness of the infrastructure is, to ensure the optimum interaction with the programme. We’re very excited to see how Lush Quests benefits Lush staff across the world.”

-ends-

About Memset

Memset is an award-winning IT hosting company based in Guildford, Surrey, providing managed hosting and cloud computing Infrastructure-as-a-Service (IaaS) solutions for businesses and public sector via G-Cloud Framework. Services range from individual virtual machines (Miniserver VM®s) to enterprise-class dedicated server clusters with multi-site fail-over, all without term contracts or up-front costs. Customers range from start-ups to large corporates (eg. Debenhams, Hilton Hotels and the BBC) across all industry types. Its services are especially popular with IT companies providing Web-based Software-as-a-Service (SaaS).

Awarded an ISPA award for ‘Best Managed Service’, Memset has also been voted as the UK’s Best Web Host for six consecutive years at the PC Pro Awards.

For more information please see: http://www.memset.com

About Lush
Since establishing 18 years ago, Lush Cosmetics has been driven by innovation and its ethics. Creators of pioneering beauty products such as the fizzing bath ballistic, shower jellies and solid shampoo bars, Lush places emphasis on fresh ingredients like organic fruits and vegetables. Lush operates a strict policy against animal testing and supports Fair Trade and Community Trade initiatives. Lush leads the cosmetics industry in combating over-packaging by developing products that can be sold ‘naked’ to the consumer. Lush has over 850 stores in 51 countries.

Momentous
137 Kingston Road
Teddington
Middlesex TW11 9JP
P: 020 8614 6816
M: 0781 484 5376
E: kolver@momentousuk.com
Skype: kolver

Vaultive Announces Appointment of Leading Cloud Security Industry Experts to Advisory Board

New York, NY – December  12, 2012 — Vaultive, a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services, today announced the formation of its Advisory Board, which includes notable cloud computing industry luminaries Dave Cullinane, CEO of SecurityStarfish, Jim Reavis, co-founder and executive director of the Cloud Security Alliance, and Dr. Eran Tromer of Tel Aviv University’s School of Computer Science.

Vaultive’s enterprise-class cloud data encryption solutions enable encryption in use, encryption in transit and encryption at rest, while the organization’s IT department retains control of the encryption keys. Vaultive enables data to be searched, sorted, indexed, and otherwise processed in the cloud without ever being decrypted there.  Vaultive protects data from unauthorized access by integrating industry-standard AES-256 encryption into enterprise cloud applications, and lets customers enable and manage additional cloud application functionality using proprietary cryptographic extensions.  These capabilities effectively address the four principal business challenges that organizations face when migrating data to the cloud: data securityregulatory complianceunauthorized data disclosure and access, and international privacy/ data residency regulations.

Vaultive’s Advisory Board members are amongst the world’s thought leaders on cloud security.  They have been actively involved in educating the market on the need for greater cloud security as well as defining the standards by which it can be adopted.  Dave Cullinane is a globally recognized leader and visionary in the IT security industry.  Cullinane was formerly the chief information security officer (CISO) of eBay, where he was responsible for security programs to protect eBay and its many businesses. Under his leadership, eBay’s security team was named “Security Team of the Year” by SC Magazine in 2010.  Prior to joining eBay, Cullinane was the CISO for one of the largest banks in the United States. Cullinane is also a founding member and chairman of the board of the Cloud Security Alliance and president of the Information Sharing and Analysis Center.

Jim Reavis was recently named as one of the Top 10 cloud computing leaders by SearchCloudComputing.com.  As co-founder and executive director of the Cloud Security Alliance, Reavis leads the most important and influential organization working to define industry best practices for cloud security.  Reavis is also president of Reavis Consulting Group, LLC, where he advises security companies, large enterprises and other organizations on the implications of new trends and how to take advantage of them. He was previously an international board member of the ISSA and served as the association’s executive director. Reavis was also a co-founder of the Alliance for Enterprise Security Risk Management, a partnership between the ISSA, ISACA and ASIS, formed to address the enterprise risk issues associated with the convergence of logical and traditional security.

Dr. Eran Tromer is well known for his expertise in the areas of cryptography, information security, and the challenges raised by imperfect real-world computer systems. His research on side-channel attacks demonstrated information leakage in commercial cloud computing services, efficient cache-based attacks on AES encryption and acoustic attacks on RSA encryption. He actively pursues means of improving security at the levels of networks, algorithms, protocols, operating systems and hardware circuits. He is the co-author of many industry papers and presentations, including “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds.” Dr. Tromer’s Ph.D. dissertation at the Weizmann Institute of Science (2007), advised by Prof. Adi Shamir, drastically reduced the projected cost of breaking RSA keys, leading to revision of government standards.  Dr. Tromer has served on numerous program committees and academic panels, as in industry consulting roles.  Prior to joining Tel Aviv University, Dr. Tromer pursued his research at the Massachusetts Institute of Technology and at Microsoft Research.

“When building our Advisory Board, we sought out recognized leaders and visionaries in the cloud data security and encryption industries that could provide strategic council to help Vaultive in the ongoing development of its groundbreaking solutions,” said Maayan Tal, co-founder and CTO of Vaultive. “We are thrilled to have Dave Cullinane, Jim Reavis and Eran Tromer join our Advisory Board. Their collective insights and expertise – developed from decades of industry experience – will be an invaluable asset to Vaultive as we continue to be an innovator in cloud data encryption technologies.”

As members of Vaultive’s Advisory Board, Cullinane, Reavis, and Tromer will join other notable industry luminaries in providing input, ideas and expert advice to the company as Vaultive continues to grow.

“I am excited to be a part of Vaultive’s Advisory Board, having experienced firsthand the challenges and concerns of moving proprietary enterprise data to the cloud,” said Cullinane. “What Vaultive is doing is truly unique in that its smart encryption solution allows organizations to retain complete ownership and exclusive control of data, while still reaping all of the benefits of the cloud.   Deploying it should be a best practice for anyone migrating to the cloud and Vaultive is enabling widespread adoption of cloud computing by organizations that would otherwise be challenged to do so.”

About Vaultive
Vaultive is a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services. Vaultive’s encryption secures data at rest, data in transit and data in use in a format that can be searched, sorted and indexed — while the organization’s IT department retains control of the encryption keys. This addresses the principal business challenges of migrating data to the cloud including data security, regulatory compliance, unauthorized data disclosure and access, and international privacy/ data residency regulations. Optimized for Microsoft® Office 365 Encryption, the Vaultive platform supports best practices for the control and ownership of corporate data in the cloud. Vaultive has raised more than $10 million from leading venture capital firms .406 Ventures, New Science Partners, Harmony Partners and Security Growth Partners.
For more information, visit www.vaultive.com or follow us on Twitter at https://twitter.com/vaultive.

For additional information, contact:
Jill Colna or Jordan Bouclin
SVM Public Relations
401-490-9700
jordan.bouclin@svmpr.com 
jill.colna@svmpr.com

Memset Break Into Local Government Through G-Cloud

Helping Staffordshire County Council Via The Cloud

Guildford, Surrey – 5 December 2012 – Award-winning, IaaS G-Cloud supplier, Memset, today announced it will be providing IL2 hosting to Staffordshire County Council, secured via the G-Cloud’s CloudStore.

The council had an immediate and short term requirement for secure, yet flexible hosting to roll out one of its Social Care projects.

Sander Kristel, CIO for Staffordshire County Council, turned to the G-Cloud’s CloudStore to find a hosting partner capable of providing up to level IL2 hosting, said: “This is our first purchase via the G-Cloud and it all went very smoothly. It’s easy to evaluate suppliers and once we signed up with Memset on 2nd November we were live the same day. Our requirement was immediate and needed a solution that was secure but flexible enough to facilitate a, potentially short-term, need. This is the way we all should procure IT services.”

“We’re delighted that Staffordshire County Council has come to us for this project, making them our first local government G-Cloud win. It is likely to be a great example of cloud’s cost-saving pay-as-you-use model,” said Kate Craig-Wood, MD of Memset.

-ends-

For further information, please contact:

Katie Olver or Justina Rosu
Momentous
P: 020 8614 6816
M: 0781 484 5376
E: kolver@momentousuk.com

About Memset
Memset is an award-winning IT hosting company based in Guildford, Surrey, providing managed hosting and cloud computing Infrastructure-as-a-Service (IaaS) solutions for businesses and public sector via G-Cloud Framework.

Services range from individual virtual machines (Miniserver VM®s) to enterprise-class dedicated server clusters with multi-site fail-over, all without term contracts or up-front costs. Customers range from start-ups to large corporates (eg. Debenhams, Hilton Hotels and the BBC) across all industry types. Its services are especially popular with IT companies providing Web-based Software-as-a-Service (SaaS).

Awarded an ISPA award for ‘Best Managed Service’, Memset has also been voted as the UK’s Best Web Host for six consecutive years at the PC Pro Awards.

For more information please see: http://www.memset.com

OASIS to Standardize Cloud Application Management for Platforms (CAMP)

OASIS the international open standards body, has major news about their new Cloud standards project ‘CAMP’. Read more here.

12 November 2012 – The OASIS international consortium has launched the Cloud Application Management for Platforms (CAMP) Technical Committee, a project to define the interoperability standard for managing applications in Platform as a Service (PaaS) environments. CAMP will leverage similarities between commercial and open-source PaaS products to produce a simple API that is language-, framework-, and platform-agnostic. Using CAMP, companies will be able to migrate their cloud applications from one PaaS vendor to another by mapping the requirements of applications to the specific capabilities of the underlying platform.

Vendor Consortium Launches Cloud Revenues Program

24 Oct, 2012, Toronto — Vendors including Cohesive FT, ACIS, Guardtime and PerspecSys have joined the CloudBestPractices.net (CBPN) to launch a Cloud Revenues Program for hosting providers.

Following an intense three year in-depth research program into key customer segments for cloud enablement including government, healthcare, small business, and enterprise sectors; the Cloud Revenues Program offers hosting providers the ability to successfully launch new Cloud services into these high-growth markets.

The CBPN Cloud Revenues Program will organize vendor partners into new solution suites that hosting providers can deliver across their existing Cloud platforms and launch into these sectors. The Cloud Revenues Program also provides a complete support program including Cloud application technical blueprints, template product plans with revenue models, Cloud migration professional services, turnkey marketing campaigns, PR and sales training.

CBPN CEO, Neil McEvoy says of the initiative: “Although the Cloud hype has been deafening, the reality is that it has yet to turn into meaningful revenue streams for hosting providers. Many are still focused mainly on traditional co-location and dedicated web hosting. The CBPN Cloud Revenues Program is a significant step forward in identifying the new services that will meet that need.”

What If What Next CEO, Howard Oliver commented: “Our research clearly shows that the target markets we are addressing will respond favorably to cloud offerings delivered by hosting providers they trust. The opportunity for the companies participating in this ecosystem is substantial.”

A consortium of vendors has been selected that will enable a complete Cloud migration roadmap and a portfolio of next generation Cloud Applications.

Ryan Koop, CMO for Cohesive FT says: “Cohesive FT enables hosting providers to compete head-to-head with the incumbents like Amazon. In the IaaS market today, providers need a software-defined networking (SDN) story. We bring that to the table, and also enable them to cater for the customers Cloud migration requirements of BYON and BYOI – Bring Your Own Networks and golden images.”

Efrem Habteselassie, CEO of ACIS Consulting adds: “Hosting providers are looking for ways to differentiate their service offerings and add top line revenues by providing value-added services that are conveniently located within the same trusted platform. Our Cloud Search Portal service (CloudSearchPortal.com) is a perfect example, offering to reduce customer’s TCO through an Enterprise class hosted search solution.”

Mike Gault, CEO of Guardtime, says their pioneering work with ‘Keyless Signatures’ can power a suite of next generation secure Cloud applications, in key areas like E-Discovery: “The ability to assure the legal integrity of Cloud-hosted information is the big leap forward for Cloud security, that can underpin a suite of new business process tools that can disrupt traditional BPM markets.”

David Canellos, CEO of PerspecSys, commented: “Many enterprises must satisfy strict data privacy, residency and compliance requirements – a challenging task that makes cloud adoption extremely difficult. PerpsecSys’ Cloud Data Protection Gateway is an innovative server-based solution that can be deployed by hosting providers to keep sensitive corporate information local and out of public cloud applications like Salesforce.com – without any impact on SaaS usability or performance. Hosting providers offering this service are truly making the move to the cloud a possibility for organizations with these challenges.”

About

The Cloud Best Practices Network exists to bring together leading Cloud Computing experts and entrepreneurs, and provides a single forum to collate and publish their knowledge to help grow awareness and adoption. The Cloud Revenues Program enables hosting providers to leverage best practices as a framework for revenue generating product innovation.

Contacts

Neil McEvoy, CEO, Cloud Best Practices Network, neil.mcevoy@l5consulting.net.

Howard Oliver, CEO, What If What Next – PR, 905-709-8582, holiver@whatifwhatnext.com.

Memset Revenue Growth Surges

Guildford, Surrey – 17 october 2012 – Memset is a young entrepreneurial company in the fiercely competitive cloud computing and managed hosting business. The company is sitting at the helm of one of the most powerful and disruptive technology changes over the past 100 years – the shift from premise-based to cloud-based IT infrastructure.

Founded in 2002 with just £3K, Memset now boasts a revenue run rate of more than £4 million and annual growth topping 30%. Cloud-based service revenue grew by 15% over the previous period, up from 11% growth in the comparable period of 2011, and the number of live virtualised cloud servers rose by 32% in the last 12 months. If present conditions persist, Memset is expected to break the £7m per annum somewhere around the third quarter of 2014.

The company is poised for significant growth because: IT infrastructure is shifting from on-premise to cloud-based as it offers superior quality for a lower cost. The managed hosting/cloud computing industry is expected to grow 20% annually for the next few years. Memset will take an increasing market share due to superior customer service and being an open cloud provider, using an open source framework for delivering cloud computing technology. As a certified G-Cloud supplier, revenue from the CloudStore is expected to contribute a significant, growing element of Memset’s revenue over the next few years.

This performance is underpinned by only 1% annual churn, further demonstrating the “sweet spot” in which the company finds itself; with increased spend by existing clients supplementing new business.

-ends-

For further information please contact:

Katie Olver or Justina Rosu Momentous

P: + 44 (0) 208 614 6816

E: kolver@momentousuk.com

About Memset Memset is an award-winning IT hosting company based in Guildford, Surrey. We provide managed hosting and cloud computing Infrastructure-as-a-Service (IaaS) solutions for businesses and public sector via G-Cloud Framework.

Services range from individual Miniserver VM® virtual servers to enterprise-class dedicated server clusters with multi-site fail-over, all without long-term contracts or up-front costs. Memset’s customers range from small start-ups to large corporates (eg. Debenhams and BBC) and are spread across all industry sectors.

Memset has been named as PCPro’s Best Web Host for the last seven consecutive years, and recently won ISPA’s Best Managed Service, and Best Small IT Supplier at the UK IT Industry Awards 2011.

For more information please see: http://www.memset.com Momentous 137 Kingston Road Teddington Middlesex TW11 9JP

P: 020 8614 6816 M: 0781 484 5376

E: kolver@momentousuk.com Skype: kolver