We could not find any results for:
Make sure your spelling is correct or try broadening your search.
Share Name | Share Symbol | Market | Type | Share ISIN | Share Description |
---|---|---|---|---|---|
Tern Plc | LSE:TERN | London | Ordinary Share | GB00BFPMV798 | ORD 0.02P |
Price Change | % Change | Share Price | Bid Price | Offer Price | High Price | Low Price | Open Price | Shares Traded | Last Trade | |
---|---|---|---|---|---|---|---|---|---|---|
-0.05 | -2.27% | 2.15 | 2.00 | 2.30 | 2.20 | 2.15 | 2.20 | 187,094 | 13:16:34 |
Industry Sector | Turnover | Profit | EPS - Basic | PE Ratio | Market Cap |
---|---|---|---|---|---|
Finance Services | 66k | -10.45M | -0.0269 | -0.80 | 8.55M |
Date | Subject | Author | Discuss |
---|---|---|---|
21/1/2020 12:40 | yeah Mike m8, and on the other side we have a random shorter saying it's ten a penny. Now who to believe? :) | 1happydays | |
21/1/2020 12:37 | Ff2345, I would imagine that these organisations have already defined both their business and technical requirements if they have a project in progress. And I very much doubt there will be a lengthy technical analysis of the product. Does it do x, y and z? Show me it doing them. Thanks. | mike routhorn | |
21/1/2020 12:36 | quite a claim.. | still waiting | |
21/1/2020 12:33 | Happydays, that looks to be as though DA are saying they are the ONLY company offering everything that people need for IoT security and device management at IoT scale. They are boasting that they are top of the pile. Perhaps one of the reasons nCipher was able to attract such a vast audience was that these organisations were told 'you will see things you will not see anywhere else'. Tick, tock. | mike routhorn | |
21/1/2020 12:32 | Mike A week is a bit optimistic! But I agree that many who attend are facing real challenges, and will be keen to evaluate a potential solution. But detailed technical evaluation for such a key security component of their IoT offering will take 3 months at least...scope the required tests, evaluate, performance at scale, negotiate etc etc. | ff2345 | |
21/1/2020 12:29 | IoT data does need secured now, but it has done since legislation was passed.. | still waiting | |
21/1/2020 12:27 | SW, I very much doubt it will take months. People attending this webinar will have a list of technical and business requirements for their purposes and project(s). At the end of today, or probably tomorrow they will convene the attendees for a de-brief and someone will quickly be making a yea or nay decision. You might very well get an initial contact regarding a purchase within a week. | mike routhorn | |
21/1/2020 12:25 | New insight guide hxxps://www.deviceau What makes KeyScaler unique? KeyScaler delivers automation for critical credential management processes, in addition to tokenized access control and policy-based encryption for data, in transit and at rest. In doing so, KeyScaler is uniquely addressing the challenges of device trust, data trust and operational efficiency at IoT scale which no existing solution is capable of delivering. It can be deployed quickly (hours, compared to multiple days for similar systems, which often require teams of bespoke developers), used on-premise, SaaS, using traditional VM based servers, or deployment using Docker and is truly scalable. Highlights of unique features relevant to IoT use cases: • Root of Trust, Secure Production, Supply Chain Integrity – A foundation for Secure by Design • Device-bound Identity/Authenticat • Device-bound Data Security • Data-Centric Security • Supporting Devices Offline • Code Signing and Secure Updates • Protecting Critical Resources Across the Solution Components KeyScaler is the only platform to deliver the additional functionality required for IoT: • Unified Trust Model - Device and data trust combined (across both Smartphone applications and vehicle systems) • Security model for safety and data privacy for automotive applications • Real-time device authenticity validation • Coupled relationship between device identity and data • Only trusted entities can participate in the interactions • User Access Control & Authorization • Flexible platform to address a mix of use cases (token-based access control and PKI management and automation) • Configurable platform-based solutions highly scalable and flexible • Automation and support for enterprise security vendor ecosystem • HSM integration and support including nCipher Security and Thales/Gemalto • Public Certificate Authority and Private PKI options • Future proof, flexible options for device manufacturers and their customers | 1happydays | |
21/1/2020 12:19 | months down the line maybe.. not today though. | still waiting | |
21/1/2020 12:09 | That may be because the few avatars that deal this shower are busy sat by their screens, trews round ankles, box of Kleenex at hand hoping for a happy ending. I do hope they don’t end up disappointed again. | monte1 | |
21/1/2020 12:05 | 3 hours until the webinar and you can see cobwebs over the Tern share dealing account, very strange with near enough 500 attendees and trillions worth of value attending the webinar. | sweepie2 | |
21/1/2020 11:27 | Revenues continue to build imo with this statement We have also included use cases in Medical/Healthcare, Industrial IoT and Automotive as we continue to develop our platform in line with customer requirements. | sweepie2 | |
21/1/2020 11:17 | .... and I just popped in to buy some popcorn to find out that the whole country has sold out of the stuff due to a big event later today. | monte1 | |
21/1/2020 11:05 | Just had a BT van drive past with a PA system and a recorded message requesting that we log off from the internet this afternoon to free up band width for the DA spectacular. | jonc | |
21/1/2020 10:53 | News from DA, can we link it to this afternoons webinar? Tuesday, January 21, 2020 Today we have published our new Technical Insight Guide which includes the latest capabilities of our KeyScaler platform. Download your free copy. The Technical Insight Guide was first published when we launched our KeyScaler platform in 2017. It has since evolved to showcase the latest developments in KeyScaler platform architecture including features, integrations with IoT platforms and other third parties. This version also includes an introduction to our Enterprise IoT security blueprint which can be downloaded in full here. Our new Insight Guide provides an overview of the capabilities and architecture of KeyScaler to highlight the supported functionality and security benefits that KeyScaler delivers. We have also included use cases in Medical/Healthcare, Industrial IoT and Automotive as we continue to develop our platform in line with customer requirements. Resources Technical Insight Guide Webinars Events Blog Solution Briefs & Guides | sweepie2 | |
21/1/2020 10:50 | It's all automated I guess - the tickdowns. Sad. | actybod | |
21/1/2020 10:42 | Thanks for the tick downs guys, keeps you occupied. !!!!!!!! | arab3 | |
21/1/2020 10:39 | andrbea - 05 Mar 2019 - 13:27:16 - 140601 of 183389 I put a question today to Thales eSecurity: their answer: Thank you very much for your enquiry. Thales eSecurity does have CipherTrust Cloud Key Manager. However Device Authority is not a technology partner for this product. ==================== Does he forget his own posts????? | duxy786 | |
21/1/2020 10:34 | highlighting the need for better training in the NHS. | still waiting | |
21/1/2020 10:27 | Closing DA would be the way forward. | jonc | |
21/1/2020 10:23 | No it won't. | jonc |
It looks like you are not logged in. Click the button below to log in and keep track of your recent history.
Support: +44 (0) 203 8794 460 | support@advfn.com
By accessing the services available at ADVFN you are agreeing to be bound by ADVFN's Terms & Conditions