Here are some of the Terranoha Frequently asked questions
What is Terranoha?
Terranoha is a cutting-edge, cloud-based platform that connects structured and unstructured data sources to automate various aspects of financial operations for banks and trading businesses.
It specializes in automating trade capture for over-the-counter (OTC) transactions and other trading processes across different market sectors, such as commodities, metals, and soft commodities like sugar.
Terranoha is a cutting-edge, cloud-based platform that connects structured and unstructured data sources to automate various aspects of financial operations for banks and trading businesses.
It specializes in automating trade capture for over-the-counter (OTC) transactions and other trading processes across different market sectors, such as commodities, metals, and soft commodities like sugar.
What Is Natural Language Processing (NLP)?
Natural processing mimics the way that humans understand language. This is the first step to automate unstructured queries. Read our article on NLP.
Natural processing mimics the way that humans understand language. This is the first step to automate unstructured queries. Read our article on NLP.
Does Terranoha NLP Understand Multiple Languages?
Yes, Terranoha NLP understands multiple language such as German, Greek, Russian, Chinese, Arabic and so on. In real-time, our engine translates texts through our partnerships with data providers.
Yes, Terranoha NLP understands multiple language such as German, Greek, Russian, Chinese, Arabic and so on. In real-time, our engine translates texts through our partnerships with data providers.
How does Terranoha utilize structured and unstructured data sources for automation?
Terranoha’s platform leverages advanced AI algorithms and Robotic Process Automation (RPA) to extract, process, and analyze data from structured sources like databases, ERP, and CRM systems, as well as unstructured sources like emails, chat applications, and documents. By connecting these data sources, Terranoha automates critical financial operations and ensures seamless integration and data flow between systems.
Terranoha’s platform leverages advanced AI algorithms and Robotic Process Automation (RPA) to extract, process, and analyze data from structured sources like databases, ERP, and CRM systems, as well as unstructured sources like emails, chat applications, and documents. By connecting these data sources, Terranoha automates critical financial operations and ensures seamless integration and data flow between systems.
What Asset Classes Does Terranoha Cover?
By design Terranoha is agnostic and multi-asset. Terranoha routes messages to third-party systems that execute orders, evaluate risk, record trades etc.
By design Terranoha is agnostic and multi-asset. Terranoha routes messages to third-party systems that execute orders, evaluate risk, record trades etc.
What Is Terranoha Pricing Model ?
Terranoha is software vendor with a subscription license fee model. Terranoha strongly believes each client is extremely valuable regardless transaction/volume/transaction usage.
Terranoha is software vendor with a subscription license fee model. Terranoha strongly believes each client is extremely valuable regardless transaction/volume/transaction usage.
How does Terranoha’s AI-powered technology adapt to changes in financial operations and market trends?
Terranoha’s AI algorithms are designed to learn and adapt to evolving financial operations and market trends. The platform utilizes machine learning techniques to continuously improve its understanding of transaction patterns, data extraction, and process automation. As a result, Terranoha stays up-to-date with industry developments and can adjust its workflows to accommodate changing business requirements.
Terranoha’s AI algorithms are designed to learn and adapt to evolving financial operations and market trends. The platform utilizes machine learning techniques to continuously improve its understanding of transaction patterns, data extraction, and process automation. As a result, Terranoha stays up-to-date with industry developments and can adjust its workflows to accommodate changing business requirements.
Architecture
What Are The Hosting Options You Propose?
The Terranoha service can be hosted in public or private cloud and is running on the physical hardware in single tenant mode.
The Terranoha service can be hosted in public or private cloud and is running on the physical hardware in single tenant mode.
How Is History Stored?
All historical data is stored under a database real-time cluster behind a firewall and protected from the direct access by IP security.
All historical data is stored under a database real-time cluster behind a firewall and protected from the direct access by IP security.
Can We Download And/Or Move Data At Any Time?
Terranoha can provide full audit trail around the software via reports or API with additional fees. Besides, we can send reports about infrastructure with additional cost once the customer ‘s needs are defined.
Terranoha can provide full audit trail around the software via reports or API with additional fees. Besides, we can send reports about infrastructure with additional cost once the customer ‘s needs are defined.
What Is Your Information Security Program To Safeguard Data & Systems Against Cyber Threats?
All sensitive data is secured by firewalls using strict rules and are stored on isolated networks.
All sensitive data is secured by firewalls using strict rules and are stored on isolated networks.
All devices are protected by access-lists and filters to prevent unauthorised access.
How Do You Ensure Data Security When Individuals Are Executing Transactions Or Viewing Sensitive Data Remotely Via A Mobile Device?
The Terranoha service has an independent (secondary) authentication procedure that ensures all access right within the application calls apart of the used the third-party software to reach the service.
The Terranoha service has an independent (secondary) authentication procedure that ensures all access right within the application calls apart of the used the third-party software to reach the service.
Can This Be Automatically Enforced Based On The Users’ Profile And Authorization Level?
Yes it can be enforced if security provider rules applied on customer profile.
Yes it can be enforced if security provider rules applied on customer profile.
Is Data-In-Transit Encrypted?
All transit data is encrypted with RSA (2048-bit RSA key) TLS v1.2 minimum.
All transit data is encrypted with RSA (2048-bit RSA key) TLS v1.2 minimum.
How Your System Supports Role-Based Access Controls To Ensure People Have The Appropriate Access To Data Based On Primary Organizational Roles?
We have an access right matrix that is applicable by role but that might be customized by attributes. Our model is based on Role-centric RBAC-A security model.
We have an access right matrix that is applicable by role but that might be customized by attributes. Our model is based on Role-centric RBAC-A security model.
How Do You Secure Those Logs To Prevent Data Tampering & Data Destruction?
The audit reports and logs storage are distributed between multiple types such as database and log files. The database storage protected by the IP security and only authorized person can access it on top of it. The log files are archived automatically on the daily basis and stored in a secured place protected by the authorized access security.
The audit reports and logs storage are distributed between multiple types such as database and log files. The database storage protected by the IP security and only authorized person can access it on top of it. The log files are archived automatically on the daily basis and stored in a secured place protected by the authorized access security.
What Are Your Backup Policies & Procedures, Including RTO & RPO Commitments?
- The database is been replicating Realtime continuously.
- Technical logs are backup every day.
- The failover takes over and awake the sleeping server.
- Our service uses a principle of fallback to check the first IP responding.
- Restoring time is 15 min.
Do You Provide A 2FA (Two-Factors Authentication) Method?
Yes, we can implement 2FA , by methods provided by your access authorisation provider.
Yes, we can implement 2FA , by methods provided by your access authorisation provider.
Are Access Logs Maintained By User Identification And What Is Contained On Them?
Yes, they are; the access logs contain the following information on date/time, personalization, source.
Yes, they are; the access logs contain the following information on date/time, personalization, source.
What Is Your Security Policy To Ensure Proper Policies And Procedures Are In Place To Protect Data?
We do not store sensible data about clients but Key reference.
We do not store sensible data about clients but Key reference.
Any other kind of information is kept within secure, and password protected storages behind a firewall and are accessible only by authorized person.
How Are Audit Reports & Logs Stored?
Log are stored on disk (brut or via DB) for 10 years but archived every 48h.
Log are stored on disk (brut or via DB) for 10 years but archived every 48h.
What Third-Party Providers Do You Currently Have A “Standard” Interface With?
We have most all the usual suspects (Tier1 banks) (Tiers 1 software providers) (Tiers 1 exchange)
We have most all the usual suspects (Tier1 banks) (Tiers 1 software providers) (Tiers 1 exchange)
What APIs Does TNA Support?
Terranoha provides JSON and FIX protocol.
Terranoha provides JSON and FIX protocol.
Do You Support Custom Interfaces?
Yes, Terranoha does. This is the goal of our plugin service.
Yes, Terranoha does. This is the goal of our plugin service.
Does Your Solution Allow Outside Authentication Mechanism?
Yes. The Terranoha service is integrated with MS LDAP or AD and ADFS.
Yes. The Terranoha service is integrated with MS LDAP or AD and ADFS.
Can Users’ Permissions Be Verified Using Custom Active Directory Groups And/Or Attributes?
Terranoha is capable to make a verification of custom access permissions only.
Terranoha is capable to make a verification of custom access permissions only.
What Is The Architecture/Tools/Process We Would Need To Follow To Complete To Interface To A Third-Party System Which You Do Not Have A Standard Interface For
In this case Terranoha will request ROE + UAT to implement its TNA Plugin service.
In this case Terranoha will request ROE + UAT to implement its TNA Plugin service.
What Is The Process To Access The Database For Data Query/Extraction?
It is not possible to access any kind of data stored in the database directly, but it is possible to access it through public API only.
It is not possible to access any kind of data stored in the database directly, but it is possible to access it through public API only.
Is It Possible To Perform Single Sign-On Authentication With Client’ S Active Directory?
Yes. The Terranoha service can perform SSO with both Azure and on-premise AD via msal4j library.
Yes. The Terranoha service can perform SSO with both Azure and on-premise AD via msal4j library.