Here are some of the Terranoha Frequently asked questions

What Is Natural Language Processing (NLP)?
Natural processing mimics the way that humans understand language. This is the first step to automate unstructured queries. Read our article on NLP.
Does Terranoha NLP Understand Multiple Languages?
Yes, Terranoha NLP understands multiple language such as German, Greek, Russian, Chinese, Arabic and so on. In real-time, our engine translates texts through our partnerships with data providers.
What Asset Classes Does Terranoha Cover?
By design Terranoha is agnostic and multi-asset. Terranoha routes messages to third-party systems that execute orders, evaluate risk, record trades etc.
What Is Terranoha Pricing Model ?
Terranoha is software vendor with a subscription license fee model. Terranoha strongly believes each client is extremely valuable regardless transaction/volume/transaction usage.

Architecture

What Are The Hosting Options You Propose?
The Terranoha service can be hosted in public or private cloud and is running on the physical hardware in single tenant mode.
How Is History Stored?
All historical data is stored under a database real-time cluster behind a firewall and protected from the direct access by IP security.
Can We Download And/Or Move Data At Any Time?
Terranoha can provide full audit trail around the software via reports or API with additional fees. Besides, we can send reports about infrastructure with additional cost once the customer ‘s needs are defined.
What Is Your Information Security Program To Safeguard Data & Systems Against Cyber Threats?
All sensitive data is secured by firewalls using strict rules and are stored on isolated networks.

All devices are protected by access-lists and filters to prevent unauthorised access.

How Do You Ensure Data Security When Individuals Are Executing Transactions Or Viewing Sensitive Data Remotely Via A Mobile Device?
The Terranoha service has an independent (secondary) authentication procedure that ensures all access right within the application calls apart of the used the third-party software to reach the service.
Can This Be Automatically Enforced Based On The Users’ Profile And Authorization Level?
Yes it can be enforced if security provider rules applied on customer profile.
Is Data-In-Transit Encrypted?
All transit data is encrypted with RSA (2048-bit RSA key) TLS v1.2 minimum.
How Your System Supports Role-Based Access Controls To Ensure People Have The Appropriate Access To Data Based On Primary Organizational Roles?
We have an access right matrix that is applicable by role but that might be customized by attributes. Our model is based on Role-centric RBAC-A security model.
How Do You Secure Those Logs To Prevent Data Tampering & Data Destruction?
The audit reports and logs storage are distributed between multiple types such as database and log files. The database storage protected by the IP security and only authorized person can access it on top of it. The log files are archived automatically on the daily basis and stored in a secured place protected by the authorized access security.
What Are Your Backup Policies & Procedures, Including RTO & RPO Commitments?

  • The database is been replicating Realtime continuously.
  • Technical logs are backup every day.
  • The failover takes over and awake the sleeping server.
  • Our service uses a principle of fallback to check the first IP responding.
  • Restoring time is 15 min.

Do You Provide A 2FA (Two-Factors Authentication) Method?
Yes, we can implement 2FA , by methods provided by your access authorisation provider.
Are Access Logs Maintained By User Identification And What Is Contained On Them?
Yes, they are; the access logs contain the following information on date/time, personalization, source.
What Is Your Security Policy To Ensure Proper Policies And Procedures Are In Place To Protect Data?
We do not store sensible data about clients but Key reference.

Any other kind of information is kept within secure, and password protected storages behind a firewall and are accessible only by authorized person.

How Are Audit Reports & Logs Stored?
Log are stored on disk (brut or via DB) for 10 years but archived every 48h.

Integration/Interfacing

What Third-Party Providers Do You Currently Have A “Standard” Interface With?
We have most all the usual suspects (Tier1 banks) (Tiers 1 software providers) (Tiers 1 exchange)
What APIs Does TNA Support?
Terranoha provides JSON and FIX protocol.
Do You Support Custom Interfaces?
Yes, Terranoha does. This is the goal of our plugin service.
Does Your Solution Allow Outside Authentication Mechanism?
Yes. The Terranoha service is integrated with MS LDAP or AD and ADFS.
Can Users’ Permissions Be Verified Using Custom Active Directory Groups And/Or Attributes?
Terranoha is capable to make a verification of custom access permissions only.
What Is The Architecture/Tools/Process We Would Need To Follow To Complete To Interface To A Third-Party System Which You Do Not Have A Standard Interface For
In this case Terranoha will request ROE + UAT to implement its TNA Plugin service.
What Is The Process To Access The Database For Data Query/Extraction?
It is not possible to access any kind of data stored in the database directly, but it is possible to access it through public API only.
Is It Possible To Perform Single Sign-On Authentication With Client’ S Active Directory?
Yes. The Terranoha service can perform SSO with both Azure and on-premise AD via msal4j library.

Login To Your Account Below

Fill the forms bellow to register

Retrieve your password

Please enter your username or email address to reset your password.