Great. Yeah. Hello everybody. I'm little bit here. The new kid on the block. I'm Jo and I may, maybe is the first time that in managed security service for wider standing on stage. Why I'm the new kid on the block? Because my business unit telecom security was established on the 1st of January this year. And therefore I'm really a pleasure for me and a privilege that we can share today. A little bit of view of DEU telecom, about identities, about cloud. And I have in the first part-time kind of information, how we are securing ourselves and our critical infrastructure. And at the end, I would like to disclose something that we are currently developing regarding identities, really print new, some kind of a P to show and demonstrate you that you're not only speaking about those things, that we have, really those things in our factory up and running.
When we are speaking about security, then for sure you can imagine that do telecom is running a huge security team quite a long time. And we have gathered a lot of experience regarding cyber security in the last 20 years with this, we have protected ourselves and we are really proud about today. We are never preached in this time. This is really good outcome of this, but we have decided now based on the development internationally, that we would like to offer the same high professional tools with which we are protecting ourselves to our external customers as well. Therefore we have now in this new business unit, 1,200 employees compiled out of every area of Dutch telecom. And we are growing up to 1,500 in the next couple of months because we see the demand and the need in the market from our customers. I come to visit a couple of seconds for sure.
We are not only speaking about to sell or reselling resell products. We offer this in a really managed version for our customers out of our highly secure security operations and us with really comprehensive portfolio. This is a story here behind. And if you look onto this portfolio, the new Z that we have more or less everybody on board, which is working in the security area, all the most innovative products, all the most innovative vendors are with storage telecom, but there a good thing on the one end side that they, we have all of them. But on the other side, we have a little bit of problem that all our customers are faced with the complexity, which is here on this picture, all the in, because you see our portfolio is clustered into different categories like ICT network security, which is for sure the main pillar of our story, because it's a typical DNA of Dutch telecom and telecommunication company.
And therefore we are starting from this all the, with mobile security, with endpoint security, but also data security, application security, industrial system security, a new part of our story. And for sure, although the ID security and the complexity, which a customer has to manage, this is a problem because they are all have not enough time, not enough resources anymore to follow all the different developments in the market. Therefore it's needed to have trust wealthy partners on the, on the side of the customer. And we as such Silicon, we would like to be such kind of a partner, this story here, from our perspective, it's very clear that when we are speaking about and trustful partnership with our customers, then we are speaking all the about hosted security out of the highly secure data centers in the cloud. In Germany, we have our Dutch telecom cloud, the telecom cloud.
I think it's very popular here in Germany and a lot of social service, which you are seeing here, which are not running on-prem with our customers are hosted in our telecom cloud. This is very important is one part of the story, how we present this to our customers. And we are really proud about today that we are, have not started only on the first of generations this year, because in our perspective of a managed security service provider, we have developed quite a lot of projects in the last couple of years already. And you know, when it comes to the discussion with our customers, willing to be presented as, and reference on stage every time I little bit critical, but therefore I've used some kind of pictures that you see what you're already doing. There's really huge army in Europe, which is using our, our system, which we have developed for their private key infrastructure to exchange certificates with all their jets before they are allowed to take off.
Then we are part of more than 150 million passports with special pretended secure ID card, which is part of those ID cards. And also more than one than 50 million times. And we are also part of the German health ID card with more than 260 million pieces, as you can see here. And then there are the big German car manufacturer, which has implemented 15 certificates in each of his cars. And that means without those certificates and the exchange with our trust center, you have no chance to stop engine. There's also part of the operation which we are doing. And the line below you see that a lot of managed security services regarding firewall management regarding inclusion prevention system management is also done by us for our customers and the different sectors here on the industry. As you can see on the pictures, well, if you go to the next page, then you see some kind of figures and the good stuff is that here on this conference.
And I like it very much, all the messages are more or less the same, maybe the figures a little bit different from the exec values perspective, but from the, from the direction from the storytelling, it's all the same. And please imagine what, what, what will happen. Those are figure of 2020 United nation has calculated that in 2020, we will have around about 7.7 billion human beings in the world. And Cisco did it at the same time, calculated, okay, we will have 50 billion connected devices. That means we are living already in a world in which a small piece of an of a device is already more or less a supercomputer. You have it sometimes in your smartphone, you have it sometimes in your IOT devices, in your refrigerator, in your heating system or wherever. And therefore we, they, okay. We are living in a world in which we have created a world in which everything is connected to everything connectivity, but you know, digitization without security is a no go.
And therefore my clear message is we, we need with everything connectivity also and everything security. This is a story from which we are coming from. What's our message that we are telling to our customers. And if you look a little bit into those figures into, then you see that it's the reality fiber attacks are real and increasing and take only two figures out of this slide. 93% of all corporate customers and large enterprises, although with large mid-market customers within Germany, 93% of them, they are attacked in the last year and the damage for the German economy alone, 51 billion Euro in Europe around about 200 billion in worldwide approach around about 450 billion. This is the situation in which we're living in and now it comes to George telecom. And I share here with you really freaks, which are happening every working day. This are, these are figures about the 24 hours approach of Dodge telecom.
We are attacked every day, 4 million times though, how we can convey though, exactly because we are running a really comprehensive system of honeypots run about 1000, 200 physically with a virtualization of four, up to five each on those systems. And therefore we are running this and simulate a little bit smartphones, PC data centers, whatever you want to yeah. Create an imagination of those telecom outside in the world. And we are running those honey puts worldwide and why we are doing this because we would like to understand what kind of behavior of the he are showing what kind of new hacking methodologies they are using. And the likelihood that they are reaching out to physical Dutch tele is only 1000. As you can see here in 999 cases, they will come to an copy of us, of ourselves. And we are using this intelligence machine learning based for sure to strengthen our existing systems in a manner that we can run such kind of technology really better and better for ourselves.
And also for our customers. That means per working day, we have 1 billion security events out of 3000 data sources that we have to manage from our perspective, with all our machine learning, with all our site intelligence, which is here part of the game. And this leads us at the end to maybe one of the world largest yeah. Use case libraries, site intelligence, mobile libraries, in which we have ware zero day exploits, viruses, whatever in not only this one, but is already popular in the market. Also some kind of things that we have created by ourselves. Why, because we are checking with such kind of technology, all the new tools, which are coming from our vendors versus they really able to detect such kind of threat such kind of vulnerabilities. This is a very important asset, which our customers are getting when they are going into a partnership with a managed security service provider like us.
If you are speaking about the new kind of threats, then I think all of those things already mentioned here today. Therefore, I wouldn't go too much deeply into, but I think that only one thing that I would like to put as an umbrella above such kind of a story here, because is not the story of an pesky virus anymore on a heart or whatever, when it comes tot security, when it comes to protection of an nuclear power plant or whatever, then we are speaking with cyber security in a case of life and death. This is a problem that we have here. And therefore it's so problematic for us. The cyber security on the one hand side is not only cyber security as such. This is also especially how we can protect our IDs, especially the privileged IDs, because when a custom, whenever Aner is trying to, to steal some kind of data, why he should look around for all the different datas, if he could crack the idea as such, then he get access to everything.
And if, if this is a privileged ID, then you can imagine, then it's really a big problem. And therefore we have to be protected here. This one was also a little bit tapped in the, during the discussion today, we are seeing roundabout 208 days as average number of days until an a P T threat is really detected. And this is a problem because you're, you're sleeping maybe already a little bit and say, Hey, everything is fine. Nothing has happened. And you don't know that in your systems, somebody is already in and have cracked all the technology may be and will get some kind of access in the future from now. Therefore we are not only speaking about a managed security service provider approach. We are speaking also about a managed security identity provider approach, which we would like to take care from a trusted identity perspective, for sure this is our objective, our target.
And therefore we have started with our new business unit, for sure, the launch of some kind of product. And you know, all of those partners we have created here, identity protect, pull together with fork. We have the, the, the privileged identity protect pole together with cyber arc for the human beings. But this is not all because we have to have on the, the other side, there's a puberty for IOT systems as well. And therefore, we, we are very happy that we have launched here on the OMA as industry a couple of weeks ago, like have to say a couple of days ago, industrial side, protect power with our partners S out of, and some kind of privilege, identity protect power with cyber once Morgan especi, especially for industrial control system security. When it comes to a secure remote access to remote control for machines, then we have in special ion in our portfolio, which is named industrial access, protect, powered by the German company OA, which is also located here next to Munich.
This we have, this is a good story. Now we are coming a little bit into the perspective for the future new Z, once more again, here, my, my theme, we have to come to a situation in which everybody is speaking about the trusted identity, the trusted everything identity for the future, from a customer perspective. And therefore, I would like to take you now a little bit onto a journey with me for the remaining minutes and they, okay. What could it be? Especially when it comes to the discussion, not only for large enterprise customers, also for the SMB market also for consumer market. And therefore, I would like to show you something, what we have developed with Dutch telecom coming from this understanding regarded and regarding trusted the Gilbert are trusted identity approach. And for sure, the trusted idea is the center of the heart here and around this, you can cluster a lot of use cases, single sign on you have a digital evidence.
You have maybe a digital post box. You have a digital key ring. I think this is from a, from a, from a, a customer use case perspective. Very easy. The question is how we can bring this into life in such an easy manner that it's really reducing the complexity in front of a customer. This was a task. And therefore we have started a little bit an approach of development, which we have done by ourselves based on our experiences that we have in our tasks and internally. And this is consisting of three dedicated pillars. First of all, the ID modules, the trust, the trusted ID as such, and you view it already here, and this is horizontal layout. There are some special API to give access, not only to ourselves, to our partners, also to other partners, because this should be really open ecosystem, SDK based.
And in which everybody can use such kind of an API, but besides trusted ID, we have added something special because you will see this later on why we did this, because our understanding is when we are speaking about an ID and secure ID, then you have to have the right technology and the background, and we are running this in a special tokenization and a special certification in our trust center. Therefore, we come to this, what does it mean in a couple of seconds? And there is a third pillar, and this is the special secure communication. I will show you third use case on which you can see that you have a way forward to use and really secure ID also to have, and really legally binding communication via a normal regular email. This is possible. This is a use case why we would like to present this here.
What is possible on the use case side? You see here, maybe the, the first two things I will explain later, digital evidence, only a little bit in understanding what's behind this. You know, when in Germany you have an accident on a, on a highway, then you have every times a problem that no police is coming out and is trying to, to capture what has happened. If you could have some kind of really digital evidence with an certificated photo or whatever, certificated from both sides, from both parties, and you have a chance really to manage everything in front of the insurance, which is needed later on, this is the idea which is standing here behind.
I think when we have thought about this new version, this new product, we have started thinking only from the mobile perspective, because you know this from the strategy from a lot of big players as well, mobile first, and therefore, for sure it has to run on the mobile phone, on your smartphone, but all the attributes, all the IDs have to be stored highly secure in the cloud. This is exactly what we have realized. And how does it work? You can see a little bit here. We have created an framework application and multi app application, like an umbrella, which you can put some kind of apps into, or you can run those apps also outside as isolated app on your smartphone. But every time this app will communicate and will be interlinked to the IDM management, which is managed by the central app, which we have named digital transaction and identity manager.
This is a working title. It's not to official product name at the end. As I said, this is a proof of concept, which is already running. And we would like to go public really into the market, into for the customers in the autumn offices year already. But that you have a little bit of understanding digital transaction and identity manager. Everything is coming from the trusted, secure identity. And then we manage a lot of use cases for the customer in this open version versus API based platform. As I said, if you look a little bit onto the, onto the layers here, then you see a lot of those technologies, which we have heard here during the day already. And I'm very happy and you see that we are really have used everything, but is very, is really a state of the art. I'm not speaking about TLS and then proof key.
I think this is very clear, but we are, have used already open identification, 2.0 open ID connect. 1.0, especially enrollment over secure transport is T protocol is also part of the game with all the certificates based on the X 5 0 9 as well. And this is the inter working. That means all the security is not managed on the phone, not on the smartphone, it's managed in the backend in your cloud. And as you can see here, this is especially the slide for the nerds. The time when it comes to the certification to the certificates at the end, that you can manage some kind of a trust digital payment or whatever. This is really at the end in between you have only tokens and all of those tokens, they have only a temporary validity, valid, valid, TT. Sorry though, that that means we have the highest level of security, because if somebody is trying to crack the phone, you have no chance to come to the ID datas.
They are still safe in your ID database within the trust center. This is a story here around, and by the way, you see it above, it's only working. If you have a special, I can go back, maybe only working if the app as such, which you are downloading from the app store, from the Google store, it has already is already equipped with an initial access token. Otherwise you have no chance to start this kind of communication with ID management is this part of the story on which we have worked. And to give you a little bit of flavor about what does it mean I have bought in video with me. And I would like to explain this a little bit, because this is only in German, sorry for English speaking guys, for sure we have at the beginning to, to start and create an account, but this is accounted at the beginning, accepting the terms and condition only more or less an empty one.
Then you're going into your profile into what you're doing now is the following. You can now import datas because you see, there are still a lot of areas empty here. You have no bank account, you have no validation about your ID card. What you can do. Now, you can import now all your datas, which you have already stored, maybe in telecom log in within our landline, within our mobile network. And then in the first step, you can take over all those informations into this ID management database, but you have still the problem that there is no bank account, what we are doing here and are very happy to announce this, that we have realized this together with Postbank, one of the biggest German retail banks that you can take over based on your account, there all there bank accounts, the bank account information, which is already validated and certified by the post bank, into this account as well.
That means you have now and more and more getting comprehensive profile regarding your own situation, but you're doing at the end. And you had seen already in between a little bit, I don't know whether you had seen this here. Really. We are doing some kind of a video ID as well. That means you are showing your personal ID card into an, the camera. You have a video chat with the notary server on our site, and we have at the end and really fully certificate profile about your ID, not on your smartphone in the trust center, that's all managed within the environment of your mobile phone. This is a story here with SIS high, highly secure ID. You can manage now a lot of use case, a lot of things on which you can, can, can work on. First of all, to mention those, those things only, there's a good story about payment because you know, the biggest problem on payment is that you have every time, the credit card parties in between and all the banks, they are hating the credit cards because they're taking money out of their value chain.
And therefore they would like to have some kind of realization of trust digital payment. This one is already realized as well. And this proof of concept, if somebody would like to see it, let's come to us and look into this closer. And I think only a last sentence about the last use case. There are something that we have forgotten and this, everything is getting digitized, but theres something that you have never thought about. And this is exactly your post box. Have you ever thought about how you can digitize your post book and really in a manner on which you havet really digital, legally binding communication, that's really printed and you have have it at the end, highly secure and encrypted in your email in,
I think that's a good point to intercept and to invite the people here in the crowd to come up to your booth and let explain the digital post.
Give me only one second to explain how does it work?
Okay. One second is over. Yeah,
Because the question, the question, the question is a very, the question is a very easy one, how it could work, that you can bring the post address and the email address really together. And this one is also a part of the story regarding ID management. If you can combine those things in your database and you have a really translation about, okay, theres an postal address, and there's an email address, and you can print a print stream, which is created in your CRM system, you have nothing to change. You can bring this print stream into your print center into, then you decide, okay, is there on Z digital existing? If no, then you delivered the physical post box and the classical post box. If there AST zero digital in, then you have a chance to create first time a digital home address, a digital post box in which you can, which you can manage in your application really on your smartphone. This is the future of a secure identity, much for
Attention. Thank you very much. So with this being said, I would like to introduce our panelists for the panel coming.