Fujitsu World Tour 2016

Similar documents
Ultra-Mobile Meets Ultra Secure

The Future Workspace is Now

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Healthcare mobility: selecting the right device for better patient care

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

SECURE OFFICE OF THE FUTURE

Security Solutions for Mobile Users in the Workplace

Put Identity at the Heart of Security

Sales Presentation Case 2018 Dell EMC

Is your business future ready?

Is your business future ready?

Enterprise Mobility Management

IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now

Smart+Connected Campus

The Little Fuchsia Book of HPE Data Center Solutions

Gaining Business Value from IoT

INDIA The Changing Face of the Workplace: Going Light and Mobile

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

Social Value Creation via IoT

Cisco Borderless Networks Value Proposition

Windows 10 IoT Overview. Microsoft Corporation

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

DELL EMC VDI Complete Solutions: Accelerate your IT Transformation

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB

The security challenge in a mobile world

S+CC / City Digitization. Anne Froble -Smart Connected +Communities

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Consumer Opinions and Habits A XIRRUS STUDY

Five Reasons It s Time For Secure Single Sign-On

Enterprise Redefined, Mobility Your Way

O&M Service for Sustainable Social Infrastructure

Securing Digital Transformation

Cybersecurity. Securely enabling transformation and change

Be prepared for future

Mobile Security / Mobile Payments

EMERGING TRENDS AROUND AUTHENTICATION

Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R

Overview of PBI-blockchain cooperation technology

WHITEPAPER. How to secure your Post-perimeter world

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Solution. Imagine... a New World of Authentication.

Cyber Security in a Connected World The Evolution of the Network and Security Considerations

Consumerization of IT & New Client Line-Up. Lisa Holmes Field Marketing Manager Client Solutions

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

Securing Today s Mobile Workforce

Remote employee. / future ready / Remote employee

Inspiring the world of healthcare. Intel Inside. Powerful Productivity Outside. Powered by Intel Core i7 vpro processor.

Streamline IT with Secure Remote Connection and Password Management

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Fujitsu Technology and Service Vision

How I Learned to Stop Worrying and Love the Internet of Things

The Internet of Things

HP Printing and Personal Systems

Mobile Security using IBM Endpoint Manager Mobile Device Management

ips.insight.com/healthcare Identifying mobile security challenges in healthcare

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

Virtual Client Computing Hype or Hope? Gernot Fels Fujitsu Technology Solutions Product Marketing

ENABLING STRUCTURED TRANSFORMATION

Il nuovo Spazio Collaborativo

Lookout's cybersecurity predictions

Digitalization of Manufacturing

Data Sheet Fujitsu STYLISTIC Q775

Digital transformation in the Networked Society. Milena Matic Strategy, Marketing & Communications June 2016

Unleashing the potential of 5G. Guillaume Mascot Head of Government Relations APJ

Cisco Enterprise Agreement

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

CIO Forum Maximize the value of IT in today s economy

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

5 Pillars of API. management

The World is Your Workplace

5G networks use-cases in 4G networks

Do Rugged Tablets Really Cost More Than Any Other Mobile PC Option?

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Total Threat Protection. Whitepaper

The Future of Network Infrastructure & Management

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Crash course in Azure Active Directory

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS

Dimension Data TaaS Delivering Telecommunication As A Service Outcomes. accelerate your ambition 1

Prepared for: June 18, 2014

The World is Your Workplace

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

How Identity as a Service Makes UCaaS/SaaS Integrations More Scalable, Productive, and Secure

BlackBerry to Acquire Cylance

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

SUBMARINE CABLE DEVELOPMENTS. Karthik Kailasam Jan 16, 2017; PTC Hawaii

Five things you need to know when building your digital future. William Morrish GM Product Sales

Using Biometric Authentication to Elevate Enterprise Security

Integrated Access Management Solutions. Access Televentures

Position Title: IT Security Specialist

Transcription:

Fujitsu World Tour 2016 Human Centric Innovation in Action Utrecht 13 June 2016 0 Copyright 2016 FUJITSU

Mobilizing the Enterprise One size does not fit all powered by 1 Copyright 2016 FUJITSU

Speaker Ronald Bottenberg Consultant Client Computing Devices 2 Copyright 2016 FUJITSU

Mind Shift to a New Mobile Paradigm 50% of apps benefit from mobilization 72% of workers use at least one personal device for work 4.5 Billion personal clients on the network Innovative knowledge workers will use 3-5 devices by 2016 651 Million tablets used by 2017 Today s workforce is split 50/50 between fixed and multi-location users 49% of anytime, anywhere workers, work from 3 or more locations 4.2 hours/day average time users interact with their mobile devices (tablet, phone, notebook) Sources: Dimensiondata, Forrester, Gartner 3 Copyright 2016 FUJITSU

...Mobilizing the Enterprise? 4 Copyright 2016 FUJITSU

The Social-Work-Management Dilemma 5 Copyright 2016 FUJITSU

Mega-trends changing the way we live & work Internet of Things Apps Augmented Reality Cloud Hyper-Connectivity TECHNOLOGY SOCIETY DEMOGRAPHICS Bio-Security New Ecology Globalization Growing Population Silver Society Health Sustainability Ageing Population Urbanization Individualization Work-Life Balance Entrepreneurship User-centric IT Generation Y Living architectures 6 Copyright 2016 FUJITSU

The Internet of Things 2003 2015 7 Copyright 2016 FUJITSU

Digital Revolution Implications on Work Hyperconnectivity and IoT are emerging Digital transformation of services, products, processes and things Remote health monitoring Clinical care Personal wellbeing Digital signage Optimized/ personalized promotions Maintenance and field service Manufacturing operation Production asset management Traffic Monitoring Freight Monitoring Fleet Management Vehicle Security Smart Banking Talk Transfers Intelligent Personal Budgeting Self Pays (with NFC) Healthcare Retail Manufacturing Transportation Banking 8 Copyright 2016 FUJITSU

Growing Consumerization Over the last years user IT added more to productivity than corporate IT 1980 2010: Corporate IT driving innovation You do it our way 2010 2015: Users driving innovation No, I don t From 2016: Let s cooperate 79% of CIO s say personal devices increased productivity 23% of business data is stored in consumer cloud 9 Copyright 2016 FUJITSU

Why Companies Mobilize Design mobile apps that take greater advantage of native device capabilities Enhance existing products/services or revenue streams enabled or enhanced by mobile access Create new customer channels and enhance customer interactions Redefine business processes by allowing mobile access to information Lower cost of customer acquisition Enhance existing products with mobile capabilities ROI 84% of companies increased productivity through mobility 79% of companies achieved measurable mobility ROI 75% of companies generated new revenue through mobility Source: IDG Connect for Unisys 10 Copyright 2016 FUJITSU

Mobility Needs E M P L O Y E E B U S I N E S S I T L E A D E R S work-life-integration Experience and Cool ID Easy sharing and collaboration Sleek and thin, plus new concepts Latest technology Individualized Hard- and Software Employee satisfaction Attract talent Empower greater productivity Optimal collaboration of virtual teams Enable work-life-integration Data security and privacy Compliance and Governance Support new OS, form factors, concepts and technologies Easy deployment and management Reliability Long stability and global availability Mobility is about delivering high quality, productive experiences, at any time and in any location. 11 Copyright 2016 FUJITSU

Fujitsu s Approach to Human-Centric Mobile IT DEVICES AND EXPERIENCES USERS LIKE ENTERPRISE GRADE FEATURES BUSINESSES REQUIRE 12 Copyright 2016 FUJITSU

New dimensions of security risks through mobile ICT usage Chongqing's 'mobile lane source: Huffington Post 13 Copyright 2016 FUJITSU

Security in the digital age Helping hackers hit the jackpot 61% 12% 50% 39% of all malicious cyber attacks are the result of negligence including password theft $3.79 million Average cost of a security breach to a large organization Reuse password across different sites Of people believe their passwords are very secure Of desk-workers use their personal devices for business purposes... $200k Annual cost of difficulties logging on for a 500-person company 111 15 Number of passwords the average person has to remember. 60% cannotremember all their passwords Refuse to use any kind of security mechanism on those devices Have shared their password with their spouse... 10% with a friend Write their passwords down 1 in 3 26% 42% 14 Copyright 2016 FUJITSU

Practicality Precision of biometric authentication High Face recognition Signature Voice recognition Palm veins Iris/retina Finger vein Fingerprint False acceptance rate (FAR) & false rejection rate (FRR) compared Authentication Method FAR (%) FRR (%) Face recognition ~ 1.3 ~ 2.6 Voice pattern recognition ~ 0.01 ~ 0.3 Fingerprint recognition ~ 0.001 ~ 0.1 Finger vein recognition ~ 0.0001 ~ 0.01 Iris/retina recognition ~ 0.0001 ~ 0.01 Fujitsu palm vein recognition ~0.00001 ~ 0.01 Low Low Precision High Fujitsu s palm vein scanner is the most precise and practical technology. 15 Copyright 2016 FUJITSU

Manageability of the mobilized devices Availability of Windows 10 drivers via DeskUpdate / DeskUpdate Manager 16 Copyright 2016 FUJITSU

Assembly Pre-Staging Roll out Customer F39 HWInfo AVD Server HWInfo AVD Client Assembly line Production Shop Floor System DeskView Load Web Service Infrastructure Pre-staging engine (feeding HW data to EMS Domain Server Customer network hosted on Fujitsu premise VPN Tunnel Incubation Area(s) Software Roll-out Local Depot Server Enterprise Management Server 17 Copyright 2016 FUJITSU

User Profile Based Device Options Optimized for battery life Optimized for performance Stand up computing Content creation RUGGED TABLET TABLET 2 in 1 Devices & ULTRABOOK Clamshell Notebook and ULTRABOOK Offering all range of devices Outstanding Experiences Across all Mobility Use Cases 18 Copyright 2016 FUJITSU

Fujitsu s Family Concept The Enabler of Fast and Easy Deployments LIFEBOOK E5 Series LIFEBOOK E7 Series LIFEBOOK E546 LIFEBOOK E736 LIFEBOOK E556 LIFEBOOK E746 LIFEBOOK E756 :: EACH FAMILY :: Same BIOS, Bit Image, components :: SAVE TIME & SIMPLIFY :: Evaluate ONE, deploy various :: MANAGEABILITY & SECURITY :: Full set of security and remote management capabilities :: FLEXIBLE CHOICE :: Users choose their preferred form factor Fujitsu Family Concept TCO reduction built-in 19 Copyright 2016 FUJITSU

Fujitsu s 2 in 1 Devices As Individual as You Are Tablet Capabilities STYLISTIC R726 STYLISTIC Q555 STYLISTIC Q616 STYLISTIC Q736 Notebook Capabilities LIFEBOOK T936 LIFEBOOK T726 The most important mobile device category! :: FLEXIBILITY:: Convenience of two devices in one :: SECURITY:: Hardware-embedded security :: MANAGEABILITY:: Manage one device per user, not two :: SOFTWARE:: Single instances of a software per user 20 Copyright 2016 FUJITSU

Fujitsu s STYLISTIC R726 STYLISTIC R726 Business Tablet, Business Notebook, One Device 2 in 1 designed for multi-mode working Integrated Tablet Stand, slim Magnetic Keyboard, durable material, anti-glare display option Next-gen. enterprise-grade security, manageability and connectivity, service-friendly 21 Copyright 2016 FUJITSU

Fujitsu s STYLISTIC Q Family STYLISTIC Q555 2 in 1 for best mobility combined with enterprise security STYLISTIC Q616 2 in 1 with enhanced Ultrabook performance and larger display STYLISTIC Q736 2 in 1 with full performance and largest screen real estate 2 in 1 Design Common Cradle and Design Anti-Glare Display, service-ability, enterprise-grade securtiy, manageability and connectivity 22 Copyright 2016 FUJITSU

Fujitsu Innovations for the Future Workplace Smart meeting room solution Fujitsu Room UI Technology Eye tracking device Head Mount Display Fujitsu PalmSecure solutions Shared Clean Desk solutions 23 Copyright 2016 FUJITSU

So, is it all mobilized and virtual now? 55% of the interpretation of what we say is based on facial expressions 38% is in how the words are said 7% comes from the actual words spoken 24 Copyright 2016 FUJITSU

25 Copyright 2016 FUJITSU