Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Security as an Important Contributor to Business Success

1 337 vues

Publié le

Speakers:

Mr. Thomas Bengs (Fujitsu International Business)

Publié dans : Technologie
  • Soyez le premier à commenter

Security as an Important Contributor to Business Success

  1. 1. 0 Copyright 2014 FUJITSU Human Centric Innovation Fujitsu Forum2014 ICM Munich19th –20th November
  2. 2. 1 Copyright 2014 FUJITSU Security as an Important Contributor to Business Success Thomas Bengs Head ofSecurity SolutionsFujitsu Global Delivery
  3. 3. 2 Copyright 2014 FUJITSU Copyright 2014 FUJITSU AHyperconnected World An emerging new world where people, information, things and infrastructure are connected via networks, transforming work and life everywhere Data is the most important part of ICT and has the highest value Information is leaving secured data centers 2
  4. 4. 3 Copyright 2014 FUJITSU Copyright 2014 FUJITSU LIMITED FUJITSU CONFIDENTIAL Internet of Things&BigData IoT & big data bring huge growth potential to the global economy We also face serious challenges of security and privacy Copyright 2014 FUJITSU 201310billion 202050+billion 3.6TB/h 20TB/h 100GB -A self-driving car -A jet engine in the air -An individual genome Things connected to the internet 3
  5. 5. 4 Copyright 2014 FUJITSU The workplace environment is changing Past: Working in secured buildings with dedicated workplaces and set times Today & Future: Working at your own terms, anywhere, at any time
  6. 6. 5 Copyright 2014 FUJITSU What does it mean and what is the impact ? (Critical) data are leaving companies The data center is mostly a mobile device Poor protection versus data centers Mostly only an (un)actual virus scanner is standard Data become values and are handled for money, e.g. Social data Accounts with password Credit data Data are easily available In Pbytemore data are available ousideas inside a company –„big-data-mobility“ Data centers are highly protected e.g. access, monitoring, damage, data loss Dealing of data earns more money as with IT equipment e.g. Social Networks E-Commerce Finance / Retail Services Every organization deals with huge datavolume
  7. 7. 6 Copyright 2014 FUJITSU Definition of IT Security :: CONFIDENTIALITY :: Confidential information has to be protected against unauthorized distribution & usage :: AVAILABILITY :: The user must have access to IT services, to IT infor- mationand to functions of the IT system at any time :: DATA CONSISTENCY :: All data has to be provided in full and unaltered
  8. 8. 7 Copyright 2014 FUJITSU Information Security Market Forecast 2013 -2017 8.3% Security Services* Network Security Equipment Infrastructure Protection Identity and Access Management 2017 83.6 52.7 (63%) 10.9 (13%) 16.1 (19%) 3.9 (5%) 2016 77.2 48.1 (62%) 10.3 (13%) 15.2 (20%) 3.6 (5%) 2015 71.3 43.9 (62%) 9.7 (14%) 14.3 (20%) 3.3 (5%) 2014 65.8 40.2 (61%) 9.1 (14%) 13.4 (20%) 3.1 (5%) 2013 60.8 36.9 (61%) 8.6 (14%) 12.6 (21%) 2.8 (5%) +9.3% +6.3% +6.4% +8.2% Worldwide Enterprise Information Security Market Forecast (in B US$) Regional Distribution - Enterprise Information Security Market (based on US$) 31,5% 31,1% 30,8% 30,5% 45,8% 45,9% 45,9% 45,9% 45,9% 16,4% 16,2% 16,2% 16,0% 15,9% 6,2% 6,5% 6,9% 7,3% 7,7% 31,6% 2013 2014 100% Emerging A/P (incl. Greater China) EMEA Americas Mature A/P (incl. Japan) 2015 2016 2017 +7.3% +14.6% +8.3% +7.4% Source: Gartner Forecast: Information Security, Worldwide, 2012-2018, 2Q14 Update, Ruggero Contu, Christian Canales and Lawrence Pingree - 08/2014 ; charts created by Fujitsu based on the Gartner report  Global Enterprise Information Security market will reach ~84 B US$ by 2017 growing by 8.3% per year; Americas reflect 46% portion - EMEA & mature A/P are growing below avg. * includes: Consulting, Implementation, Hard-ware Support & IT Outsourcing x% …Compound Annual Growth Rate 2013-2017
  9. 9. 8 Copyright 2014 FUJITSU FUJITSU Security Initiative
  10. 10. 9 Copyright 2014 FUJITSU Solving today´s IAM topics with PalmSecurebased solutions Current situation: -Increased ID frauds globally Customer pain points: -Stolen & misused personal identities causingslower processes & increased costs & causingnon satisfied customers & employees This will happen in the market: -Investing in high secured “easy to handle” professional IAM solutions / services What Fujitsu is offering: End to End security solutions & servicesbased on Palm Vein biometric authenticationtechnology From To Password log in / SSO PalmSecure log in / SSO Access with key/card PalmSecure Physical access control Using Pin & Card Using PalmSecure & TOC
  11. 11. 10 © FUJITSU LIMITED 2014 PalmSecureIAM areas ATMs Building Security Work Place Protection Intranet Mobile Payment SAP Applications Online Banking Datacenter Security Secured DMS Network-/DataSecurity 60.000 ATMs with PalmSecure 70M Users 100.000 Work Places with PalmSecure 120K Users 300K Locations with PalmSecure ??? Users 10.000 with PalmSecure WS & UB& Tabs 10.000 PACs/TAswith PalmSecure 15M Users NEW! 250K Work Places with PalmSecure250K Users NEW! NEW! 120 PACs/DT with PalmSecure 12K Users Ca. 200 Million Users Globally!
  12. 12. 11 © FUJITSU LIMITED 2014 Workplace Protect Single application for all security relevant settings Protects workplace devices against unauthorized usage Automatically locks workplace devices, when user leaves his/her desk Supports a wide range of security devices Comes pre-installed on Fujitsu Client Computing Devices Free of charge for Fujitsu Client Computing Devices AuthenticationMethod FAR (%) = IfFRR (%) = Face recognition ~ 1.3 ~ 2.6 Voice pattern ~ 0.01 ~ 0.3 Fingerprint ~ 0.001 ~ 0.1 Fingervein ~ 0.0001 ~ 0.01 Iris/Retina ~ 0.0001 ~ 0.01 Fujitsu Palmvein < 0.00008 ~ 0.01
  13. 13. 12 © FUJITSU LIMITED 2014 PalmSecuretruedentity Personalization Client (PC or VM) Infrastructure Server (PC or VM) Checkpoint (PC) Personalization- application Truedentity-client Browser Registration Service Access Management Personalization Service Registration Service (Admin WebUI) eID Service Checkpoint Login Service + Access Management vein scanner card reader Checkpoint application Truedentity client vein scanner card reader display ready card network (IP) IP3 IP1 IP2 Connection over internet with 3 VPN tunnels Certificate user (smart card and PalmSecure) and application on eIDserver No silo application Secured channel / data / authentication display keyboard mouse
  14. 14. 13 © FUJITSU LIMITED 2014 PalmSecure bioLock for SAP Fraud prevention Data control Process logging Individually secured processes Controlled authorized financial transactions User requests SAP activity. e.g. Log-on, SE16data Browser, Customer Service activity bioLock prompts user for biometric scan Sample biometric template extracted, encrypted, compared with referencetemplate in bioLock/SAP Activity logged Action Allowed Action Denied
  15. 15. 14 © FUJITSU LIMITED 2014 PalmSecureID Match Cutting Edge Technology Ultimate Convenience Maximum Security Independent Functionality Stylish, Hygienic Design Prepared for Multiple Applications
  16. 16. 15 Copyright 2014 FUJITSU PalmSecureUltrabook U904 Hardware World’s first notebooks with integrated sensor FUJITSU Notebook LIFEBOOK U904 Ultrabook™ FUJITSU Workstation CELSIUS H730 PalmSecureMouse Login Kit and PalmSecureSensor Guide Kit Software Security made easy with Fujitsu’s software solutions Workplace Protect Supporting configuration of windows authentication, pre-boot authentication, single-sign-on, password safe and encrypted container Workplace Manager Administrator console for remote management of security settings PALM SECURE
  17. 17. 16 Copyright 2014 FUJITSU Innovative Palm Vein Authentication Advantages High Safety & Permanence Hidden under the skin -forgery difficult Unique even among identical twins Never change -same throughout life Detectable only when blood is flowing High Accuracy Palm vein patterns are highly complex High applicability Designed for public usage Palm veins are insensitive against environment (cold temperature, creamy hands, skin scratches) High Acceptance Very hygienic due to no-contact operation Very easy and intuitive to use Biometric pattern hidden insidethe body (privacy)
  18. 18. 17 Copyright 2014 FUJITSU FUJITSU PalmSecure™ Innovation Contest Dr. Markus Draeger Innovation Program Manager
  19. 19. 18 Copyright 2014 FUJITSU The newDevice –FUJITSU PalmSecure™ ID Match
  20. 20. 19 Copyright 2014 FUJITSU The Contest Challenge What are the application areas for a match-on-device system with FUJITSU PalmSecure™ technology? Which use cases can you imagine in the fields of e.g. government, finance, enterprise, automotive, retail, energy, industry 4.0 or others for this technology? How can the device look like in the different usage scenarios? Where can the FUJITSU PalmSecure™ sensor technology be applied in general?
  21. 21. 20 Copyright 2014 FUJITSU The Contest Great response of the innovator community to the technology and the challenge questions Run time 7 weeks 11326 visitors from 92 countries 414 ideas 925 comments Website with social media functionality provided by HyveAG
  22. 22. 21 Copyright 2014 FUJITSU Winners On November 3rd, the jury awarded prizes to 4 participants (two 3rdprizes) 1. Prize: Integration of PalmSecure into a smart watch(Shmuel Goldfisher) 2. Prize: Use of PalmSecure for assurance of parcel delivery to the correct addressee (Katherine Rushton) 3. Prize: Use of PalmSecure to replace the Bahncard (SuvrajitSaha) Second 3. Prize: Use of PalmSecure in Fleet Management (TizuTiberiu)
  23. 23. 22 Copyright 2014 FUJITSU Thank you for listening!
  24. 24. 23 Copyright 2014 FUJITSU

×