0 copy Copyright 2017 FUJITSU
FujitsuForum2017
FujitsuForum
1 copy Copyright 2017 FUJITSU
BIOMETRICS ndash digitital identification for a secure future
Thomas Bengs
Director amp Head of Biometrics EMEIA
Fujitsu Enterprise amp Cybersecurity EMEIA
2 copy Copyright 2017 FUJITSU
Key threats caused by identity fraud
Terrorist attacks
Misuse of social media
Financial transactions fraud
IP theft
Enterprise data theftmanipulation
Cyber attacks
It takes 20 years to build a reputation andfive minutes to ruin it
Warren Buffet
50 of organizations suffered a data breach in 2016
Cisco annual Cybersecurity report 2017 2016 Ponemon Cost of Data Breach Study
3 copy Copyright 2017 FUJITSU
Why the hype about biometric authentication
Cloud computing and extra ordinarygrowth of smart mobile devices hasmade secure identity authentication
absolutely necessary
4 copy Copyright 2017 FUJITSU
Biometric authentication is the right decision
Risk of Fraud Ownership Knowledge Biometrics
To be transferred Yes Yes No
To be stolen Yes Yes No
To be forgotten Yes Yes No
To be copied Yes Yes No
To be lost Yes Yes No
To be altered Yes Yes No
Keys Password Vein
Tokens Pin Iris
Smart Cards Selfie Fingerprint
Face
Voice
Key stroke
Known methods
Possible authentication methods Precision of Biometrics
Biometrics is the preferred method for processes that require authentication
5 copy Copyright 2017 FUJITSU
Fujitsulsquos Commitment to Biometrics
Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)
Biometrics experts involved in National and International Standards development from a number of countries
Proven experience across domains and geographic regions
Capabilities to deliver the right solution for each customer
Consulting
Solution design development implementation
Systems Integration
Hosting and cloud services
Products
Digital co-creation
IDaaS solution amp services NEW PalmSecure FPRO Sensor
6 copy Copyright 2017 FUJITSU
Biometric authentication - key facts
Market Size amp Trends amp Key Markets Biometrics Business Elements
Drivers Biometrics Key Applications
Total global market size is predicted to be US$ 30 Billion in 2022
1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition
1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector
By 2021 50 of online transactions will use biometrics (IDC 2017)
Disruptive fault lines Security privacy and regulation
Connected conflict Convergence of technology and privacy
Talent crunch Global demand for digital workers
Shifting economics Data as digital capital
Everything everywhere The rise of computer-based intelligence
Consulting services
IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication
Products Mobiles Biometrics as a Service IDaaS
Solution Design Integration Services Maintenance Services
Verification Identification Multi factor authentication
Log in Single Sign On Web Services
Physical access control time attendance
Mobile authentication
Financial transactions payments social authentications
7 copy Copyright 2017 FUJITSU
A world in motion needs secure identities
8 copy Copyright 2017 FUJITSU
Transport amp Travel
Biometric national ID card
Biometric passport
Biometric boarding pass
Biometric baggage check in
Biometric ticket purchasing
Biometric bonusloyalty card
Biometric staff crew access control
Biometric cockpit access
Biometric aircraft ship train maintenance
Biometric payment
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
1 copy Copyright 2017 FUJITSU
BIOMETRICS ndash digitital identification for a secure future
Thomas Bengs
Director amp Head of Biometrics EMEIA
Fujitsu Enterprise amp Cybersecurity EMEIA
2 copy Copyright 2017 FUJITSU
Key threats caused by identity fraud
Terrorist attacks
Misuse of social media
Financial transactions fraud
IP theft
Enterprise data theftmanipulation
Cyber attacks
It takes 20 years to build a reputation andfive minutes to ruin it
Warren Buffet
50 of organizations suffered a data breach in 2016
Cisco annual Cybersecurity report 2017 2016 Ponemon Cost of Data Breach Study
3 copy Copyright 2017 FUJITSU
Why the hype about biometric authentication
Cloud computing and extra ordinarygrowth of smart mobile devices hasmade secure identity authentication
absolutely necessary
4 copy Copyright 2017 FUJITSU
Biometric authentication is the right decision
Risk of Fraud Ownership Knowledge Biometrics
To be transferred Yes Yes No
To be stolen Yes Yes No
To be forgotten Yes Yes No
To be copied Yes Yes No
To be lost Yes Yes No
To be altered Yes Yes No
Keys Password Vein
Tokens Pin Iris
Smart Cards Selfie Fingerprint
Face
Voice
Key stroke
Known methods
Possible authentication methods Precision of Biometrics
Biometrics is the preferred method for processes that require authentication
5 copy Copyright 2017 FUJITSU
Fujitsulsquos Commitment to Biometrics
Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)
Biometrics experts involved in National and International Standards development from a number of countries
Proven experience across domains and geographic regions
Capabilities to deliver the right solution for each customer
Consulting
Solution design development implementation
Systems Integration
Hosting and cloud services
Products
Digital co-creation
IDaaS solution amp services NEW PalmSecure FPRO Sensor
6 copy Copyright 2017 FUJITSU
Biometric authentication - key facts
Market Size amp Trends amp Key Markets Biometrics Business Elements
Drivers Biometrics Key Applications
Total global market size is predicted to be US$ 30 Billion in 2022
1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition
1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector
By 2021 50 of online transactions will use biometrics (IDC 2017)
Disruptive fault lines Security privacy and regulation
Connected conflict Convergence of technology and privacy
Talent crunch Global demand for digital workers
Shifting economics Data as digital capital
Everything everywhere The rise of computer-based intelligence
Consulting services
IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication
Products Mobiles Biometrics as a Service IDaaS
Solution Design Integration Services Maintenance Services
Verification Identification Multi factor authentication
Log in Single Sign On Web Services
Physical access control time attendance
Mobile authentication
Financial transactions payments social authentications
7 copy Copyright 2017 FUJITSU
A world in motion needs secure identities
8 copy Copyright 2017 FUJITSU
Transport amp Travel
Biometric national ID card
Biometric passport
Biometric boarding pass
Biometric baggage check in
Biometric ticket purchasing
Biometric bonusloyalty card
Biometric staff crew access control
Biometric cockpit access
Biometric aircraft ship train maintenance
Biometric payment
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
2 copy Copyright 2017 FUJITSU
Key threats caused by identity fraud
Terrorist attacks
Misuse of social media
Financial transactions fraud
IP theft
Enterprise data theftmanipulation
Cyber attacks
It takes 20 years to build a reputation andfive minutes to ruin it
Warren Buffet
50 of organizations suffered a data breach in 2016
Cisco annual Cybersecurity report 2017 2016 Ponemon Cost of Data Breach Study
3 copy Copyright 2017 FUJITSU
Why the hype about biometric authentication
Cloud computing and extra ordinarygrowth of smart mobile devices hasmade secure identity authentication
absolutely necessary
4 copy Copyright 2017 FUJITSU
Biometric authentication is the right decision
Risk of Fraud Ownership Knowledge Biometrics
To be transferred Yes Yes No
To be stolen Yes Yes No
To be forgotten Yes Yes No
To be copied Yes Yes No
To be lost Yes Yes No
To be altered Yes Yes No
Keys Password Vein
Tokens Pin Iris
Smart Cards Selfie Fingerprint
Face
Voice
Key stroke
Known methods
Possible authentication methods Precision of Biometrics
Biometrics is the preferred method for processes that require authentication
5 copy Copyright 2017 FUJITSU
Fujitsulsquos Commitment to Biometrics
Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)
Biometrics experts involved in National and International Standards development from a number of countries
Proven experience across domains and geographic regions
Capabilities to deliver the right solution for each customer
Consulting
Solution design development implementation
Systems Integration
Hosting and cloud services
Products
Digital co-creation
IDaaS solution amp services NEW PalmSecure FPRO Sensor
6 copy Copyright 2017 FUJITSU
Biometric authentication - key facts
Market Size amp Trends amp Key Markets Biometrics Business Elements
Drivers Biometrics Key Applications
Total global market size is predicted to be US$ 30 Billion in 2022
1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition
1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector
By 2021 50 of online transactions will use biometrics (IDC 2017)
Disruptive fault lines Security privacy and regulation
Connected conflict Convergence of technology and privacy
Talent crunch Global demand for digital workers
Shifting economics Data as digital capital
Everything everywhere The rise of computer-based intelligence
Consulting services
IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication
Products Mobiles Biometrics as a Service IDaaS
Solution Design Integration Services Maintenance Services
Verification Identification Multi factor authentication
Log in Single Sign On Web Services
Physical access control time attendance
Mobile authentication
Financial transactions payments social authentications
7 copy Copyright 2017 FUJITSU
A world in motion needs secure identities
8 copy Copyright 2017 FUJITSU
Transport amp Travel
Biometric national ID card
Biometric passport
Biometric boarding pass
Biometric baggage check in
Biometric ticket purchasing
Biometric bonusloyalty card
Biometric staff crew access control
Biometric cockpit access
Biometric aircraft ship train maintenance
Biometric payment
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
3 copy Copyright 2017 FUJITSU
Why the hype about biometric authentication
Cloud computing and extra ordinarygrowth of smart mobile devices hasmade secure identity authentication
absolutely necessary
4 copy Copyright 2017 FUJITSU
Biometric authentication is the right decision
Risk of Fraud Ownership Knowledge Biometrics
To be transferred Yes Yes No
To be stolen Yes Yes No
To be forgotten Yes Yes No
To be copied Yes Yes No
To be lost Yes Yes No
To be altered Yes Yes No
Keys Password Vein
Tokens Pin Iris
Smart Cards Selfie Fingerprint
Face
Voice
Key stroke
Known methods
Possible authentication methods Precision of Biometrics
Biometrics is the preferred method for processes that require authentication
5 copy Copyright 2017 FUJITSU
Fujitsulsquos Commitment to Biometrics
Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)
Biometrics experts involved in National and International Standards development from a number of countries
Proven experience across domains and geographic regions
Capabilities to deliver the right solution for each customer
Consulting
Solution design development implementation
Systems Integration
Hosting and cloud services
Products
Digital co-creation
IDaaS solution amp services NEW PalmSecure FPRO Sensor
6 copy Copyright 2017 FUJITSU
Biometric authentication - key facts
Market Size amp Trends amp Key Markets Biometrics Business Elements
Drivers Biometrics Key Applications
Total global market size is predicted to be US$ 30 Billion in 2022
1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition
1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector
By 2021 50 of online transactions will use biometrics (IDC 2017)
Disruptive fault lines Security privacy and regulation
Connected conflict Convergence of technology and privacy
Talent crunch Global demand for digital workers
Shifting economics Data as digital capital
Everything everywhere The rise of computer-based intelligence
Consulting services
IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication
Products Mobiles Biometrics as a Service IDaaS
Solution Design Integration Services Maintenance Services
Verification Identification Multi factor authentication
Log in Single Sign On Web Services
Physical access control time attendance
Mobile authentication
Financial transactions payments social authentications
7 copy Copyright 2017 FUJITSU
A world in motion needs secure identities
8 copy Copyright 2017 FUJITSU
Transport amp Travel
Biometric national ID card
Biometric passport
Biometric boarding pass
Biometric baggage check in
Biometric ticket purchasing
Biometric bonusloyalty card
Biometric staff crew access control
Biometric cockpit access
Biometric aircraft ship train maintenance
Biometric payment
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
4 copy Copyright 2017 FUJITSU
Biometric authentication is the right decision
Risk of Fraud Ownership Knowledge Biometrics
To be transferred Yes Yes No
To be stolen Yes Yes No
To be forgotten Yes Yes No
To be copied Yes Yes No
To be lost Yes Yes No
To be altered Yes Yes No
Keys Password Vein
Tokens Pin Iris
Smart Cards Selfie Fingerprint
Face
Voice
Key stroke
Known methods
Possible authentication methods Precision of Biometrics
Biometrics is the preferred method for processes that require authentication
5 copy Copyright 2017 FUJITSU
Fujitsulsquos Commitment to Biometrics
Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)
Biometrics experts involved in National and International Standards development from a number of countries
Proven experience across domains and geographic regions
Capabilities to deliver the right solution for each customer
Consulting
Solution design development implementation
Systems Integration
Hosting and cloud services
Products
Digital co-creation
IDaaS solution amp services NEW PalmSecure FPRO Sensor
6 copy Copyright 2017 FUJITSU
Biometric authentication - key facts
Market Size amp Trends amp Key Markets Biometrics Business Elements
Drivers Biometrics Key Applications
Total global market size is predicted to be US$ 30 Billion in 2022
1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition
1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector
By 2021 50 of online transactions will use biometrics (IDC 2017)
Disruptive fault lines Security privacy and regulation
Connected conflict Convergence of technology and privacy
Talent crunch Global demand for digital workers
Shifting economics Data as digital capital
Everything everywhere The rise of computer-based intelligence
Consulting services
IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication
Products Mobiles Biometrics as a Service IDaaS
Solution Design Integration Services Maintenance Services
Verification Identification Multi factor authentication
Log in Single Sign On Web Services
Physical access control time attendance
Mobile authentication
Financial transactions payments social authentications
7 copy Copyright 2017 FUJITSU
A world in motion needs secure identities
8 copy Copyright 2017 FUJITSU
Transport amp Travel
Biometric national ID card
Biometric passport
Biometric boarding pass
Biometric baggage check in
Biometric ticket purchasing
Biometric bonusloyalty card
Biometric staff crew access control
Biometric cockpit access
Biometric aircraft ship train maintenance
Biometric payment
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
5 copy Copyright 2017 FUJITSU
Fujitsulsquos Commitment to Biometrics
Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)
Biometrics experts involved in National and International Standards development from a number of countries
Proven experience across domains and geographic regions
Capabilities to deliver the right solution for each customer
Consulting
Solution design development implementation
Systems Integration
Hosting and cloud services
Products
Digital co-creation
IDaaS solution amp services NEW PalmSecure FPRO Sensor
6 copy Copyright 2017 FUJITSU
Biometric authentication - key facts
Market Size amp Trends amp Key Markets Biometrics Business Elements
Drivers Biometrics Key Applications
Total global market size is predicted to be US$ 30 Billion in 2022
1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition
1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector
By 2021 50 of online transactions will use biometrics (IDC 2017)
Disruptive fault lines Security privacy and regulation
Connected conflict Convergence of technology and privacy
Talent crunch Global demand for digital workers
Shifting economics Data as digital capital
Everything everywhere The rise of computer-based intelligence
Consulting services
IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication
Products Mobiles Biometrics as a Service IDaaS
Solution Design Integration Services Maintenance Services
Verification Identification Multi factor authentication
Log in Single Sign On Web Services
Physical access control time attendance
Mobile authentication
Financial transactions payments social authentications
7 copy Copyright 2017 FUJITSU
A world in motion needs secure identities
8 copy Copyright 2017 FUJITSU
Transport amp Travel
Biometric national ID card
Biometric passport
Biometric boarding pass
Biometric baggage check in
Biometric ticket purchasing
Biometric bonusloyalty card
Biometric staff crew access control
Biometric cockpit access
Biometric aircraft ship train maintenance
Biometric payment
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
6 copy Copyright 2017 FUJITSU
Biometric authentication - key facts
Market Size amp Trends amp Key Markets Biometrics Business Elements
Drivers Biometrics Key Applications
Total global market size is predicted to be US$ 30 Billion in 2022
1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition
1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector
By 2021 50 of online transactions will use biometrics (IDC 2017)
Disruptive fault lines Security privacy and regulation
Connected conflict Convergence of technology and privacy
Talent crunch Global demand for digital workers
Shifting economics Data as digital capital
Everything everywhere The rise of computer-based intelligence
Consulting services
IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication
Products Mobiles Biometrics as a Service IDaaS
Solution Design Integration Services Maintenance Services
Verification Identification Multi factor authentication
Log in Single Sign On Web Services
Physical access control time attendance
Mobile authentication
Financial transactions payments social authentications
7 copy Copyright 2017 FUJITSU
A world in motion needs secure identities
8 copy Copyright 2017 FUJITSU
Transport amp Travel
Biometric national ID card
Biometric passport
Biometric boarding pass
Biometric baggage check in
Biometric ticket purchasing
Biometric bonusloyalty card
Biometric staff crew access control
Biometric cockpit access
Biometric aircraft ship train maintenance
Biometric payment
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
7 copy Copyright 2017 FUJITSU
A world in motion needs secure identities
8 copy Copyright 2017 FUJITSU
Transport amp Travel
Biometric national ID card
Biometric passport
Biometric boarding pass
Biometric baggage check in
Biometric ticket purchasing
Biometric bonusloyalty card
Biometric staff crew access control
Biometric cockpit access
Biometric aircraft ship train maintenance
Biometric payment
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
8 copy Copyright 2017 FUJITSU
Transport amp Travel
Biometric national ID card
Biometric passport
Biometric boarding pass
Biometric baggage check in
Biometric ticket purchasing
Biometric bonusloyalty card
Biometric staff crew access control
Biometric cockpit access
Biometric aircraft ship train maintenance
Biometric payment
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
9 copy Copyright 2017 FUJITSU
Enterprises
Biometric access to parking
Biometric elevator processing
Biometric biometric time attendance
Biometric biometric access to office area
Biometric locker access
Biometric PC login amp SSO
Biometric printing amp scanning
Biometric payment in canteens amp restaurants
Biometric access to data center amp racks
Biometric visitor management
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
10 copy Copyright 2017 FUJITSU
Financial Services amp Retail
Biometric ATM VTM
Biometric SAP process handling
Biometric financial transactions
Biometric digital working place
Biometric building access
Biometric data center access
Biometric payment
Biometric mobile payment
Biometric online ordering
Biometric self checkout
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
11 copy Copyright 2017 FUJITSU
Public Services
Biometric patient identification
Biometric data proctection
Biometric social funding treatment
Biometric welfare processing
Biometric e-government
Biometric payment in education
Biometric authentication for exams
Biometric access to
- Kindergartenchild care
- Schools School bus Campus
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
12 copy Copyright 2017 FUJITSU
AI IOT Automotive
Biometric car rental
Biometric car opening amp starting
Biometric convenience processing
Biometric payment services
Biometric individual recognition
Biometric data center access
Biometric production line processing amp access
Biometric storagelockers
Biometric tool handling
Biometric time attendance
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
13 copy Copyright 2017 FUJITSU
Mobile devices
Multi-Modal Biometric Identity Management
Anonymous Cloud Storage and Matching
Patented Vendor Agnostic Biometric Technology
Cross Platform Delivery
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
14 copy Copyright 2017 FUJITSU
Biometric authentication Enterprise platform
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
15 copy Copyright 2017 FUJITSU
Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition
November 08
1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml
1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region
1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
November 09
1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen
1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs
1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith
1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
16 copy Copyright 2017 FUJITSU
Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn
yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789
notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute
thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl
Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-
regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc
uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl