16
0 © Copyright 2017 FUJITSU Fujitsu Forum 2017 #FujitsuForum

Don't become a headline - secure your workplace

Embed Size (px)

Citation preview

0 copy Copyright 2017 FUJITSU

FujitsuForum2017

FujitsuForum

1 copy Copyright 2017 FUJITSU

Donrsquot become a headline ndash Secure your workplace

Karyn Jeffery

Head of Digital Workplace Services Global Delivery Group (Fujitsu)

Anna Kopp

Head of IT Germany (Microsoft)

Christian Reilly

Vice President amp CTO (Citrix)

2 copy Copyright 2017 FUJITSU

User Centric Security

FEBRUARYCLOUDBLEED

Cloudfare bug in platform caused random leakage of customer data

3 copy Copyright 2017 FUJITSU

Insider Threats dwarfing any other threats

A global survey by Citrix and the Ponemon Institute on IT security published Jan 2017 79 percent of respondents are worried about security breaches involving high-value information

71 percent say there is risk from their inability to control employees devices and apps

74 percent of businesses saying that a new IT security framework is needed to improve security posture and reduce risk

Ponemon Institute 2016 Cost of Data Breach 874 incidents reported by companies

568 caused by employeecontractor negligence - greatest threats are email and browsing

191 caused by malicious employees and criminals

85 caused by outsiders using stolen credentials

Insider Threat Report 2017 74 companies vulnerable to insider attacks

4 copy Copyright 2017 FUJITSU

The era of Digital Transformation

Collapsing organisational boundariesFujitsu survey 2017 79 organisations are willing to share sensitive business information

63 already running or embarking on co-creation projects

Digital Natives

75 by 2020

Cloud First Policies

GDPR fines of up to 4 total revenue

5 copy Copyright 2017 FUJITSU

Experience and Productivity

Control and Securityvs

6 copy Copyright 2017 FUJITSU

Clip

10 copy Copyright 2017 FUJITSU

Vulnerabilities

Cyber

Attack

3rd Party Maintenance finance system

Housing Associationwebsite

Third Party MaintenanceCRM

Housing Associationemail

Legacy Custom

AppsResident ID validation database

Cyber Attack

Cyber AttackCyber

Attack

FirewallFirewall

11 copy Copyright 2017 FUJITSU

Microsoft

Microsoft 365

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

1 copy Copyright 2017 FUJITSU

Donrsquot become a headline ndash Secure your workplace

Karyn Jeffery

Head of Digital Workplace Services Global Delivery Group (Fujitsu)

Anna Kopp

Head of IT Germany (Microsoft)

Christian Reilly

Vice President amp CTO (Citrix)

2 copy Copyright 2017 FUJITSU

User Centric Security

FEBRUARYCLOUDBLEED

Cloudfare bug in platform caused random leakage of customer data

3 copy Copyright 2017 FUJITSU

Insider Threats dwarfing any other threats

A global survey by Citrix and the Ponemon Institute on IT security published Jan 2017 79 percent of respondents are worried about security breaches involving high-value information

71 percent say there is risk from their inability to control employees devices and apps

74 percent of businesses saying that a new IT security framework is needed to improve security posture and reduce risk

Ponemon Institute 2016 Cost of Data Breach 874 incidents reported by companies

568 caused by employeecontractor negligence - greatest threats are email and browsing

191 caused by malicious employees and criminals

85 caused by outsiders using stolen credentials

Insider Threat Report 2017 74 companies vulnerable to insider attacks

4 copy Copyright 2017 FUJITSU

The era of Digital Transformation

Collapsing organisational boundariesFujitsu survey 2017 79 organisations are willing to share sensitive business information

63 already running or embarking on co-creation projects

Digital Natives

75 by 2020

Cloud First Policies

GDPR fines of up to 4 total revenue

5 copy Copyright 2017 FUJITSU

Experience and Productivity

Control and Securityvs

6 copy Copyright 2017 FUJITSU

Clip

10 copy Copyright 2017 FUJITSU

Vulnerabilities

Cyber

Attack

3rd Party Maintenance finance system

Housing Associationwebsite

Third Party MaintenanceCRM

Housing Associationemail

Legacy Custom

AppsResident ID validation database

Cyber Attack

Cyber AttackCyber

Attack

FirewallFirewall

11 copy Copyright 2017 FUJITSU

Microsoft

Microsoft 365

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

2 copy Copyright 2017 FUJITSU

User Centric Security

FEBRUARYCLOUDBLEED

Cloudfare bug in platform caused random leakage of customer data

3 copy Copyright 2017 FUJITSU

Insider Threats dwarfing any other threats

A global survey by Citrix and the Ponemon Institute on IT security published Jan 2017 79 percent of respondents are worried about security breaches involving high-value information

71 percent say there is risk from their inability to control employees devices and apps

74 percent of businesses saying that a new IT security framework is needed to improve security posture and reduce risk

Ponemon Institute 2016 Cost of Data Breach 874 incidents reported by companies

568 caused by employeecontractor negligence - greatest threats are email and browsing

191 caused by malicious employees and criminals

85 caused by outsiders using stolen credentials

Insider Threat Report 2017 74 companies vulnerable to insider attacks

4 copy Copyright 2017 FUJITSU

The era of Digital Transformation

Collapsing organisational boundariesFujitsu survey 2017 79 organisations are willing to share sensitive business information

63 already running or embarking on co-creation projects

Digital Natives

75 by 2020

Cloud First Policies

GDPR fines of up to 4 total revenue

5 copy Copyright 2017 FUJITSU

Experience and Productivity

Control and Securityvs

6 copy Copyright 2017 FUJITSU

Clip

10 copy Copyright 2017 FUJITSU

Vulnerabilities

Cyber

Attack

3rd Party Maintenance finance system

Housing Associationwebsite

Third Party MaintenanceCRM

Housing Associationemail

Legacy Custom

AppsResident ID validation database

Cyber Attack

Cyber AttackCyber

Attack

FirewallFirewall

11 copy Copyright 2017 FUJITSU

Microsoft

Microsoft 365

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

3 copy Copyright 2017 FUJITSU

Insider Threats dwarfing any other threats

A global survey by Citrix and the Ponemon Institute on IT security published Jan 2017 79 percent of respondents are worried about security breaches involving high-value information

71 percent say there is risk from their inability to control employees devices and apps

74 percent of businesses saying that a new IT security framework is needed to improve security posture and reduce risk

Ponemon Institute 2016 Cost of Data Breach 874 incidents reported by companies

568 caused by employeecontractor negligence - greatest threats are email and browsing

191 caused by malicious employees and criminals

85 caused by outsiders using stolen credentials

Insider Threat Report 2017 74 companies vulnerable to insider attacks

4 copy Copyright 2017 FUJITSU

The era of Digital Transformation

Collapsing organisational boundariesFujitsu survey 2017 79 organisations are willing to share sensitive business information

63 already running or embarking on co-creation projects

Digital Natives

75 by 2020

Cloud First Policies

GDPR fines of up to 4 total revenue

5 copy Copyright 2017 FUJITSU

Experience and Productivity

Control and Securityvs

6 copy Copyright 2017 FUJITSU

Clip

10 copy Copyright 2017 FUJITSU

Vulnerabilities

Cyber

Attack

3rd Party Maintenance finance system

Housing Associationwebsite

Third Party MaintenanceCRM

Housing Associationemail

Legacy Custom

AppsResident ID validation database

Cyber Attack

Cyber AttackCyber

Attack

FirewallFirewall

11 copy Copyright 2017 FUJITSU

Microsoft

Microsoft 365

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

4 copy Copyright 2017 FUJITSU

The era of Digital Transformation

Collapsing organisational boundariesFujitsu survey 2017 79 organisations are willing to share sensitive business information

63 already running or embarking on co-creation projects

Digital Natives

75 by 2020

Cloud First Policies

GDPR fines of up to 4 total revenue

5 copy Copyright 2017 FUJITSU

Experience and Productivity

Control and Securityvs

6 copy Copyright 2017 FUJITSU

Clip

10 copy Copyright 2017 FUJITSU

Vulnerabilities

Cyber

Attack

3rd Party Maintenance finance system

Housing Associationwebsite

Third Party MaintenanceCRM

Housing Associationemail

Legacy Custom

AppsResident ID validation database

Cyber Attack

Cyber AttackCyber

Attack

FirewallFirewall

11 copy Copyright 2017 FUJITSU

Microsoft

Microsoft 365

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

5 copy Copyright 2017 FUJITSU

Experience and Productivity

Control and Securityvs

6 copy Copyright 2017 FUJITSU

Clip

10 copy Copyright 2017 FUJITSU

Vulnerabilities

Cyber

Attack

3rd Party Maintenance finance system

Housing Associationwebsite

Third Party MaintenanceCRM

Housing Associationemail

Legacy Custom

AppsResident ID validation database

Cyber Attack

Cyber AttackCyber

Attack

FirewallFirewall

11 copy Copyright 2017 FUJITSU

Microsoft

Microsoft 365

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

6 copy Copyright 2017 FUJITSU

Clip

10 copy Copyright 2017 FUJITSU

Vulnerabilities

Cyber

Attack

3rd Party Maintenance finance system

Housing Associationwebsite

Third Party MaintenanceCRM

Housing Associationemail

Legacy Custom

AppsResident ID validation database

Cyber Attack

Cyber AttackCyber

Attack

FirewallFirewall

11 copy Copyright 2017 FUJITSU

Microsoft

Microsoft 365

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

10 copy Copyright 2017 FUJITSU

Vulnerabilities

Cyber

Attack

3rd Party Maintenance finance system

Housing Associationwebsite

Third Party MaintenanceCRM

Housing Associationemail

Legacy Custom

AppsResident ID validation database

Cyber Attack

Cyber AttackCyber

Attack

FirewallFirewall

11 copy Copyright 2017 FUJITSU

Microsoft

Microsoft 365

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

11 copy Copyright 2017 FUJITSU

Microsoft

Microsoft 365

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

12 copy Copyright 2017 FUJITSU

Microsoft + CITRIX

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

13 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

14 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

15 copy Copyright 2017 FUJITSU

Cyber Security AI and Biometrics

Biometric Enabled Hardware

Unified contextual digital workplace

Fujitsu + Microsoft + CITRIX

Workplace Anywhere

Intelligent Engineering

Social Command Center

Hybrid IT Transformation

Apps

Users

Data and Analytics

LegacyCustom

Apps

Any applications all data hybrid

Microsoft 365

Firewall

Secure and improved UX

Any device

Single SignOn

Contextual Access

Contextual Performance

Unified Experience

Citrix Analytics Platform

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

16 copy Copyright 2017 FUJITSU

Delivering a truly secure user centric workplace

Users

Single sign on to all my Apps

Know me know where I am

Know what I can or canrsquot share

Protect my Data

Protect my Identity

Make it easy for me to collaborate

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

17 copy Copyright 2017 FUJITSU

Summary

No silver bullet but complexity is the enemy of security

Multi-layered clear strategy focused on the identity of the user and securing the data and apps

Cloud First strategy simplifies security

Focus on User Experience

Fujitsu Microsoft and CITRIX working together have the skills and technology to protect enterprises

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

18 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl