24
0 Copyright 2014 FUJITSU Human Centric Innovation Fujitsu Forum 2014 ICM Munich 19th – 20th November

Security as an Important Contributor to Business Success

Embed Size (px)

DESCRIPTION

Speakers: Mr. Thomas Bengs (Fujitsu International Business)

Citation preview

Page 1: Security as an Important Contributor to Business Success

0 Copyright 2014 FUJITSU

Human CentricInnovation

Fujitsu Forum2014

ICM Munich19th – 20th November

Page 2: Security as an Important Contributor to Business Success

1 Copyright 2014 FUJITSU

Security as an Important Contributor to Business Success

Thomas BengsHead of Security SolutionsFujitsu Global Delivery

Page 3: Security as an Important Contributor to Business Success

2 Copyright 2014 FUJITSUCopyright 2014 FUJITSU

A Hyperconnected World An emerging new world where people, information, things and infrastructure

are connected via networks, transforming work and life everywhere

Data is the most important part of ICT and has the highest value

Information is leaving secured data centers

2

Page 4: Security as an Important Contributor to Business Success

3 Copyright 2014 FUJITSUCopyright 2014 FUJITSU LIMITEDFUJITSU CONFIDENTIAL

Internet of Things & Big Data IoT & big data bring huge growth potential to the global economy

We also face serious challenges of security and privacy

Copyright 2014 FUJITSU

2013 10 billion2020 50+ billion

3.6TB/h20TB/h100GB

- A self-driving car - A jet engine in the air

- An individual genome

Things connected to the internet

3

Page 5: Security as an Important Contributor to Business Success

4 Copyright 2014 FUJITSU

The workplace environment is changing

Past: Working in secured buildings with dedicated workplaces and set times

Today & Future: Working at your own terms, anywhere, at any time

Page 6: Security as an Important Contributor to Business Success

5 Copyright 2014 FUJITSU

What does it mean and what is the impact ?

(Critical) data are leaving companies

The data center is mostly a mobile device

Poor protection versus data centers

Mostly only an (un)actual virus scanner is standard

Data become values and are handled for money, e.g.

Social data

Accounts with password

Credit data

Data are easily available

In Pbyte more data are available ouside as inside a company – „big-data-mobility“

Data centers are highly protected e.g. access, monitoring, damage, data loss

Dealing of data earns more money as with IT equipment e.g.

Social Networks

E-Commerce

Finance / Retail Services

Every organization deals with huge datavolume

Page 7: Security as an Important Contributor to Business Success

6 Copyright 2014 FUJITSU

Definition of IT Security

:: CONFIDENTIALITY ::

Confidential information has to be protected against unauthorized distribution & usage

:: AVAILABILITY ::

The user must have access to IT services, to IT infor-mation and to functions of the IT system at any time

:: DATA CONSISTENCY ::

All data has to be provided in full and unaltered

Page 8: Security as an Important Contributor to Business Success

7 Copyright 2014 FUJITSU

Information Security Market Forecast 2013 -2017

8.3%

Security Services*

Network Security Equipment

Infrastructure Protection

Identity and Access Management

2017

83.6

52.7(63%)

10.9(13%)

16.1(19%)

3.9(5%)

2016

77.2

48.1(62%)

10.3(13%)

15.2(20%)

3.6(5%)

2015

71.3

43.9(62%)

9.7(14%)

14.3(20%)

3.3(5%)

2014

65.8

40.2(61%)

9.1(14%)

13.4(20%)

3.1(5%)

2013

60.8

36.9(61%)

8.6(14%)

12.6(21%)

2.8(5%)

+9.3%

+6.3%

+6.4%

+8.2%

Worldwide Enterprise Information Security Market Forecast (in B US$)

Regional Distribution - Enterprise Information Security Market (based on US$)

31,5% 31,1% 30,8% 30,5%

45,8% 45,9% 45,9% 45,9% 45,9%

16,4% 16,2% 16,2% 16,0% 15,9%

6,2% 6,5% 6,9% 7,3% 7,7%

31,6%

20142013

100%Emerging A/P

(incl. Greater China)

EMEA

Americas

Mature A/P (incl. Japan)

201720162015

+7.3%

+14.6%

+8.3%

+7.4%

Source: Gartner Forecast: Information Security, Worldwide, 2012-2018, 2Q14 Update, Ruggero Contu, Christian Canales and Lawrence Pingree - 08/2014 ; charts created by Fujitsu based on the Gartner report

Global Enterprise Information Security market will reach ~84 B US$ by 2017 growing by 8.3% per year; Americas reflect 46% portion - EMEA & mature A/P are growing below avg.

* includes: Consulting, Implementation, Hard-ware Support & IT Outsourcing

x% …Compound Annual Growth Rate 2013-2017

Page 9: Security as an Important Contributor to Business Success

8 Copyright 2014 FUJITSU

FUJITSU Security Initiative

Page 10: Security as an Important Contributor to Business Success

9 Copyright 2014 FUJITSU

Solving today´s IAM topics with PalmSecure based solutions Current situation:

- Increased ID frauds globally

Customer pain points:- Stolen & misused personal identities causing

slower processes & increased costs & causingnon satisfied customers & employees

This will happen in the market:- Investing in high secured “easy to handle”

professional IAM solutions / services

What Fujitsu is offering:End to End security solutions & servicesbased on Palm Vein biometric authenticationtechnology

From To

Password log in / SSO PalmSecure log in / SSO

Access with key/card PalmSecure Physical access control

Using Pin & Card Using PalmSecure & TOC

Page 11: Security as an Important Contributor to Business Success

10 © FUJITSU LIMITED 2014

PalmSecure IAM areas

ATMs Building Security

Work PlaceProtection

Intranet MobilePayment

SAPApplications

OnlineBanking

DatacenterSecurity

SecuredDMS

Network-/DataSecurity

60.000ATMs with

PalmSecure70M Users

100.000Work Places

with PalmSecure120K Users

300KLocations

withPalmSecure??? Users

10.000with

PalmSecureWS & UB

& Tabs

10.000PACs/TAs

withPalmSecure15M Users

NEW!

250KWork Places

with PalmSecure250K Users

NEW! NEW!

120PACs/DT

withPalmSecure12K Users

Ca. 200 Million Users Globally!

Page 12: Security as an Important Contributor to Business Success

11 © FUJITSU LIMITED 2014

Workplace Protect

Single application for all security relevant settings

Protects workplace devices against unauthorized usage

Automatically locks workplace devices, when user leaves his/her desk

Supports a wide range of security devices

Comes pre-installed on Fujitsu Client Computing Devices

Free of charge for Fujitsu Client Computing Devices

Authentication Method FAR (%) = If FRR (%) =

Face recognition ~ 1.3 ~ 2.6

Voice pattern ~ 0.01 ~ 0.3

Fingerprint ~ 0.001 ~ 0.1

Finger vein ~ 0.0001 ~ 0.01

Iris/Retina ~ 0.0001 ~ 0.01

Fujitsu Palm vein < 0.00008 ~ 0.01

Page 13: Security as an Important Contributor to Business Success

12 © FUJITSU LIMITED 2014

PalmSecure truedentity

Personalization Client (PC or VM)

Infrastructure Server (PC or VM)

Checkpoint (PC)

Personalization-application

Truedentity-clientBrowserRegistration

Service

Access

Management

Personalization Service

Registration Service(Admin WebUI)

eID Service

Checkpoint Login Service+ Access Management

vein scanner card reader

Checkpoint application

Truedentity client

vein scanner card reader

display

read

y ca

rd

net

wor

k (I

P)

IP3

IP1

IP2

Connection over internet with 3 VPN tunnels

Certificate user (smart card and PalmSecure) and application on eIDserver

No silo application Secured channel / data /

authenticationdisplay

keyboard mouse

Page 14: Security as an Important Contributor to Business Success

13 © FUJITSU LIMITED 2014

PalmSecure bioLock for SAP

Fraud prevention Data control Process logging Individually secured processes Controlled authorized financial

transactions

User requests SAP activity.e.g. Log-on, SE16

data Browser, Customer Service activity

bioLock prompts user for biometric scan

Sample biometric template extracted, encrypted, compared with referencetemplate in bioLock/SAP

Activity logged

ActionAllowed

ActionDenied

Page 15: Security as an Important Contributor to Business Success

14 © FUJITSU LIMITED 2014

PalmSecure ID Match

Cutting Edge Technology Ultimate Convenience Maximum Security Independent Functionality Stylish, Hygienic Design Prepared for Multiple Applications

Page 16: Security as an Important Contributor to Business Success

15 Copyright 2014 FUJITSU

PalmSecure Ultrabook U904

Hardware

World’s first notebooks with integrated sensor

FUJITSU Notebook LIFEBOOK U904 Ultrabook™

FUJITSU Workstation CELSIUS H730

PalmSecure Mouse Login Kit and PalmSecure Sensor Guide Kit

Software

Security made easy with Fujitsu’s software solutions

Workplace Protect

Supporting configuration of windows authentication, pre-boot authentication, single-sign-on, password safe and encrypted container

Workplace Manager

Administrator console for remote management of security settingsP

ALM

SE

CU

RE

Page 17: Security as an Important Contributor to Business Success

16 Copyright 2014 FUJITSU

Innovative Palm Vein Authentication Advantages

High Safety & Permanence Hidden under the skin - forgery difficult

Unique even among identical twins Never change - same throughout

life

Detectable only when blood is flowing

High Accuracy Palm vein patterns are highly complex

High applicability

Designed for public usage

Palm veins are insensitive against environment (cold temperature, creamy hands, skin scratches)

High Acceptance Very hygienic due to no-contact operation

Very easy and intuitive to use Biometric pattern hidden inside

the body (privacy)

Page 18: Security as an Important Contributor to Business Success

17 Copyright 2014 FUJITSU

FUJITSU PalmSecure ™ Innovation Contest

Dr. Markus DraegerInnovation Program Manager

Page 19: Security as an Important Contributor to Business Success

18 Copyright 2014 FUJITSU

The new Device – FUJITSU PalmSecure ™ ID Match

Page 20: Security as an Important Contributor to Business Success

19 Copyright 2014 FUJITSU

The Contest Challenge

What are the application areas for a match-on-device system with FUJITSU PalmSecure™ technology?

Which use cases can you imagine in the fields of e.g. government, finance, enterprise, automotive, retail, energy, industry 4.0 or others for this technology?

How can the device look like in the different usage scenarios?

Where can the FUJITSU PalmSecure™ sensor technology be applied in general?

Page 21: Security as an Important Contributor to Business Success

20 Copyright 2014 FUJITSU

The Contest

Great response of the innovator community to the technology and the challenge questions

Run time 7 weeks

11326 visitors from 92 countries

414 ideas

925 comments

Website with social media functionality provided by Hyve AG

Page 22: Security as an Important Contributor to Business Success

21 Copyright 2014 FUJITSU

Winners

On November 3rd, the jury awarded prizes to 4 participants (two 3rd prizes)

1. Prize: Integration of PalmSecure into a smart watch(Shmuel Goldfisher)

2. Prize: Use of PalmSecure for assurance of parcel delivery to the correct addressee (Katherine Rushton)

3. Prize: Use of PalmSecure to replace the Bahncard (Suvrajit Saha)

Second 3. Prize: Use of PalmSecure in Fleet Management (Tizu Tiberiu)

Page 23: Security as an Important Contributor to Business Success

22 Copyright 2014 FUJITSU

Thank you for listening!

Page 24: Security as an Important Contributor to Business Success

23 Copyright 2014 FUJITSU