Upload
fujitsu-global
View
399
Download
2
Embed Size (px)
DESCRIPTION
Speakers: Mr. Thomas Bengs (Fujitsu International Business)
Citation preview
0 Copyright 2014 FUJITSU
Human CentricInnovation
Fujitsu Forum2014
ICM Munich19th – 20th November
1 Copyright 2014 FUJITSU
Security as an Important Contributor to Business Success
Thomas BengsHead of Security SolutionsFujitsu Global Delivery
2 Copyright 2014 FUJITSUCopyright 2014 FUJITSU
A Hyperconnected World An emerging new world where people, information, things and infrastructure
are connected via networks, transforming work and life everywhere
Data is the most important part of ICT and has the highest value
Information is leaving secured data centers
2
3 Copyright 2014 FUJITSUCopyright 2014 FUJITSU LIMITEDFUJITSU CONFIDENTIAL
Internet of Things & Big Data IoT & big data bring huge growth potential to the global economy
We also face serious challenges of security and privacy
Copyright 2014 FUJITSU
2013 10 billion2020 50+ billion
3.6TB/h20TB/h100GB
- A self-driving car - A jet engine in the air
- An individual genome
Things connected to the internet
3
4 Copyright 2014 FUJITSU
The workplace environment is changing
Past: Working in secured buildings with dedicated workplaces and set times
Today & Future: Working at your own terms, anywhere, at any time
5 Copyright 2014 FUJITSU
What does it mean and what is the impact ?
(Critical) data are leaving companies
The data center is mostly a mobile device
Poor protection versus data centers
Mostly only an (un)actual virus scanner is standard
Data become values and are handled for money, e.g.
Social data
Accounts with password
Credit data
Data are easily available
In Pbyte more data are available ouside as inside a company – „big-data-mobility“
Data centers are highly protected e.g. access, monitoring, damage, data loss
Dealing of data earns more money as with IT equipment e.g.
Social Networks
E-Commerce
Finance / Retail Services
Every organization deals with huge datavolume
6 Copyright 2014 FUJITSU
Definition of IT Security
:: CONFIDENTIALITY ::
Confidential information has to be protected against unauthorized distribution & usage
:: AVAILABILITY ::
The user must have access to IT services, to IT infor-mation and to functions of the IT system at any time
:: DATA CONSISTENCY ::
All data has to be provided in full and unaltered
7 Copyright 2014 FUJITSU
Information Security Market Forecast 2013 -2017
8.3%
Security Services*
Network Security Equipment
Infrastructure Protection
Identity and Access Management
2017
83.6
52.7(63%)
10.9(13%)
16.1(19%)
3.9(5%)
2016
77.2
48.1(62%)
10.3(13%)
15.2(20%)
3.6(5%)
2015
71.3
43.9(62%)
9.7(14%)
14.3(20%)
3.3(5%)
2014
65.8
40.2(61%)
9.1(14%)
13.4(20%)
3.1(5%)
2013
60.8
36.9(61%)
8.6(14%)
12.6(21%)
2.8(5%)
+9.3%
+6.3%
+6.4%
+8.2%
Worldwide Enterprise Information Security Market Forecast (in B US$)
Regional Distribution - Enterprise Information Security Market (based on US$)
31,5% 31,1% 30,8% 30,5%
45,8% 45,9% 45,9% 45,9% 45,9%
16,4% 16,2% 16,2% 16,0% 15,9%
6,2% 6,5% 6,9% 7,3% 7,7%
31,6%
20142013
100%Emerging A/P
(incl. Greater China)
EMEA
Americas
Mature A/P (incl. Japan)
201720162015
+7.3%
+14.6%
+8.3%
+7.4%
Source: Gartner Forecast: Information Security, Worldwide, 2012-2018, 2Q14 Update, Ruggero Contu, Christian Canales and Lawrence Pingree - 08/2014 ; charts created by Fujitsu based on the Gartner report
Global Enterprise Information Security market will reach ~84 B US$ by 2017 growing by 8.3% per year; Americas reflect 46% portion - EMEA & mature A/P are growing below avg.
* includes: Consulting, Implementation, Hard-ware Support & IT Outsourcing
x% …Compound Annual Growth Rate 2013-2017
8 Copyright 2014 FUJITSU
FUJITSU Security Initiative
9 Copyright 2014 FUJITSU
Solving today´s IAM topics with PalmSecure based solutions Current situation:
- Increased ID frauds globally
Customer pain points:- Stolen & misused personal identities causing
slower processes & increased costs & causingnon satisfied customers & employees
This will happen in the market:- Investing in high secured “easy to handle”
professional IAM solutions / services
What Fujitsu is offering:End to End security solutions & servicesbased on Palm Vein biometric authenticationtechnology
From To
Password log in / SSO PalmSecure log in / SSO
Access with key/card PalmSecure Physical access control
Using Pin & Card Using PalmSecure & TOC
10 © FUJITSU LIMITED 2014
PalmSecure IAM areas
ATMs Building Security
Work PlaceProtection
Intranet MobilePayment
SAPApplications
OnlineBanking
DatacenterSecurity
SecuredDMS
Network-/DataSecurity
60.000ATMs with
PalmSecure70M Users
100.000Work Places
with PalmSecure120K Users
300KLocations
withPalmSecure??? Users
10.000with
PalmSecureWS & UB
& Tabs
10.000PACs/TAs
withPalmSecure15M Users
NEW!
250KWork Places
with PalmSecure250K Users
NEW! NEW!
120PACs/DT
withPalmSecure12K Users
Ca. 200 Million Users Globally!
11 © FUJITSU LIMITED 2014
Workplace Protect
Single application for all security relevant settings
Protects workplace devices against unauthorized usage
Automatically locks workplace devices, when user leaves his/her desk
Supports a wide range of security devices
Comes pre-installed on Fujitsu Client Computing Devices
Free of charge for Fujitsu Client Computing Devices
Authentication Method FAR (%) = If FRR (%) =
Face recognition ~ 1.3 ~ 2.6
Voice pattern ~ 0.01 ~ 0.3
Fingerprint ~ 0.001 ~ 0.1
Finger vein ~ 0.0001 ~ 0.01
Iris/Retina ~ 0.0001 ~ 0.01
Fujitsu Palm vein < 0.00008 ~ 0.01
12 © FUJITSU LIMITED 2014
PalmSecure truedentity
Personalization Client (PC or VM)
Infrastructure Server (PC or VM)
Checkpoint (PC)
Personalization-application
Truedentity-clientBrowserRegistration
Service
Access
Management
Personalization Service
Registration Service(Admin WebUI)
eID Service
Checkpoint Login Service+ Access Management
vein scanner card reader
Checkpoint application
Truedentity client
vein scanner card reader
display
read
y ca
rd
net
wor
k (I
P)
IP3
IP1
IP2
Connection over internet with 3 VPN tunnels
Certificate user (smart card and PalmSecure) and application on eIDserver
No silo application Secured channel / data /
authenticationdisplay
keyboard mouse
13 © FUJITSU LIMITED 2014
PalmSecure bioLock for SAP
Fraud prevention Data control Process logging Individually secured processes Controlled authorized financial
transactions
User requests SAP activity.e.g. Log-on, SE16
data Browser, Customer Service activity
bioLock prompts user for biometric scan
Sample biometric template extracted, encrypted, compared with referencetemplate in bioLock/SAP
Activity logged
ActionAllowed
ActionDenied
14 © FUJITSU LIMITED 2014
PalmSecure ID Match
Cutting Edge Technology Ultimate Convenience Maximum Security Independent Functionality Stylish, Hygienic Design Prepared for Multiple Applications
15 Copyright 2014 FUJITSU
PalmSecure Ultrabook U904
Hardware
World’s first notebooks with integrated sensor
FUJITSU Notebook LIFEBOOK U904 Ultrabook™
FUJITSU Workstation CELSIUS H730
PalmSecure Mouse Login Kit and PalmSecure Sensor Guide Kit
Software
Security made easy with Fujitsu’s software solutions
Workplace Protect
Supporting configuration of windows authentication, pre-boot authentication, single-sign-on, password safe and encrypted container
Workplace Manager
Administrator console for remote management of security settingsP
ALM
SE
CU
RE
16 Copyright 2014 FUJITSU
Innovative Palm Vein Authentication Advantages
High Safety & Permanence Hidden under the skin - forgery difficult
Unique even among identical twins Never change - same throughout
life
Detectable only when blood is flowing
High Accuracy Palm vein patterns are highly complex
High applicability
Designed for public usage
Palm veins are insensitive against environment (cold temperature, creamy hands, skin scratches)
High Acceptance Very hygienic due to no-contact operation
Very easy and intuitive to use Biometric pattern hidden inside
the body (privacy)
17 Copyright 2014 FUJITSU
FUJITSU PalmSecure ™ Innovation Contest
Dr. Markus DraegerInnovation Program Manager
18 Copyright 2014 FUJITSU
The new Device – FUJITSU PalmSecure ™ ID Match
19 Copyright 2014 FUJITSU
The Contest Challenge
What are the application areas for a match-on-device system with FUJITSU PalmSecure™ technology?
Which use cases can you imagine in the fields of e.g. government, finance, enterprise, automotive, retail, energy, industry 4.0 or others for this technology?
How can the device look like in the different usage scenarios?
Where can the FUJITSU PalmSecure™ sensor technology be applied in general?
20 Copyright 2014 FUJITSU
The Contest
Great response of the innovator community to the technology and the challenge questions
Run time 7 weeks
11326 visitors from 92 countries
414 ideas
925 comments
Website with social media functionality provided by Hyve AG
21 Copyright 2014 FUJITSU
Winners
On November 3rd, the jury awarded prizes to 4 participants (two 3rd prizes)
1. Prize: Integration of PalmSecure into a smart watch(Shmuel Goldfisher)
2. Prize: Use of PalmSecure for assurance of parcel delivery to the correct addressee (Katherine Rushton)
3. Prize: Use of PalmSecure to replace the Bahncard (Suvrajit Saha)
Second 3. Prize: Use of PalmSecure in Fleet Management (Tizu Tiberiu)
22 Copyright 2014 FUJITSU
Thank you for listening!
23 Copyright 2014 FUJITSU