©2010 fujitsu technology solutions product values notebooks
Post on 19-Dec-2015
215 views
TRANSCRIPT
INTERNAL USE ONLYINTERNAL USE ONLY
©2010 FUJITSU TECHNOLOGY SOLUTIONS
Product Values NotebooksProduct Values Notebooks
INTERNAL USE ONLYINTERNAL USE ONLY
Our product valuesOur product values
2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
Human-centric
Green
Innovation Reliability
INTERNAL USE ONLYINTERNAL USE ONLY
Innovation Innovation
Our approach – Continous innovations in mobile computing since almost 30 years
Innovations – 1st notebook with embedded mobile broadband with telco partnerships, 1st Bluetooth notebook, 1st notebook with a touchpad.
Security and flexibility – Due to features like fingerprint sensor, ATP as well as location-independent access to the internet through embedded 3G/UMTS.
DeskView load and customizing –For the efficient configuration and individualization of every notebook providing optimum cost savings despite complex infrastructures.
Manageability – Attain a significant TCO* reduction via a comprehensive offer of system management functions
* Source: Gartner Research – 'How to Reduce Your PC TCO 30% in 2011', 20.03.2009, ID: G00166195
Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
Reliability
GreenHuman-centric
Innovation
3
INTERNAL USE ONLYINTERNAL USE ONLY
ReliabilityReliability
Our promise – Sytem quality, expertise and excellence
Top system quality – Minimal downtime rates,excellent test processes (lifecycle test, etc.) andmaximum reliability
Experienced engineering – Many years of experience,direct contact with engineers, the combinationof German precision with Japanese quality
Excellent production – Thanks to award-winning production processes and production sites
Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
International standards
Reliability
GreenHuman-centric
Innovation
4
INTERNAL USE ONLYINTERNAL USE ONLY
Our responsibility – To harmonize the environment and business with green ideas
Responsibility to the environment –By selecting environmental materials, energy-optimized product implementation and environmentally conscious recycling.
Responsibility to business –With sustainable cost reductions thanks to innovative, energy-saving technologies and efficient supply chains.
A joint contribution with the customer – Less energy consumption due to the usage of energy-efficient components, the EcoButton, highly efficient power supply units (87%) and an LED backlight.
GreenGreen
GreenHuman-centric
Innovation Reliability
Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS5
INTERNAL USE ONLYINTERNAL USE ONLY
Human-centricHuman-centric
Our requirements – Ergonomic and customer-oriented
Ergonomic working – Designed with the user in mind, e.g: high-bright LED display, GS certified keyboard*
Fitting all needs - Enhance and optimize your system using the modularbay. Different form factors to meet all needs.
High level of user friendliness – The wide range of control options(touchpad, touch stick, ScrollWheel, etc.) provides easy control of the system. Quick and easy access to recurring functions (application buttons).
Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
*Certificate to enter public sectors in Germany
Reliability
GreenHuman-centric
Innovation
6
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Mobile and remote users with confidential information outside the company campus
Devices get lost or damaged
Devices can be stolen Memory modules, external hard disk drives
(HDD), USB devices
Unauthorized persons try to eavesdrop on your local data and over the network From external and internal
Malicious software accesses, modifies or deletes your data
Attackers attempt to prevent users from using required services
Why security is importantWhy security is important
8
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Disturbed processes
Downtime
Loss of data Intellectual property Strategic documents
Loss of time
Loss of money
Loss of business
Loss of image Reputation, Public confidence
Insolvency
Affects Financial strength Stock value Customer loyalty
Security risks threaten the tremendous benefits offered by IT
€
Security is one of the top problems of IT managers across the industry
Impact of security risksImpact of security risks
9
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Confidentiality (privacy)
No information access without authorization
Integrity No alteration of information without
authorization
Availability Ensure access to information for authorized
users when required Prevent denial of service Data
andservices
AvailabilityC
onfid
entia
lity
Integrity
CIA triangle
What is IT security?What is IT security?
10
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Physical
Security
System
Security
User
Security
Keep your secrets guarded
A non-secure IT infrastructure impedes the success of new applications and the growth of business!
Theft protection
System intrusiondetection
Anti-virus
Data encryption
BIOS virus protection
SystemTrack&
DataProtect
Pre-boot HDD password
Seagate HD
with FDE
TPM support
SmartCard
Fingerprint
Operating System Logon
System access
Single-Sign-On
Anti-spam
PersonalFirewall
Client Security Value propositionClient Security Value proposition
11
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Services
OS
Data
Device
BIOS
Network
Staff & People
Unauthorized use,Social engineering
Mobile devices
Theft, damage, intrusion, insufficient access
control
Software and DataModification, Theft, Spy,
unsafe passwords,Virus, Spam, etc.
Remote accessVirus per mail
Physical protection
Mechanical features, alerts
Access protectionfor data and applications
Authentication, encryption
Detection and removalof abnormalities
Anti-virus, RKD, firewall,Intrusion detection / prevention,
web and content filtering
Backup and recovery
Patch management
BIOS security functions
ATPAnti-Theft Protection
Security threats and countermeasuresSecurity threats and countermeasures
12
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Measures that prevent attackers from system access
Mechanical housing lock (desktop) Prohibits unauthorized persons from opening
Eye for pad lock (desktops)
Seal option (desktop, via customizing)
KensingtonLock support
Customer-specific logos (customization)
Intrusion switch (desktops) Alert to system management, when cabinet is opened
Component change alert
Non-presence alert
Physical protection: Mechanical featuresPhysical protection: Mechanical features
13
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Featured in all Business Clients – ex factory
Protects all data stored on hard disk from unauthorized access Set or change hard disk drive password via BIOS Setup Utility Independent from OS
Stored in hard disk drives‘ firmware and moves with hard disk drive Only entering the correct password unlocks hard disk drive (even in
another desktop PC) Hard disk drive passwords cannot be removed by reformatting it
Each hard disk drive may have a separate password
Power down required after 3 unsuccessful attempts
Protect your hard disk drive from unauthorized access
BIOS Security functions Hard disk PWBIOS Security functions Hard disk PW
14
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Restrict access to protected information to authorized resources
Authentication (Verify a claim of identity) Something you know (e.g. password) Something you have (e.g. chip card, token) Something you are (biometrics, e.g. fingerprint)
Strong authentication Two- / multi-factor authentication
(e.g. something you know, something you have)
Encryption Make information unusable for unauthorized users
Access protectionAccess protection
15
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Full Disk Encryption of data:
Software application to encrypt data Benefit: Hardware independent Disadvantage:
• Loss of system performance• Initial installation takes about 2 hours
Dedicated encryption chip(e.g.with Seagate Momentus ST9160312AS, available for all professional notebooks) Benefit:
• Nearly no loss of performance• Data is automatically and always encrypted• Hard disk drive password at the BIOS protect the data• Available for LIFEBOOKs and ESPRIMO Mobiles only
Access protection- HW based encryptionAccess protection- HW based encryption
16
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Same in size as credit card (portable) High market acceptance and ease of use
Secure storage for sensitive information Private keys, account numbers, passwords, fingerprints,
web addresses
Integrated microprocessor with CardOS Efficient crypto coprocessor for key generation
and strong encryption of data and files
User identification by PIN Possess device and the SmartCard and know PIN Any attempt to attack memory causes instant destruction
of chip
Multifunctional (universal identification) PC access, building access, time recording
ISO 7816-compatible (application commands)
Access protection SmartCardAccess protection SmartCard
17
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
User-friendly solution for system units out of the user‘s reach
Connected via USB
Combination of security and input device
Secure PIN Entry (SPE) Applications switch keyboard to secure PIN entry PIN is transmitted from numeric key block to chip card
• All PIN operations are handled within the keyboard itself Key logging useless
Certificates Common Criteria EAL3+ compliance
(Qualified for electronic signatures) Certified by Gematic
• MKT 1.0 (TUVIT Trusted Product)• MKT+
Access protect. SmartCase KB SCR PROAccess protect. SmartCase KB SCR PRO
18
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Chip mounted on motherboard of PC system
Core of TPA (Trusted Platform Architecture)
Root encryption key protected in silicon Unique and bound to a specific system Tamper resistant Key hierarchy Encrypted areas on hard disk drive with keys for data
encryption
Key elements Random number generator for key generation Non-volatile memory for keys
Generate and store/protect passwords – PC system & user authentication
Access protection TPM moduleAccess protection TPM module
19
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Protects keys used by e.g. BitLocker
Unique platform authentication Secure e-commerce No longer dependent on device ID
User authentication
Encryption of Data Virtual partitions
Corporate network access via VPN
Login request
Authentication
Challenge
Unable to supply key
Key Challenge
Successful hacker attempt without TPM
Unsuccessful hacker attempt with TPM
Access protection TPM appl. scenariosAccess protection TPM appl. scenarios
20
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
It‘s nearly the same technology Similar hardware capabilities – Micro Controller, RAM,
ROM, Flash Common cryptographic services Asymmetric cryptography Tamper resistance – Means if someone tries to hack the
chip, the chip and the data will be destroyed
Except: The TPM is part of the system security, bound to the
mainboard. Identifies hardware and user. The SmartCard is part of user security.
Identifies only the user. The TPM chip can be used to build up a chain of trust The TPM alerts the user if someone tried or tries to
manipulate the system
User
Security
Security bound
to the hardware
Root of
Trust
Hardware pro-
tected storage
Secure network
data transfer
Enhanced
Authentication
Is TPM a kind of a SmartCard? Is TPM a kind of a SmartCard?
21
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
SmartCase Logon+ Administration Administrate user accounts Enrollment of fingerprints Administrate SmartCard Administrate TPM module
SmartCase Logon+ SSO (Single Sign On) Store logon credentials in a safe way Auto Login for web accounts
Secure Drive Store data in an encrypted virtual drive Open encrypted drive with SmartCard,
PIN or fingerprint
BIOS Security - SmartCase Logon+ V.2.2BIOS Security - SmartCase Logon+ V.2.2
22
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Keep your secrets
Benefits:
Simplified user access to MS Windows and web pages One login for the individual
Automatic authentication Not even drag and drop required
Higher productivity No „try-and-error“ time losses
Higher end user satisfaction
Never forget your PIN – always at your side, no matter the application
User Authentication
Automatic authentication to
websites and applications
OS Logon
Single sign-on
SmartCase Logon+ Version 2.2SmartCase Logon+ Version 2.2
23
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Make it different
Delivery of technically identical systems Simplifies network installation Better system maintenance
Ready-to-run systems Reduces installation time and cost
Integration of customer specific components Eliminates modifications at customer site
Individual solutions
One order code for the complete system during lifecycle
End-to-end project support
Highest product continuity and lifecycle extension through sophisticated lifecycle management
Shipment according to customer specific roll-out requirements
You are looking for …You are looking for …
25
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Customizing ServicesCustomizing Services
27
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Make it different
Project platform stability during the complete hardware lifecycle
Customer-specific hardware(no part of product portfolio) By consignment By Fujitsu Technology Solutions own global sourcing /
R&D / test center Component mix, i.e. graphics cards, DAT-drives, other
displays, security features, etc.
Integration of customer accessories (cables, mouse pads, media) all in one box
Master key solutions (PC and Mobiles)
Hardware ServicesHardware Services
28
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Make it different
Customer software load for „Ready-to-run“ systems From master hard disk drive From master flash module (thin clients) From CD/DVD Replication and Preparation
Specific CMOS settings Individual boot sequence Special passwords Settings for power management, etc.
Software individualized systems from factory (DeskView Load)
Software ServicesSoftware Services
29
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Make it different
Customer asset tags (incl. MAC address) for a cost effective inventory management and roll-out Label on the system and card box Create and communicate Excel-file including MAC
address, system serial number and Inventory number
Flash inventory number into BIOS for an easy centralized administration
UUID on system and delivery note for a cost effective roll-out
UUID: 12345678-1234-1234-5678-1234-5678
Add-on Services (1)Add-on Services (1)
30
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Make it different
XXL-package for a simplified roll-out and environmental awareness
Neutral package (without FTS logo) for an easy recommercialisation
Box-in-box package for a secure transport
Additional marks or logos on the cabinet (laser, label or tampon print) Brand awareness Anti-theft protection Keyboard lasering
Add-on Services (2)Add-on Services (2)
31
INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS
Make it different
Hardware component freeze during lifecycle and after general availability Hard disks Optical drives System boards Additional cards
BIOS freeze for an easy handling of large IT environments
Announcement of BIOS changes gives the customer the choice of whether or not to switch to the new BIOS
Management
Lifecycle
Extended Component LifetimeExtended Component Lifetime
32