executive customer council 2017 - fujitsu aktuell€¦ · 4 © fujitsu technology solutions gmbh...
TRANSCRIPT
0 © Fujitsu Technology Solutions GmbH 2017
Executive Customer Council 2017
30. und 31. Mai 2017 Würzburg
1 © Fujitsu Technology Solutions GmbH 2017
Geheime Informationen in unsicheren Umgebungen schützen
Leif Sundsbo CEO Hiddn Security AS
Rüdiger Landto Head of Client Business EMEIA
Product Business Group
2 © Fujitsu Technology Solutions GmbH 2017
FUJITSU Notebooks and Tablets LIFEBOOK and STYLISTIC
Digitaler Wandel Mobilität Sicherheit
3 © Fujitsu Technology Solutions GmbH 2017
Digitalisation within a hyper connected world challenges companies in different ways …
Connectivity Modern Workplace
Design Mobility Security
4 © Fujitsu Technology Solutions GmbH 2017
Digitale Transformation Firmen setzen auf mobile Endgeräte
26%
40%
41%
47%
57%
62%
64%
66%
MDM
Services, excl cloud
App development for mobile
Cloud
Tablets
Servers
Notebook
Storage
2017 IT SPENDING PRIORITIES
34%
43%
46%
46%
51%
52%
53%
54%
54%
62%
65%
70%
Current devices not suitable
Improve competitive advantage/market share
Drive innovative image
Needs/apps not fulfilled by trad devices
Improve customer facing engagement
Reducing cost of business
Facilitate collab and info sharing
Workspace transformation
Digital transformation
Part of mobility strategy
Increase employees' flexibility/mobility
Increase employee's productivity
KEY DEPLOYMENT DRIVERS
Source: IDC Tablet in Enterprise 2.0 - The Larger
Opportunity - Multi Client Study 2016, IDC Europe,
Sep 2016
5 © Fujitsu Technology Solutions GmbH 2017
Hurdles and inhibitors
Source : IDC Study Aggregate data for all countries (France, UK, Germany), all company sizes (10 – 500+ employees), all verticals
B9a. What do you see as the key challenges or inhibitors for deploying tablets or hybrids in your organization?
N = 1203
52% 48%
44%
39% 37% 35% 35% 34%
29% 26%
21%
Security issues,
data loss
Total cost of
ownership
App
development
challenges
Mobile device
management
complexity
Version control
issues between
mobile and
enterprise appS
Employees'
resistance to
change
Compliance and
regulatory
challenges
Concerns
related to
linking mobile
platform to
existing IT
systems
Senior
management
resistance to
change
Insufficient tools
to demonstrate
ROI
Doubts on
advantage of
tablets and
other devices
6 © Fujitsu Technology Solutions GmbH 2017
Fujitsu Product Values
Reliability – quality and investment protection
Test center to put notebooks to the acid test
30 years of experience
Green – harmonise the environment and business
0-Watt AC Adapter
Reuse of waste plastics for new parts
Human-centric – perfect in form and functional design
Products empowering new work styles
Configurable to individual needs (e.g. shell concept)
Superior security and flexibility
Embedded PalmSecure™ technology
Choice of fingerprint sensor, SmartCard reader, TPM
7 © Fujitsu Technology Solutions GmbH 2017
NATO TEMPEST standard, SDIP-27 level A.
CELSIUS H760
TEMPEST A
Mobile Server
LIFEBOOK E746
TEMPEST A
1.7 kg => 3kg Ultra light
8 © Fujitsu Technology Solutions GmbH 2017
The Palm Secure Ecosystem is growing
Best Practice von BWO Switzerland
Youtube: BWO Handbiometrie Fujitsu (92CSQ4RGTL4)
BWO Handbiometrie Fujitsu
9 © Fujitsu Technology Solutions GmbH 2017
Cyber Facts
GDPR
Securing the Endpoint
How Hiddn are working with the Norwegian Defense and NBV
Leif Sundsbo CEO Hiddn Security AS
10 © Fujitsu Technology Solutions GmbH 2017
Cyber Facts
11 © Fujitsu Technology Solutions GmbH 2017
List of Cyber Stats – Cyber Spending
Cyber Spending and the Cost of Cyber Crime
Security budgets have increased 35X over the past 13 years
(Cybersecurity Ventures)
In 2004 the global cybersecurity market was worth $3.5 billion. By
the end of 2017 it will be worth $120 billion (Wired)
Cybercrime will cost the world in excess of $6 trillion annually by
2021 (Cybersecurity Ventures)
The average cost per breach worldwide was $4 million, that figure
rose to $7 million in the U.S. (Ponemon Institute)
12 © Fujitsu Technology Solutions GmbH 2017
List of Cyber Stats - Ransomware
According to IBM:
Ransomware increased 6,000% in 2016
Ransomware was in almost 40% of all spam messages in 2016
70% of business victims paid the hackers to get their data back
Of those who paid, 50% paid more than $10,000 and 20% paid more
than $40,000
Almost 40% of consumers would be willing to pay more than $100 to
get data back
13 © Fujitsu Technology Solutions GmbH 2017
List of Cyber Stats – The Human Factor
95 % of all security incidents involve human error (IBM)
According to Ponemon
53 % of mobile professionals carry confidential company information
65 % of those who carry confidential company information don’t take steps to protect it
Up to 12,000 laptop computers are lost weekly
60 % of fired employees steal important corporate data after departing their position (Global HR)
According to the Verizon 2016 Data Breach Investigations Report:
30 % of phishing messages were opened by the receiver
89 % of all attacks involve financial or espionage motivations
63 % percent of confirmed data breaches involve weak, default or stolen passwords
14 © Fujitsu Technology Solutions GmbH 2017
Dissecting Data Breaches and Debunking Myths
Source: Trend Micro
15 © Fujitsu Technology Solutions GmbH 2017
Almost 40 % of Data loss from physical media
Source: McAfee Labs
16 © Fujitsu Technology Solutions GmbH 2017
Lost Laptops – Heathrow Airport
58 lost laptops
last week
17 © Fujitsu Technology Solutions GmbH 2017
GDPR
18 © Fujitsu Technology Solutions GmbH 2017
The EU General Data Protection Regulation (GDPR): Are you ready?
19 © Fujitsu Technology Solutions GmbH 2017
GDPR – What does it mean (Data breaches)
Article 33: The reporting of a data breach must be reported to the
Supervisory Authority within 72 hours of the data breach
Article 34: The notice to data subjects is not required if the data
controller has implemented pseudonymizing techniques like
encryption along with adequate technical and organizational
protection measures to the personal data affected by the data breach
20 © Fujitsu Technology Solutions GmbH 2017
GDPR – What does it mean (Sanctions)
A fine up to 20,000,000 EUR or up to 4% of the annual worldwide
turnover of the preceding financial year in case of an enterprise,
whichever is greater (Article 83, Paragraph 5 & 6)
21 © Fujitsu Technology Solutions GmbH 2017
Securing the Endpoint
22 © Fujitsu Technology Solutions GmbH 2017
The Information is important to protect
23 © Fujitsu Technology Solutions GmbH 2017
No Silver Bullett
24 © Fujitsu Technology Solutions GmbH 2017
Layered Security
25 © Fujitsu Technology Solutions GmbH 2017
Modern Endpoint Protection Strategy
Source: Gartner
26 © Fujitsu Technology Solutions GmbH 2017
How Hiddn have worked with the Norwegian Defense and NBV
27 © Fujitsu Technology Solutions GmbH 2017
1998 2010 2013 2015 2014 2017 2016 2011
FINANCIAL The company
receives
10mnok in funding
from the US
Defence. FINANCIAL IPO
SALES Start building Partner
and Distributor
program
R&D ACTIVITIES
PRODUCTS CoCrypt: NSM Re-Certification in
process
Laptop1+: NSM Re-Certification in
process
SALES
Hiddn secures contract with a Key Opinion Leader in
Europe
SafeDisK: NBV agreement signed
MARKET SCOPE New market- and
product strategy
launched. Target
segments are i) Military,
ii) government, iii)large
industrial companies, iv)
healthcare institutions,
v) financial enterprises
2012
SCALING AND PRODUCT DEVELOPMENT Cloud authentication
PKI Protocols
USB disk
PROTOTYPING PROOF OF
CONCEPT
2003
FINANCIAL Receives funding
from VC. New
HDD launched.
2009
PRODUCT SCOPE To develop a hardware encryption
solution where all encryption keys
are stored on an external token.
PRODUCT CoCrypt: NSM Re-
Certification 28/10-14 (til
28/2-16)
Laptop1+: NSM Re-
Certification 28/10-14 (til
28/2-16)
FINANCIAL Listed on OTC
SALES Strategic co-operation with
Fujitsu Norge
NEW NAME Hiddn Security
COMMERSIALI-
SATION
PROTOTYPE Start building
Partner and
Distributor program
PRODUCT Phasing out CM1 based
products
Starting CM1+ tech upgrade
of CM1 (Former SecureD)
PRODUCTS Laptop1+ (CM1+
based) Tested by
N.Defence, 8.2013 PRODUCTS CoCrypt CM1+: FIPS Certified
#2565
Laptop1+/CM1+:FIPS Certified
#2569
PRODUCTS IRD-Contract /NBV
(SafeDisk)
IRD-Contract /FLO
(coCrypt)
IN-kontrakt tilskudd
PRODUCT/Module SecureD FIPS 140-2 L3
Certified
#592, 12.01.2005. #717,
01.05.07
SecureD Common Criteria
EAL4+
Certified, 18.10.2006
SALES CM2 delivered to
NBV, 6.2014
SALES CM2 FW upgrade
delivered to NBV,
6.2015
PRODUCT /
SALES CM2/SafeDisk
IATO
CONFIDENTIAL
in NL., 25/11-16
Shipment of
SafeDisk to NL
Governm.,
13.12.2016
PRODUCT SecureD godkjent
12.09.2008 av NSM,
dette for 3 år, generell
regel.
PRODUCT SecureD utløp av NSM
Godkjenning
13.09.2011
PRODU
CTS coCrypt:
Midlertidig
Godkjenni
ng
utvidelse
jobbes
med
Latop1+:
Nei.
28 © Fujitsu Technology Solutions GmbH 2017
Our Value proposition
Security
Your data is always encrypted when powered off and all keys are deleted
Usability
No user training is needed
Be confident that data remains
secure even if a device is lost
or stolen
29 © Fujitsu Technology Solutions GmbH 2017
Solutions
Fully encrypted USB flash drive (micro-SD)
Display for ease of use
Two factor authentication
Encryption key deleted when flash drive is
removed from PC
User friendly; the user only need to type a
pin code
Fully encrypted laptop hard drive (SSD)
Pre-boot authentication PIN
Two factor authentication
Encryption key deleted when laptop is turned off or in hibernation
User friendly; the user only needs to insert a smart card and a pin code
Encrypted laptop hard drive (SafeDisk) Encrypted USB flash drive (CoCrypt) Encrypted external USB hard drive
Fully encrypted external hard drive connecting through USB
Pre-boot authentication PIN
Two factor authentication
Encryption key deleted when drive is not connected to a PC / laptop
User friendly; the user only needs to insert a smart card and a pin code
Can operate independently of PC / laptop’s own operating system
NEW
30 © Fujitsu Technology Solutions GmbH 2017
Certifications
FIPS 140-2 Level 3
The Norwegian National Security Authority (NSM)
NBV in The Netherlands
31 © Fujitsu Technology Solutions GmbH 2017
Target markets and use cases
Defence
• From Restricted to Secret
• Unclassified when turned off
• Northrop Grumman
Public Sector (The Netherlands)
• Employees can bring their PC`s out of the office
• Compliance
Enterprises
• Secure internal information
• Compliance
32 © Fujitsu Technology Solutions GmbH 2017
Company Overview
Founded in 1998
Develops, manufactures and markets hardware-based encryption and authentication solutions
Located in Oslo
All solutions are designed, developed and produced in Norway
Listed on OSEBX with ticker Hiddn
33 © Fujitsu Technology Solutions GmbH 2017
34 © Fujitsu Technology Solutions GmbH 2017
Leif Sundsbø
+47 984 40 400
www.hiddn.no