executive customer council 2017 - fujitsu aktuell€¦ · 4 © fujitsu technology solutions gmbh...

35
0 © Fujitsu Technology Solutions GmbH 2017 Executive Customer Council 2017 30. und 31. Mai 2017 Würzburg

Upload: others

Post on 23-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

0 © Fujitsu Technology Solutions GmbH 2017

Executive Customer Council 2017

30. und 31. Mai 2017 Würzburg

Page 2: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

1 © Fujitsu Technology Solutions GmbH 2017

Geheime Informationen in unsicheren Umgebungen schützen

Leif Sundsbo CEO Hiddn Security AS

Rüdiger Landto Head of Client Business EMEIA

Product Business Group

Page 3: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

2 © Fujitsu Technology Solutions GmbH 2017

FUJITSU Notebooks and Tablets LIFEBOOK and STYLISTIC

Digitaler Wandel Mobilität Sicherheit

Page 4: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

3 © Fujitsu Technology Solutions GmbH 2017

Digitalisation within a hyper connected world challenges companies in different ways …

Connectivity Modern Workplace

Design Mobility Security

Page 5: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

4 © Fujitsu Technology Solutions GmbH 2017

Digitale Transformation Firmen setzen auf mobile Endgeräte

26%

40%

41%

47%

57%

62%

64%

66%

MDM

Services, excl cloud

App development for mobile

Cloud

Tablets

Servers

Notebook

Storage

2017 IT SPENDING PRIORITIES

34%

43%

46%

46%

51%

52%

53%

54%

54%

62%

65%

70%

Current devices not suitable

Improve competitive advantage/market share

Drive innovative image

Needs/apps not fulfilled by trad devices

Improve customer facing engagement

Reducing cost of business

Facilitate collab and info sharing

Workspace transformation

Digital transformation

Part of mobility strategy

Increase employees' flexibility/mobility

Increase employee's productivity

KEY DEPLOYMENT DRIVERS

Source: IDC Tablet in Enterprise 2.0 - The Larger

Opportunity - Multi Client Study 2016, IDC Europe,

Sep 2016

Page 6: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

5 © Fujitsu Technology Solutions GmbH 2017

Hurdles and inhibitors

Source : IDC Study Aggregate data for all countries (France, UK, Germany), all company sizes (10 – 500+ employees), all verticals

B9a. What do you see as the key challenges or inhibitors for deploying tablets or hybrids in your organization?

N = 1203

52% 48%

44%

39% 37% 35% 35% 34%

29% 26%

21%

Security issues,

data loss

Total cost of

ownership

App

development

challenges

Mobile device

management

complexity

Version control

issues between

mobile and

enterprise appS

Employees'

resistance to

change

Compliance and

regulatory

challenges

Concerns

related to

linking mobile

platform to

existing IT

systems

Senior

management

resistance to

change

Insufficient tools

to demonstrate

ROI

Doubts on

advantage of

tablets and

other devices

Page 7: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

6 © Fujitsu Technology Solutions GmbH 2017

Fujitsu Product Values

Reliability – quality and investment protection

Test center to put notebooks to the acid test

30 years of experience

Green – harmonise the environment and business

0-Watt AC Adapter

Reuse of waste plastics for new parts

Human-centric – perfect in form and functional design

Products empowering new work styles

Configurable to individual needs (e.g. shell concept)

Superior security and flexibility

Embedded PalmSecure™ technology

Choice of fingerprint sensor, SmartCard reader, TPM

Page 8: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

7 © Fujitsu Technology Solutions GmbH 2017

NATO TEMPEST standard, SDIP-27 level A.

CELSIUS H760

TEMPEST A

Mobile Server

LIFEBOOK E746

TEMPEST A

1.7 kg => 3kg Ultra light

Page 9: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

8 © Fujitsu Technology Solutions GmbH 2017

The Palm Secure Ecosystem is growing

Best Practice von BWO Switzerland

Youtube: BWO Handbiometrie Fujitsu (92CSQ4RGTL4)

BWO Handbiometrie Fujitsu

Page 10: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

9 © Fujitsu Technology Solutions GmbH 2017

Cyber Facts

GDPR

Securing the Endpoint

How Hiddn are working with the Norwegian Defense and NBV

Leif Sundsbo CEO Hiddn Security AS

Page 11: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

10 © Fujitsu Technology Solutions GmbH 2017

Cyber Facts

Page 12: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

11 © Fujitsu Technology Solutions GmbH 2017

List of Cyber Stats – Cyber Spending

Cyber Spending and the Cost of Cyber Crime

Security budgets have increased 35X over the past 13 years

(Cybersecurity Ventures)

In 2004 the global cybersecurity market was worth $3.5 billion. By

the end of 2017 it will be worth $120 billion (Wired)

Cybercrime will cost the world in excess of $6 trillion annually by

2021 (Cybersecurity Ventures)

The average cost per breach worldwide was $4 million, that figure

rose to $7 million in the U.S. (Ponemon Institute)

Page 13: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

12 © Fujitsu Technology Solutions GmbH 2017

List of Cyber Stats - Ransomware

According to IBM:

Ransomware increased 6,000% in 2016

Ransomware was in almost 40% of all spam messages in 2016

70% of business victims paid the hackers to get their data back

Of those who paid, 50% paid more than $10,000 and 20% paid more

than $40,000

Almost 40% of consumers would be willing to pay more than $100 to

get data back

Page 14: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

13 © Fujitsu Technology Solutions GmbH 2017

List of Cyber Stats – The Human Factor

95 % of all security incidents involve human error (IBM)

According to Ponemon

53 % of mobile professionals carry confidential company information

65 % of those who carry confidential company information don’t take steps to protect it

Up to 12,000 laptop computers are lost weekly

60 % of fired employees steal important corporate data after departing their position (Global HR)

According to the Verizon 2016 Data Breach Investigations Report:

30 % of phishing messages were opened by the receiver

89 % of all attacks involve financial or espionage motivations

63 % percent of confirmed data breaches involve weak, default or stolen passwords

Page 15: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

14 © Fujitsu Technology Solutions GmbH 2017

Dissecting Data Breaches and Debunking Myths

Source: Trend Micro

Page 16: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

15 © Fujitsu Technology Solutions GmbH 2017

Almost 40 % of Data loss from physical media

Source: McAfee Labs

Page 17: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

16 © Fujitsu Technology Solutions GmbH 2017

Lost Laptops – Heathrow Airport

58 lost laptops

last week

Page 18: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

17 © Fujitsu Technology Solutions GmbH 2017

GDPR

Page 19: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

18 © Fujitsu Technology Solutions GmbH 2017

The EU General Data Protection Regulation (GDPR): Are you ready?

Page 20: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

19 © Fujitsu Technology Solutions GmbH 2017

GDPR – What does it mean (Data breaches)

Article 33: The reporting of a data breach must be reported to the

Supervisory Authority within 72 hours of the data breach

Article 34: The notice to data subjects is not required if the data

controller has implemented pseudonymizing techniques like

encryption along with adequate technical and organizational

protection measures to the personal data affected by the data breach

Page 21: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

20 © Fujitsu Technology Solutions GmbH 2017

GDPR – What does it mean (Sanctions)

A fine up to 20,000,000 EUR or up to 4% of the annual worldwide

turnover of the preceding financial year in case of an enterprise,

whichever is greater (Article 83, Paragraph 5 & 6)

Page 22: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

21 © Fujitsu Technology Solutions GmbH 2017

Securing the Endpoint

Page 23: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

22 © Fujitsu Technology Solutions GmbH 2017

The Information is important to protect

Page 24: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

23 © Fujitsu Technology Solutions GmbH 2017

No Silver Bullett

Page 25: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

24 © Fujitsu Technology Solutions GmbH 2017

Layered Security

Page 26: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

25 © Fujitsu Technology Solutions GmbH 2017

Modern Endpoint Protection Strategy

Source: Gartner

Page 27: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

26 © Fujitsu Technology Solutions GmbH 2017

How Hiddn have worked with the Norwegian Defense and NBV

Page 28: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

27 © Fujitsu Technology Solutions GmbH 2017

1998 2010 2013 2015 2014 2017 2016 2011

FINANCIAL The company

receives

10mnok in funding

from the US

Defence. FINANCIAL IPO

SALES Start building Partner

and Distributor

program

R&D ACTIVITIES

PRODUCTS CoCrypt: NSM Re-Certification in

process

Laptop1+: NSM Re-Certification in

process

SALES

Hiddn secures contract with a Key Opinion Leader in

Europe

SafeDisK: NBV agreement signed

MARKET SCOPE New market- and

product strategy

launched. Target

segments are i) Military,

ii) government, iii)large

industrial companies, iv)

healthcare institutions,

v) financial enterprises

2012

SCALING AND PRODUCT DEVELOPMENT Cloud authentication

PKI Protocols

USB disk

PROTOTYPING PROOF OF

CONCEPT

2003

FINANCIAL Receives funding

from VC. New

HDD launched.

2009

PRODUCT SCOPE To develop a hardware encryption

solution where all encryption keys

are stored on an external token.

PRODUCT CoCrypt: NSM Re-

Certification 28/10-14 (til

28/2-16)

Laptop1+: NSM Re-

Certification 28/10-14 (til

28/2-16)

FINANCIAL Listed on OTC

SALES Strategic co-operation with

Fujitsu Norge

NEW NAME Hiddn Security

COMMERSIALI-

SATION

PROTOTYPE Start building

Partner and

Distributor program

PRODUCT Phasing out CM1 based

products

Starting CM1+ tech upgrade

of CM1 (Former SecureD)

PRODUCTS Laptop1+ (CM1+

based) Tested by

N.Defence, 8.2013 PRODUCTS CoCrypt CM1+: FIPS Certified

#2565

Laptop1+/CM1+:FIPS Certified

#2569

PRODUCTS IRD-Contract /NBV

(SafeDisk)

IRD-Contract /FLO

(coCrypt)

IN-kontrakt tilskudd

PRODUCT/Module SecureD FIPS 140-2 L3

Certified

#592, 12.01.2005. #717,

01.05.07

SecureD Common Criteria

EAL4+

Certified, 18.10.2006

SALES CM2 delivered to

NBV, 6.2014

SALES CM2 FW upgrade

delivered to NBV,

6.2015

PRODUCT /

SALES CM2/SafeDisk

IATO

CONFIDENTIAL

in NL., 25/11-16

Shipment of

SafeDisk to NL

Governm.,

13.12.2016

PRODUCT SecureD godkjent

12.09.2008 av NSM,

dette for 3 år, generell

regel.

PRODUCT SecureD utløp av NSM

Godkjenning

13.09.2011

PRODU

CTS coCrypt:

Midlertidig

Godkjenni

ng

utvidelse

jobbes

med

Latop1+:

Nei.

Page 29: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

28 © Fujitsu Technology Solutions GmbH 2017

Our Value proposition

Security

Your data is always encrypted when powered off and all keys are deleted

Usability

No user training is needed

Be confident that data remains

secure even if a device is lost

or stolen

Page 30: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

29 © Fujitsu Technology Solutions GmbH 2017

Solutions

Fully encrypted USB flash drive (micro-SD)

Display for ease of use

Two factor authentication

Encryption key deleted when flash drive is

removed from PC

User friendly; the user only need to type a

pin code

Fully encrypted laptop hard drive (SSD)

Pre-boot authentication PIN

Two factor authentication

Encryption key deleted when laptop is turned off or in hibernation

User friendly; the user only needs to insert a smart card and a pin code

Encrypted laptop hard drive (SafeDisk) Encrypted USB flash drive (CoCrypt) Encrypted external USB hard drive

Fully encrypted external hard drive connecting through USB

Pre-boot authentication PIN

Two factor authentication

Encryption key deleted when drive is not connected to a PC / laptop

User friendly; the user only needs to insert a smart card and a pin code

Can operate independently of PC / laptop’s own operating system

NEW

Page 31: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

30 © Fujitsu Technology Solutions GmbH 2017

Certifications

FIPS 140-2 Level 3

The Norwegian National Security Authority (NSM)

NBV in The Netherlands

Page 32: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

31 © Fujitsu Technology Solutions GmbH 2017

Target markets and use cases

Defence

• From Restricted to Secret

• Unclassified when turned off

• Northrop Grumman

Public Sector (The Netherlands)

• Employees can bring their PC`s out of the office

• Compliance

Enterprises

• Secure internal information

• Compliance

Page 33: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

32 © Fujitsu Technology Solutions GmbH 2017

Company Overview

Founded in 1998

Develops, manufactures and markets hardware-based encryption and authentication solutions

Located in Oslo

All solutions are designed, developed and produced in Norway

Listed on OSEBX with ticker Hiddn

Page 34: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

33 © Fujitsu Technology Solutions GmbH 2017

Page 35: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%

34 © Fujitsu Technology Solutions GmbH 2017

Leif Sundsbø

[email protected]

+47 984 40 400

www.hiddn.no