33
INTERNAL USE O NLY INTERNAL USE O NLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS Product Values Notebooks

©2010 FUJITSU TECHNOLOGY SOLUTIONS Product Values Notebooks

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

INTERNAL USE ONLYINTERNAL USE ONLY

©2010 FUJITSU TECHNOLOGY SOLUTIONS

Product Values NotebooksProduct Values Notebooks

INTERNAL USE ONLYINTERNAL USE ONLY

Our product valuesOur product values

2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Human-centric

Green

Innovation Reliability

INTERNAL USE ONLYINTERNAL USE ONLY

Innovation Innovation

Our approach – Continous innovations in mobile computing since almost 30 years

Innovations – 1st notebook with embedded mobile broadband with telco partnerships, 1st Bluetooth notebook, 1st notebook with a touchpad.

Security and flexibility – Due to features like fingerprint sensor, ATP as well as location-independent access to the internet through embedded 3G/UMTS.

DeskView load and customizing –For the efficient configuration and individualization of every notebook providing optimum cost savings despite complex infrastructures.

Manageability – Attain a significant TCO* reduction via a comprehensive offer of system management functions

* Source: Gartner Research – 'How to Reduce Your PC TCO 30% in 2011', 20.03.2009, ID: G00166195

Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Reliability

GreenHuman-centric

Innovation

3

INTERNAL USE ONLYINTERNAL USE ONLY

ReliabilityReliability

Our promise – Sytem quality, expertise and excellence

Top system quality – Minimal downtime rates,excellent test processes (lifecycle test, etc.) andmaximum reliability

Experienced engineering – Many years of experience,direct contact with engineers, the combinationof German precision with Japanese quality

Excellent production – Thanks to award-winning production processes and production sites

Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

International standards

Reliability

GreenHuman-centric

Innovation

4

INTERNAL USE ONLYINTERNAL USE ONLY

Our responsibility – To harmonize the environment and business with green ideas

Responsibility to the environment –By selecting environmental materials, energy-optimized product implementation and environmentally conscious recycling.

Responsibility to business –With sustainable cost reductions thanks to innovative, energy-saving technologies and efficient supply chains.

A joint contribution with the customer – Less energy consumption due to the usage of energy-efficient components, the EcoButton, highly efficient power supply units (87%) and an LED backlight.

GreenGreen

GreenHuman-centric

Innovation Reliability

Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS5

INTERNAL USE ONLYINTERNAL USE ONLY

Human-centricHuman-centric

Our requirements – Ergonomic and customer-oriented

Ergonomic working – Designed with the user in mind, e.g: high-bright LED display, GS certified keyboard*

Fitting all needs - Enhance and optimize your system using the modularbay. Different form factors to meet all needs.

High level of user friendliness – The wide range of control options(touchpad, touch stick, ScrollWheel, etc.) provides easy control of the system. Quick and easy access to recurring functions (application buttons).

Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

*Certificate to enter public sectors in Germany

Reliability

GreenHuman-centric

Innovation

6

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

SecuritySecurity

7

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Mobile and remote users with confidential information outside the company campus

Devices get lost or damaged

Devices can be stolen Memory modules, external hard disk drives

(HDD), USB devices

Unauthorized persons try to eavesdrop on your local data and over the network From external and internal

Malicious software accesses, modifies or deletes your data

Attackers attempt to prevent users from using required services

Why security is importantWhy security is important

8

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Disturbed processes

Downtime

Loss of data Intellectual property Strategic documents

Loss of time

Loss of money

Loss of business

Loss of image Reputation, Public confidence

Insolvency

Affects Financial strength Stock value Customer loyalty

Security risks threaten the tremendous benefits offered by IT

Security is one of the top problems of IT managers across the industry

Impact of security risksImpact of security risks

9

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Confidentiality (privacy)

No information access without authorization

Integrity No alteration of information without

authorization

Availability Ensure access to information for authorized

users when required Prevent denial of service Data

andservices

AvailabilityC

onfid

entia

lity

Integrity

CIA triangle

What is IT security?What is IT security?

10

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Physical

Security

System

Security

User

Security

Keep your secrets guarded

A non-secure IT infrastructure impedes the success of new applications and the growth of business!

Theft protection

System intrusiondetection

Anti-virus

Data encryption

BIOS virus protection

SystemTrack&

DataProtect

Pre-boot HDD password

Seagate HD

with FDE

TPM support

SmartCard

Fingerprint

Operating System Logon

System access

Single-Sign-On

Anti-spam

PersonalFirewall

Client Security Value propositionClient Security Value proposition

11

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Services

OS

Data

Device

BIOS

Network

Staff & People

Unauthorized use,Social engineering

Mobile devices

Theft, damage, intrusion, insufficient access

control

Software and DataModification, Theft, Spy,

unsafe passwords,Virus, Spam, etc.

Remote accessVirus per mail

Physical protection

Mechanical features, alerts

Access protectionfor data and applications

Authentication, encryption

Detection and removalof abnormalities

Anti-virus, RKD, firewall,Intrusion detection / prevention,

web and content filtering

Backup and recovery

Patch management

BIOS security functions

ATPAnti-Theft Protection

Security threats and countermeasuresSecurity threats and countermeasures

12

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Measures that prevent attackers from system access

Mechanical housing lock (desktop) Prohibits unauthorized persons from opening

Eye for pad lock (desktops)

Seal option (desktop, via customizing)

KensingtonLock support

Customer-specific logos (customization)

Intrusion switch (desktops) Alert to system management, when cabinet is opened

Component change alert

Non-presence alert

Physical protection: Mechanical featuresPhysical protection: Mechanical features

13

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Featured in all Business Clients – ex factory

Protects all data stored on hard disk from unauthorized access Set or change hard disk drive password via BIOS Setup Utility Independent from OS

Stored in hard disk drives‘ firmware and moves with hard disk drive Only entering the correct password unlocks hard disk drive (even in

another desktop PC) Hard disk drive passwords cannot be removed by reformatting it

Each hard disk drive may have a separate password

Power down required after 3 unsuccessful attempts

Protect your hard disk drive from unauthorized access

BIOS Security functions Hard disk PWBIOS Security functions Hard disk PW

14

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Restrict access to protected information to authorized resources

Authentication (Verify a claim of identity) Something you know (e.g. password) Something you have (e.g. chip card, token) Something you are (biometrics, e.g. fingerprint)

Strong authentication Two- / multi-factor authentication

(e.g. something you know, something you have)

Encryption Make information unusable for unauthorized users

Access protectionAccess protection

15

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Full Disk Encryption of data:

Software application to encrypt data Benefit: Hardware independent Disadvantage:

• Loss of system performance• Initial installation takes about 2 hours

Dedicated encryption chip(e.g.with Seagate Momentus ST9160312AS, available for all professional notebooks) Benefit:

• Nearly no loss of performance• Data is automatically and always encrypted• Hard disk drive password at the BIOS protect the data• Available for LIFEBOOKs and ESPRIMO Mobiles only

Access protection- HW based encryptionAccess protection- HW based encryption

16

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Same in size as credit card (portable) High market acceptance and ease of use

Secure storage for sensitive information Private keys, account numbers, passwords, fingerprints,

web addresses

Integrated microprocessor with CardOS Efficient crypto coprocessor for key generation

and strong encryption of data and files

User identification by PIN Possess device and the SmartCard and know PIN Any attempt to attack memory causes instant destruction

of chip

Multifunctional (universal identification) PC access, building access, time recording

ISO 7816-compatible (application commands)

Access protection SmartCardAccess protection SmartCard

17

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

User-friendly solution for system units out of the user‘s reach

Connected via USB

Combination of security and input device

Secure PIN Entry (SPE) Applications switch keyboard to secure PIN entry PIN is transmitted from numeric key block to chip card

• All PIN operations are handled within the keyboard itself Key logging useless

Certificates Common Criteria EAL3+ compliance

(Qualified for electronic signatures) Certified by Gematic

• MKT 1.0 (TUVIT Trusted Product)• MKT+

Access protect. SmartCase KB SCR PROAccess protect. SmartCase KB SCR PRO

18

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Chip mounted on motherboard of PC system

Core of TPA (Trusted Platform Architecture)

Root encryption key protected in silicon Unique and bound to a specific system Tamper resistant Key hierarchy Encrypted areas on hard disk drive with keys for data

encryption

Key elements Random number generator for key generation Non-volatile memory for keys

Generate and store/protect passwords – PC system & user authentication

Access protection TPM moduleAccess protection TPM module

19

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Protects keys used by e.g. BitLocker

Unique platform authentication Secure e-commerce No longer dependent on device ID

User authentication

Encryption of Data Virtual partitions

Corporate network access via VPN

Login request

Authentication

Challenge

Unable to supply key

Key Challenge

Successful hacker attempt without TPM

Unsuccessful hacker attempt with TPM

Access protection TPM appl. scenariosAccess protection TPM appl. scenarios

20

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

It‘s nearly the same technology Similar hardware capabilities – Micro Controller, RAM,

ROM, Flash Common cryptographic services Asymmetric cryptography Tamper resistance – Means if someone tries to hack the

chip, the chip and the data will be destroyed

Except: The TPM is part of the system security, bound to the

mainboard. Identifies hardware and user. The SmartCard is part of user security.

Identifies only the user. The TPM chip can be used to build up a chain of trust The TPM alerts the user if someone tried or tries to

manipulate the system

User

Security

Security bound

to the hardware

Root of

Trust

Hardware pro-

tected storage

Secure network

data transfer

Enhanced

Authentication

Is TPM a kind of a SmartCard? Is TPM a kind of a SmartCard?

21

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

SmartCase Logon+ Administration Administrate user accounts Enrollment of fingerprints Administrate SmartCard Administrate TPM module

SmartCase Logon+ SSO (Single Sign On) Store logon credentials in a safe way Auto Login for web accounts

Secure Drive Store data in an encrypted virtual drive Open encrypted drive with SmartCard,

PIN or fingerprint

BIOS Security - SmartCase Logon+ V.2.2BIOS Security - SmartCase Logon+ V.2.2

22

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Keep your secrets

Benefits:

Simplified user access to MS Windows and web pages One login for the individual

Automatic authentication Not even drag and drop required

Higher productivity No „try-and-error“ time losses

Higher end user satisfaction

Never forget your PIN – always at your side, no matter the application

User Authentication

Automatic authentication to

websites and applications

OS Logon

Single sign-on

SmartCase Logon+ Version 2.2SmartCase Logon+ Version 2.2

23

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

CustomizingCustomizing

24

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Make it different

Delivery of technically identical systems Simplifies network installation Better system maintenance

Ready-to-run systems Reduces installation time and cost

Integration of customer specific components Eliminates modifications at customer site

Individual solutions

One order code for the complete system during lifecycle

End-to-end project support

Highest product continuity and lifecycle extension through sophisticated lifecycle management

Shipment according to customer specific roll-out requirements

You are looking for …You are looking for …

25

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Made4you services

26

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Customizing ServicesCustomizing Services

27

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Make it different

Project platform stability during the complete hardware lifecycle

Customer-specific hardware(no part of product portfolio) By consignment By Fujitsu Technology Solutions own global sourcing /

R&D / test center Component mix, i.e. graphics cards, DAT-drives, other

displays, security features, etc.

Integration of customer accessories (cables, mouse pads, media) all in one box

Master key solutions (PC and Mobiles)

Hardware ServicesHardware Services

28

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Make it different

Customer software load for „Ready-to-run“ systems From master hard disk drive From master flash module (thin clients) From CD/DVD Replication and Preparation

Specific CMOS settings Individual boot sequence Special passwords Settings for power management, etc.

Software individualized systems from factory (DeskView Load)

Software ServicesSoftware Services

29

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Make it different

Customer asset tags (incl. MAC address) for a cost effective inventory management and roll-out Label on the system and card box Create and communicate Excel-file including MAC

address, system serial number and Inventory number

Flash inventory number into BIOS for an easy centralized administration

UUID on system and delivery note for a cost effective roll-out

UUID: 12345678-1234-1234-5678-1234-5678

Add-on Services (1)Add-on Services (1)

30

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Make it different

XXL-package for a simplified roll-out and environmental awareness

Neutral package (without FTS logo) for an easy recommercialisation

Box-in-box package for a secure transport

Additional marks or logos on the cabinet (laser, label or tampon print) Brand awareness Anti-theft protection Keyboard lasering

Add-on Services (2)Add-on Services (2)

31

INTERNAL USE ONLYINTERNAL USE ONLY ©2010 FUJITSU TECHNOLOGY SOLUTIONS

Make it different

Hardware component freeze during lifecycle and after general availability Hard disks Optical drives System boards Additional cards

BIOS freeze for an easy handling of large IT environments

Announcement of BIOS changes gives the customer the choice of whether or not to switch to the new BIOS

Management

Lifecycle

Extended Component LifetimeExtended Component Lifetime

32

INTERNAL USE ONLYINTERNAL USE ONLY