Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security

Size: px
Start display at page:

Download "Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security"

Transcription

1 Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security 17 Maggio 2010, Roma

2 Agenda Top 1 Top 2 Top3 Top 4 Fujitsu Group La view di Fujitsu sull Homeland Security Le opportunità e rischi del Cloud Computing La strategia di Fujitsu 1 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

3 Fujitsu at a glance Headquarters Entities in Employees Net Sales Tokyo, Japan Patents 34,000 R&D spend IT Services 50,2% 70 Countries around the world 186,000 worldwide US$ 2.6 billion, 5,4 % of net sales US$ 47.8 billion System Platforms 13,4% Other Products 36,4% 2009 World Ranking #3 in Global IT Services Fujitsu in Italy Employees 300 Managing Director Offices Luca Venturelli Milan, Rome Assets managed More than 130,000 Note: Fujitsu Group consolidated figures for fiscal year ended March 31, US$1 = 98. WW employees as of June Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

4 Fujitsu in the European Defence & National Security ONE OF THE LARGEST PARTNERS FOR DEFENSE IN EUROPE European Defence Future Concepts Center - workshop, pilot, test Infrastructure providers for Carabinieri, Polizia and Croce Rossa in Italy Over 2000 security cleared staff DII (Defence Information Infrastructure) project supplier for UK, Belgium and Germany Fujitsu personnel in Iraq war field operations Infrastructure, applications, managed services and support 3

5 Agenda Top 1 Top 2 Top3 Top 4 Fujitsu Group La view di Fujitsu sull Homeland Security Le opportunità e rischi del Cloud Computing La strategia di Fujitsu 4 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

6 Multi Agency Environment concept Central & Local Government Business & Commerce Organization Security & Intelligence Agencies Multi-Agency Environment No-Profit Organization Law enforcement 5 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

7 Defence has a key, pivot role National Security and Intelligence Agencies Military-civilian cooperation National Security // Civil Guard Counter Terrorism Ministry of Interior s forces (e.g., Police) Land, Air, Sea & Joint Support to Deployed & Tactical Operations Special Projects Ministry of Defence NATO Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS6

8 Homeland Security & Virtual Crisis Center Emergency or Crisis can be handled by different Virtual Crisis Centre regardless their location, coordinated by a Crisis Hub The concept of Dual Use must be applied in all the scenarios. 7 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

9 Agenda Top 1 Top 2 Top3 Top 4 Fujitsu Group La view di Fujitsu sull Homeland Security Le opportunità e rischi del Cloud Computing La strategia di Fujitsu 8 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

10 Multi Agency Environment: Opportunity & Risk with Cloud Computing ADVANTAGES vs RISKS 1. Virtual Crisis Center enabler 2. Scalability 3. Faster Time to Deploy 4. Economies of scale and scope 5. Extreme standardization 6. Cost Shared between users/departments 7. Cost shifted from fixed to variable 1. Data Security 2. Infrastructure Availability 3. Privacy 4. Legislation 5. Data Theft and or Loss 6. Security (virus, patch, firewall..) 7. Users and identities 9 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

11 Risk on Data Security and Availability Data Management Data Access (fisical and logical) High Availability Identity management 10 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

12 Agenda Top 1 Top 2 Top3 Top 4 Fujitsu Group La view di Fujitsu sull Homeland Security Le opportunità e rischi del Cloud Computing La strategia di Fujitsu 11 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

13 Metodology based on Competences and Alliances Precesses and Competences on Vertical Market Processes Security Strategy Industry Technologies System Integrators Vertical Integrated Skills: Customer, SI, ISV, Technology Partner Architecture, Technologies & Policies CONSULT DESIGN BUILD OPERATE MAINTAIN IT Methodology based on standard GlassHouse 12 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

14 Fujitsu innovative Cloud Technologies New Services lead to new Technologies New Services lead to new Technologies Data Protection & Security Server as a Service Client as a Service ETERNUS STORAGE PRIMERGY CX1000 Zero Client 13 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

15 PRIMERGY CX1000 The Cloud extension Massive and easy Scale-out: 100s, 1000s of nodes Power saving >20% versus Rack servers Innovative cooling concept to save on DC space: up to 40% vs. traditional Rack servers CAPEX saving up to 20% versus Rack servers 14 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

16 ETERNUS: Data encryption to control data privacy????????? Mettere picturona e 3 / 4 messaggi positivi da ricordare??? ??? ??? Encrypted Not encrypted High level encryption method based on standard protocol (AES) Maximum protection in case of fraudulent access to the data Maintains data privacy in case of disk swap due to failure or entire storage is stolen. Data protection even in case of technological renewal 15 Copyright 2009 FUJITSU LIMITED

17 Identity & Access Management: Palm Secure Palm Secure Vein Authentication Contactless - hygienic and non-invasive High Security and Applicability Rate Advanced authentication accuracy FAR (false accept rate) of.00008% FRR (false reject rate) of 0.01% Easy to use World Smallest and Lightest 16 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

18 Fujitsu RFID Technologies A more effective front line. Integrated with PalmSecure for Identity Management Washable and Ironable TAG: See our live demo! Support High temperature The right choice also for Asset Management Fujitsu's 64KB RFID tag 17 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

19 Fujitsu Competences Fujitsu Future Concept Centre Fujitsu Trusted Cloud Square Demonstration & seminars on optimizing ICT infrastructure including virtualization technology and server consolidation for private clouds ICT System Testing optimizing operations through comprehensive lifecycle management after deployment, and on cloud services delivered over the network. 18 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

20 19

21 Defence Information Infrastructure (DII) One platform across defence UK and worldwide, fixed and floating installations History: deployed in 10 weeks linked to 70,000 users Tier One partner (with EDS prime) to implement across UK Defence 300,000 users and 200,000 desk/laptops Current update 65,001 user access devices 627 sites at First User Live 164,887 MoD accounts provisioned 384 applications live Awarded Inc 2c Above Secret Domain Supplying key ops and intel users across MoD Improving intelligence gathering and exploitation 20 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

22 Defence Information Infrastructure (DII) Benefits of DII Information when and where required Head Office to deployed operations Releasing military personnel to focus on delivering the mission Collaborative working in tightly controlled environments Better and quicker decision making with better use of information

Data Sheet FUJITSU Server PRIMERGY CX400 M1 Multi-Node Server Enclosure

Data Sheet FUJITSU Server PRIMERGY CX400 M1 Multi-Node Server Enclosure Data Sheet FUJITSU Server PRIMERGY CX400 M1 Multi-Node Server Enclosure Data Sheet FUJITSU Server PRIMERGY CX400 M1 Multi-Node Server Enclosure Scale-Out Smart for HPC, Cloud and Hyper-Converged Computing

More information

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop is a powerful and scalable platform analyzing big data volumes at high velocity FUJITSU Integrated System PRIMEFLEX Your fast track to datacenter

More information

Technical Brief: Egenera Taps Brocade and Fujitsu to Help Build an Enterprise Class Platform to Host Xterity Wholesale Cloud Service

Technical Brief: Egenera Taps Brocade and Fujitsu to Help Build an Enterprise Class Platform to Host Xterity Wholesale Cloud Service Technical Brief: Egenera Taps Brocade and Fujitsu to Help Build an Enterprise Class Platform to Host Xterity Wholesale Cloud Service ... Egenera needed an enterprise class platform to host their wholesale

More information

Information Security Policy

Information Security Policy Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Data Sheet FUJITSU Server PRIMERGY CX400 S2 Multi-Node Server Enclosure

Data Sheet FUJITSU Server PRIMERGY CX400 S2 Multi-Node Server Enclosure Data Sheet FUJITSU Server PRIMERGY CX400 S2 Multi-Node Server Enclosure Scale-Out Smart for HPC and Cloud Computing with enhanced energy efficiency The PRIMERGY CX400 Cloud extension servers are Fujitsu

More information

Fujitsu World Tour. in Action. Human Centric Innovation. Business-Centric Data Center. 0 Copyright 2016 FUJITSU

Fujitsu World Tour. in Action. Human Centric Innovation. Business-Centric Data Center. 0 Copyright 2016 FUJITSU Fujitsu World Tour Human Centric Innovation in Action Business-Centric Data Center with PRIMEFLEX 0 Copyright 2016 FUJITSU Does hardware or software define your DC - or your business? Peter Wouters Sr.

More information

VISIT 2010 Fujitsu Forum Europe 0

VISIT 2010 Fujitsu Forum Europe 0 VISIT 2010 Fujitsu Forum Europe 0 Virtualization & Automation Room 13a Shaping tomorrow with you. Green Data Center Services Martin Provoost Director, Data Centers and Networks, Fujitsu UK & Ireland 14:00

More information

White paper 200 Camera Surveillance Video Vault Solution Powered by Fujitsu

White paper 200 Camera Surveillance Video Vault Solution Powered by Fujitsu White paper 200 Camera Surveillance Video Vault Solution Powered by Fujitsu SoleraTec Surveillance Video Vault provides exceptional video surveillance data capture, management, and storage in a complete

More information

10 Top Tips for Data Protection in the New Workplace

10 Top Tips for Data Protection in the New Workplace 10 Top Tips for Data Protection in the New Workplace Balancing Workplace Security with Workforce Productivity One of the key things that keeps CIOs awake at night, is worrying about the loss or leakage

More information

Data Sheet FUJITSU Server PRIMERGY CX420 S1 Out-of-the-box Dual Node Cluster Server

Data Sheet FUJITSU Server PRIMERGY CX420 S1 Out-of-the-box Dual Node Cluster Server Data Sheet FUJITSU Server PRIMERGY CX420 S1 Out-of-the-box Dual Node Cluster Server Data Sheet FUJITSU Server PRIMERGY CX420 S1 Out-of-the-box Dual Node Cluster Server High availability for lower expertise

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

PRIMERGY server-based High Performance Computing solutions

PRIMERGY server-based High Performance Computing solutions PRIMERGY server-based High Performance Computing solutions PreSales - May 2010 - HPC Revenue OS & Processor Type Increasing standardization with shift in HPC to x86 with 70% in 2008.. HPC revenue by operating

More information

White paper Fujitsu Identity Management and PalmSecure

White paper Fujitsu Identity Management and PalmSecure White paper Fujitsu Identity Management and PalmSecure To protect your business, it s critical that you can control who accesses your data, systems and premises. Today, many organizations rely on passwords

More information

Cloud Business Value. Francis Magann Senior Customer Solutions Architect. 20 th April 2011

Cloud Business Value. Francis Magann Senior Customer Solutions Architect. 20 th April 2011 Cloud Business Value Francis Magann Senior Customer Solutions Architect 20 th April 2011 Cloud is real Some as High as 40% 71% met or exceeded expectations 24% Experienced Cost Savings 73% use private

More information

Cloud-Based dwaf A Real World Deployment Case Study. OWASP 5. April 2012. The OWASP Foundation http://www.owasp.org

Cloud-Based dwaf A Real World Deployment Case Study. OWASP 5. April 2012. The OWASP Foundation http://www.owasp.org Cloud-Based dwaf A Real World Deployment Case Study Alexander Meisel Riverbed Technology alex AT meisel DOT cc 5. April 2012 Copyright The Foundation Permission is granted to copy, distribute and/or modify

More information

Fujitsu Interstage Big Data Parallel Processing Server V1.0

Fujitsu Interstage Big Data Parallel Processing Server V1.0 Datasheet Fujitsu Interstage Big Data Pa Parallel lel Processing Server V1.0 V1 Datasheet Fujitsu Interstage Big Data Parallel Processing Server V1.0 Availability vailability and processing performance

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information

HEC Security & Compliance

HEC Security & Compliance HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information

More information

SMART SCALE YOUR STORAGE - Object "Forever Live" Storage - Roberto Castelli EVP Sales & Marketing BCLOUD

SMART SCALE YOUR STORAGE - Object Forever Live Storage - Roberto Castelli EVP Sales & Marketing BCLOUD SMART SCALE YOUR STORAGE - Object "Forever Live" Storage - Roberto Castelli EVP Sales & Marketing BCLOUD 1 BCLOUD at a Glance 4 years constantly growing + 3PBs protected and distributed every day from

More information

L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti

L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti Francesco Maselli Technical Manager Italy Milano, 6 Maggio 2008 Aula magna di SIAM CONFIDENTIALITY STATEMENT AND COPYRIGHT

More information

MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN)

MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN) MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN) Brief presentation of the program: The training covers specialized courses in sciences for risk, geopolitics and security, environmental and

More information

Security under your Control

Security under your Control Security under your Control www.scm-concerto.com ConCERTO combines physical & logical access and more... Do you want to Improve your access security Simplify IT administration for logical and physical

More information

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA 2 Agenda What is the cloud business value? What about the SecaaS? Why companies

More information

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

Product Overview. UNIFIED COMPUTING Managed Hosting Compute Data Sheet

Product Overview. UNIFIED COMPUTING Managed Hosting Compute Data Sheet Product Overview Interoute provide our clients with a diverse range of compute options delivered from our 10 carrier-class data centre facilities. Leveraging our extensive and diverse next generation IP

More information

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION Ken Low Director of Enterprise Security, Asia Pacific, Trend Micro Chairman, Asia Pacific Executive Council, Cloud Security Alliance

More information

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop FUJITSU Integrated System PRIMEFLEX for Hadoop is a powerful and scalable platform analyzing big data volumes at high velocity FUJITSU Integrated

More information

Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010

Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010 Computing Architecture Computing Introduction Computing Architecture Software Architecture for Outlook Corporate Research and Technologies, Munich, Germany Gerald Kaefer * 4 th Generation Datacenter IEEE

More information

Product Overview. UNIFIED COMPUTING Managed Hosting Compute

Product Overview. UNIFIED COMPUTING Managed Hosting Compute Product Overview Interoute provide our clients with a diverse range of compute options delivered from our 10 carrier-class data centre facilities. Leveraging our extensive and diverse next generation IP

More information

SAP integration and management services

SAP integration and management services SAP CAPABILITY OVERVIEW UNITING THE ENTERPRISE SAP integration and management services SAP CAPABILITY OVERVIEW The Challenge Making life simpler One of the key reasons that many organisations struggle

More information

Data Sheet Fujitsu PRIMERGY CX1000 S1 with 38 cloud server nodes

Data Sheet Fujitsu PRIMERGY CX1000 S1 with 38 cloud server nodes Data Sheet Fujitsu PRIMERGY CX1000 S1 with 38 cloud server nodes The Cool-Central architecture for Scale-Out Cloud Data Centers: Scale Big- Spend Small PRIMERGY CX1000 is a new product category within

More information

More reliability for your business. ETERNUS LT the storage solution

More reliability for your business. ETERNUS LT the storage solution More reliability for your business ETERNUS LT the storage solution Time is relative. Security is absolute. ETERNUS LT time for new classics Low Overall Costs Training Options Easy to sell/use/install Quality

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

From servervirtualization. to private cloud. Chandan Mehta

From servervirtualization. to private cloud. Chandan Mehta From servervirtualization to private cloud Chandan Mehta From server-virtualization to private cloud Chandan Mehta Director Product Management Fujitsu Technology Solutions Middle East. 1 Gartner: virtualization

More information

Data Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance

Data Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance Data Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance Radically simplifying data protection ETERNUS CS Data Protection Appliances The Fujitsu ETERNUS CS storage solutions, comprising ETERNUS

More information

Corporate Presentation

Corporate Presentation Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal

More information

Datasheet Fujitsu PRIMERGY CX1000 S1 with 38 CX120 S1 The Cool-Central Architecture

Datasheet Fujitsu PRIMERGY CX1000 S1 with 38 CX120 S1 The Cool-Central Architecture Datasheet Fujitsu PRIMERGY CX1000 S1 with 38 CX120 S1 The Cool-Central Architecture New Cloud server infrastructure platform for Scale-Out data centers Scale Big - spend small PRIMERGY CX1000 is a new

More information

Fujitsu Dynamic Cloud Bridging today and tomorrow

Fujitsu Dynamic Cloud Bridging today and tomorrow Fujitsu Dynamic Cloud Bridging today and tomorrow Contents Cloud Computing with Fujitsu 3 Fujitsu Dynamic Cloud: Higher Dynamics for Enterprises 4 Fujitsu Dynamic Cloud: Our Offering 6 High Security Standards

More information

Electronic Warfare - Emerging Trends, Approaches, Key issues and Investment Outlook. Reference code: DF4420PR Published: March 2015

Electronic Warfare - Emerging Trends, Approaches, Key issues and Investment Outlook. Reference code: DF4420PR Published: March 2015 Electronic Warfare - Emerging Trends, Approaches, Key issues and Investment Outlook Reference code: DF4420PR Published: March 2015 1 AGENDA Methodology and sample size Change in occurrence of electronic

More information

Building the Business Case for Cloud: Real Ways Private Cloud Can Benefit Your Organization

Building the Business Case for Cloud: Real Ways Private Cloud Can Benefit Your Organization : Real Ways Private Cloud Can Benefit Your Organization In This Paper Leveraging cloud technology can help drive down costs while enabling service-oriented IT. Private and hybrid cloud approaches improve

More information

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of

More information

The Private Cloud Your Controlled Access Infrastructure

The Private Cloud Your Controlled Access Infrastructure White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,

More information

METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide

METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide Contents Introduction...2 Coalition and extranet collaboration... 3 Deploying military units... 4 Fob-rob collaboration...4

More information

Data Center Infrastructure Management. optimize. your data center with our. DCIM weather station. Your business technologists.

Data Center Infrastructure Management. optimize. your data center with our. DCIM weather station. Your business technologists. Data Center Infrastructure Management optimize your data center with our DCIM weather station Your business technologists. Powering progress Are you feeling the heat of your data center operations? Data

More information

Data platform evolution

Data platform evolution 2 Data platform evolution Top Reasons Reasons to to upgrade 1) End of extended support 2) Enhanced SQL Server 2014 features and performance 3) Impact on security and compliance 4) Cloud strategy Top Blockers

More information

Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15

Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15 Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15 Patch application and automatic collection of information about cloud resources In modern company IT departments, virtualization

More information

Research Report. Abstract: Scale-out Storage Market Forecast 2010-2015. February 2011. By Terri McClure

Research Report. Abstract: Scale-out Storage Market Forecast 2010-2015. February 2011. By Terri McClure Research Report Abstract: Scale-out Storage Market Forecast 2010-2015 By Terri McClure February 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved. Market Forecast Overview Forecast Scope Designed

More information

Document control for sensitive company information and large complex projects.

Document control for sensitive company information and large complex projects. Data sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control for sensitive

More information

Cisco for SAP HANA Scale-Out Solution on Cisco UCS with NetApp Storage

Cisco for SAP HANA Scale-Out Solution on Cisco UCS with NetApp Storage Cisco for SAP HANA Scale-Out Solution Solution Brief December 2014 With Intelligent Intel Xeon Processors Highlights Scale SAP HANA on Demand Scale-out capabilities, combined with high-performance NetApp

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

Practical Development with a Platform as a Service (PaaS) Beyond the Basics

Practical Development with a Platform as a Service (PaaS) Beyond the Basics IBM Cloud: Think it. Build it. Tap into it. Carl Osipov, Developer Evangelist, IBM Bluemix osipov@us.ibm.com @CloudsWithCarl September 25, 2014 Practical Development with a Platform as a Service (PaaS)

More information

IBM Storwize V7000 Unified and Storwize V7000 storage systems

IBM Storwize V7000 Unified and Storwize V7000 storage systems IBM Storwize V7000 Unified and Storwize V7000 storage systems Transforming the economics of data storage Highlights Meet changing business needs with virtualized, enterprise-class, flashoptimized modular

More information

Why SAAS makes sense: The benefits of Cloud Computing for Email Archiving

Why SAAS makes sense: The benefits of Cloud Computing for Email Archiving Why SAAS makes sense: The benefits of Cloud Computing for Email Archiving Confidentiality This document contains confidential material that is proprietary to Gradian Systems Ltd. The material, ideas, and

More information

Symantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010

Symantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010 Symantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010 Forward Looking Statements This presentation contains forward looking statements within the meaning of U.S. federal

More information

CON9488 The Enterprise Cloud Simplified with Oracle VM

CON9488 The Enterprise Cloud Simplified with Oracle VM CON9488 The Enterprise Cloud Simplified with Oracle VM Andy Herm, Senior Architect, Cloud Infrastructure, Oracle Conor Wentz, Senior Architect, Cloud Infrastructure, Oracle Honglin Su, Sr. Director of

More information

CORAnet System. White Paper

CORAnet System. White Paper CORAnet System - White Paper CORAnet Solutions, Inc. 5231 Massachusetts Avenue Bethesda, MD info@coranet.com 240.640.1555 2011 CORAnet Solutions Page 1 1. About CORAnet CORAnet Solutions, LLC is an affiliate

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

Scaling Objectivity Database Performance with Panasas Scale-Out NAS Storage

Scaling Objectivity Database Performance with Panasas Scale-Out NAS Storage White Paper Scaling Objectivity Database Performance with Panasas Scale-Out NAS Storage A Benchmark Report August 211 Background Objectivity/DB uses a powerful distributed processing architecture to manage

More information

How To leverage VMware solutions for Manageability & Security of Desktop. Matteo Uva Channel Manager Italy and Greece

How To leverage VMware solutions for Manageability & Security of Desktop. Matteo Uva Channel Manager Italy and Greece How To leverage VMware solutions for Manageability & Security of Desktop Matteo Uva Channel Manager Italy and Greece Agenda 1. What is VDI & How can it help my customers? 2. Building a VDI solution 3.

More information

ETERNUS CS800 data protection appliance featuring deduplication to protect your unique data

ETERNUS CS800 data protection appliance featuring deduplication to protect your unique data data protection appliance featuring deduplication to protect your unique data Just for a moment imagine your daily business from a different perspective We lift you up where you belong Forget the constraints

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

Virtualization Still a Priority for SMBs Hesitant About the Public Cloud

Virtualization Still a Priority for SMBs Hesitant About the Public Cloud Virtualization Still a Priority for SMBs Hesitant About the Public Cloud Introduction With greater demands on IT departments to meet growing data and application needs from increasingly mobile business

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

The Cloud Opportunity: Italian Market 01/10/2010

The Cloud Opportunity: Italian Market 01/10/2010 The Cloud Opportunity: Italian Market 01/10/2010 Alessandro Greco @Easycloud.it In collaboration with easycloud.it Who is easycloud.it? Easycloud.it is a Consultant Company based in Europe with HQ in Italy.

More information

From PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved.

From PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. From PC to Workplace Productivity Chris Ingle Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda How Did We Get Here? Evolving Employee Expectations Rapidly Developing

More information

Approach for OSS & Cloud Computing

Approach for OSS & Cloud Computing The Eighth North-East Asia OSS Promotion Forum Approach for OSS & Cloud Computing October 20 th, 2009 Fujitsu Limited Platform Solution Unit General Manager Masatoshi YOSHIDA 1.Approach for Linux 1 IA

More information

Cloud Computing Based on Service- Oriented Platform

Cloud Computing Based on Service- Oriented Platform Cloud Computing Based on Service- Oriented Platform Chiseki Sagawa Hiroshi Yoshida Riichiro Take Junichi Shimada (Manuscript received March 31, 2009) A new concept for using information and communications

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE. About Identiv Identiv is a global security technology company that establishes trust in the connected world, including premises, information, and everyday items. Global organizations in the government,

More information

Fujitsu s Approach to Cloud Computing

Fujitsu s Approach to Cloud Computing Fujitsu s Approach to Cloud Computing Kenta Miyazawa Cloud computing (hereafter cloud or clouds) has come to be specifically used in various fields. Private clouds are used in enterprises. Groups and individuals

More information

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets WHITE PAPER Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 Introduction... 3 The Solution... 3 The

More information

Optimizing Pricing Through Effective Online Market Intelligence. Marcus Herzog VP Product Management & Marketing

Optimizing Pricing Through Effective Online Market Intelligence. Marcus Herzog VP Product Management & Marketing Optimizing Pricing Through Effective Online Market Intelligence Marcus Herzog VP Product Management & Marketing Agenda Company Background Why Online Market Intelligence The Whole Product for Online Market

More information

Building Java Applications. in the Cloud. Steve Shine, EVP of WW Operations,Ingres Fima Katz, President and CEO, Exadel.

Building Java Applications. in the Cloud. Steve Shine, EVP of WW Operations,Ingres Fima Katz, President and CEO, Exadel. 1 Building Java Applications Steve Shine, EVP of WW Operations,Ingres Fima Katz, President and CEO, Exadel in the Cloud September 3, 2009 2 Pragmatic approach to Cloud with JBoss and Ingres Open Source

More information

IoT and the Digital Divide

IoT and the Digital Divide IoT and the Digital Divide Achieving Higher Speed, Lower Latency and High Degree of Reliability Xiao Binbing Country Manager, Huawei Denmark. www.huawei.com Contents Company Overview Industry Trends The

More information

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation

More information

Get More Scalability and Flexibility for Big Data

Get More Scalability and Flexibility for Big Data Solution Overview LexisNexis High-Performance Computing Cluster Systems Platform Get More Scalability and Flexibility for What You Will Learn Modern enterprises are challenged with the need to store and

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis FOR IMMEDIATE RELEASE Hitachi to Expand Finger Vein Authentication System Business on a Global Basis Establishes Organizations to Promote Business in North America, Europe, China and Asia, Aspires for

More information

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual

More information

Datasheet Fujitsu Cloud Infrastructure Management Software V1

Datasheet Fujitsu Cloud Infrastructure Management Software V1 Datasheet Fujitsu Cloud Infrastructure Management Software V1 Efficient infrastructure utilization, private cloud creation support, and reduced administration. Cloud Foundation for Iaas Fujitsu supports

More information

Security and Services

Security and Services Written by Maxine Holt, May 2005 TA000824SAS Technology Infrastructure Butler Group Subscription Services Security and Services TECHNOLOGY AUDIT Symantec Corporation Managed Security Service (MSS) Abstract

More information

Cloudbuz at Glance. How to take control of your File Transfers!

Cloudbuz at Glance. How to take control of your File Transfers! How to take control of your File Transfers! A MFT solution for ALL organisations! Cloudbuz is a MFT (Managed File Transfer) platform for organisations and businesses installed On-Premise or distributed

More information

IT Security Management 100 Success Secrets

IT Security Management 100 Success Secrets IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management

More information

Service-Oriented Architecture Concept for Intelligence Information System Development

Service-Oriented Architecture Concept for Intelligence Information System Development Service-Oriented Architecture Concept for Intelligence Information System Development Jugoslav Achkoski 1, Vladimir Trajkovik 2, Danco Davcev 3 1 Military Academy General Mihailo Apostolski, Skopje, Macedonia

More information

Sales Slide Midokura Enterprise MidoNet V1. July 2015 Fujitsu Limited

Sales Slide Midokura Enterprise MidoNet V1. July 2015 Fujitsu Limited Sales Slide Midokura Enterprise MidoNet V1 July 2015 Fujitsu Limited What Is Midokura Enterprise MidoNet? Network Virtualization Software Coordinated with OpenStack Provides safe & effective virtual networks

More information

SECURITY IN THE CLOUD

SECURITY IN THE CLOUD Common Knowledge: Kevin Burns SECURITY IN THE CLOUD (aka- Insecurity in the Cloud) Real Issue: You don t know what you don t know For Instance - First Question who is responsible for securing what? Who

More information

Introduction to Database as a Service

Introduction to Database as a Service Introduction to Database as a Service Exadata Platform Revised 8/1/13 Database as a Service (DBaaS) Starts With The Business Needs Establish an IT delivery model that reduces costs, meets demand, and fulfills

More information

PalmSecureID for the EDUCATION MARKETPLACE

PalmSecureID for the EDUCATION MARKETPLACE PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings

More information

Leveraging the Cloud. September 22, 2011. Digital Government Institute Cloud-Enabled Government Conference Washington, DC

Leveraging the Cloud. September 22, 2011. Digital Government Institute Cloud-Enabled Government Conference Washington, DC Leveraging the Cloud September 22, 2011 Digital Government Institute Cloud-Enabled Government Conference Washington, DC General Dynamics Information Technology Aerospace Combat Systems $29.3 billion in

More information

Fact Sheet Fujitsu Global Cloud Platform Infrastructure as a Service (Iaas)

Fact Sheet Fujitsu Global Cloud Platform Infrastructure as a Service (Iaas) Fact Sheet Fujitsu Global Cloud Platform Infrastructure as a Service (Iaas) Flexible and Secure IT that Stays Aligned with Your Business You have a business to run and a hugely complex infrastructure to

More information

MORPHO CRIMINAL JUSTICE SUITE

MORPHO CRIMINAL JUSTICE SUITE MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background

More information

FTP-Stream Data Sheet

FTP-Stream Data Sheet FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com)

Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com) Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com) Theo Dimitrakos Chief Security Researcher, BT Research & Technology theo.dimitrakos@bt.com

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers

Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers Agenda Introductions The rise of machine-based identities

More information

Data Centre Modernisation

Data Centre Modernisation Data Centre Modernisation Chris Bone Fujitsu Head of Sales Consultancy. Paul Flannery Oracle Senior Director EMEA Business Development COMMERCIAL IN CONFIDENCE Copyright 2014 Fujitsu Limited Business-centric?

More information