Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security



Similar documents
Data Sheet FUJITSU Server PRIMERGY CX400 M1 Multi-Node Server Enclosure

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop

Technical Brief: Egenera Taps Brocade and Fujitsu to Help Build an Enterprise Class Platform to Host Xterity Wholesale Cloud Service

Information Security Policy

Chapter 1: Introduction

Data Sheet FUJITSU Server PRIMERGY CX400 S2 Multi-Node Server Enclosure

White paper 200 Camera Surveillance Video Vault Solution Powered by Fujitsu

Data Sheet FUJITSU Server PRIMERGY CX420 S1 Out-of-the-box Dual Node Cluster Server

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

PRIMERGY server-based High Performance Computing solutions

White paper Fujitsu Identity Management and PalmSecure

Cloud-Based dwaf A Real World Deployment Case Study. OWASP 5. April The OWASP Foundation

Fujitsu Interstage Big Data Parallel Processing Server V1.0

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Virtual Privacy vs. Real Security

HEC Security & Compliance

L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti

MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN)

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

The Leading Provider of Identity Solutions and Services in the U.S.

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop

Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010

SAP integration and management services

Data Sheet Fujitsu PRIMERGY CX1000 S1 with 38 cloud server nodes

More reliability for your business. ETERNUS LT the storage solution

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

From servervirtualization. to private cloud. Chandan Mehta

Data Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance

Corporate Presentation

Datasheet Fujitsu PRIMERGY CX1000 S1 with 38 CX120 S1 The Cool-Central Architecture

Fujitsu Dynamic Cloud Bridging today and tomorrow

Building the Business Case for Cloud: Real Ways Private Cloud Can Benefit Your Organization

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

The Private Cloud Your Controlled Access Infrastructure

METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide

Data Center Infrastructure Management. optimize. your data center with our. DCIM weather station. Your business technologists.

Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15

Document control for sensitive company information and large complex projects.

Cisco for SAP HANA Scale-Out Solution on Cisco UCS with NetApp Storage

Hybrid Warfare & Cyber Defence

Practical Development with a Platform as a Service (PaaS) Beyond the Basics

IBM Storwize V7000 Unified and Storwize V7000 storage systems

Why SAAS makes sense: The benefits of Cloud Computing for Archiving

CON9488 The Enterprise Cloud Simplified with Oracle VM

Update On Smart Grid Cyber Security

Thales Service Definition for PSN Secure Gateway Service for Cloud Services

Scaling Objectivity Database Performance with Panasas Scale-Out NAS Storage

ETERNUS CS800 data protection appliance featuring deduplication to protect your unique data

Legal Issues / Estonia Cyber Incident

Virtualization Still a Priority for SMBs Hesitant About the Public Cloud

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

The Cloud Opportunity: Italian Market 01/10/2010

From PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved.

Approach for OSS & Cloud Computing

Cloud Computing Based on Service- Oriented Platform

Cloud Security Introduction and Overview

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Fujitsu s Approach to Cloud Computing

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets

IoT and the Digital Divide

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Get More Scalability and Flexibility for Big Data

National Cyber Security Policy -2013

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Datasheet Fujitsu Cloud Infrastructure Management Software V1

Security and Services

Cloudbuz at Glance. How to take control of your File Transfers!

IT Security Management 100 Success Secrets

Service-Oriented Architecture Concept for Intelligence Information System Development

Sales Slide Midokura Enterprise MidoNet V1. July 2015 Fujitsu Limited

Introduction to Database as a Service

PalmSecureID for the EDUCATION MARKETPLACE

Leveraging the Cloud. September 22, Digital Government Institute Cloud-Enabled Government Conference Washington, DC

Fact Sheet Fujitsu Global Cloud Platform Infrastructure as a Service (Iaas)

MORPHO CRIMINAL JUSTICE SUITE

FTP-Stream Data Sheet

McAfee Security Architectures for the Public Sector

Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson

Nine Steps to Smart Security for Small Businesses

Transcription:

Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security 17 Maggio 2010, Roma

Agenda Top 1 Top 2 Top3 Top 4 Fujitsu Group La view di Fujitsu sull Homeland Security Le opportunità e rischi del Cloud Computing La strategia di Fujitsu 1 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Fujitsu at a glance Headquarters Entities in Employees Net Sales Tokyo, Japan Patents 34,000 R&D spend IT Services 50,2% 70 Countries around the world 186,000 worldwide US$ 2.6 billion, 5,4 % of net sales US$ 47.8 billion System Platforms 13,4% Other Products 36,4% 2009 World Ranking #3 in Global IT Services Fujitsu in Italy Employees 300 Managing Director Offices Luca Venturelli Milan, Rome Assets managed More than 130,000 Note: Fujitsu Group consolidated figures for fiscal year ended March 31, 2009. US$1 = 98. WW employees as of June 2009 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Fujitsu in the European Defence & National Security ONE OF THE LARGEST PARTNERS FOR DEFENSE IN EUROPE European Defence Future Concepts Center - workshop, pilot, test Infrastructure providers for Carabinieri, Polizia and Croce Rossa in Italy Over 2000 security cleared staff DII (Defence Information Infrastructure) project supplier for UK, Belgium and Germany Fujitsu personnel in Iraq war field operations Infrastructure, applications, managed services and support 3

Agenda Top 1 Top 2 Top3 Top 4 Fujitsu Group La view di Fujitsu sull Homeland Security Le opportunità e rischi del Cloud Computing La strategia di Fujitsu 4 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Multi Agency Environment concept Central & Local Government Business & Commerce Organization Security & Intelligence Agencies Multi-Agency Environment No-Profit Organization Law enforcement 5 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Defence has a key, pivot role National Security and Intelligence Agencies Military-civilian cooperation National Security // Civil Guard Counter Terrorism Ministry of Interior s forces (e.g., Police) Land, Air, Sea & Joint Support to Deployed & Tactical Operations Special Projects Ministry of Defence NATO Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS6

Homeland Security & Virtual Crisis Center Emergency or Crisis can be handled by different Virtual Crisis Centre regardless their location, coordinated by a Crisis Hub The concept of Dual Use must be applied in all the scenarios. 7 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Agenda Top 1 Top 2 Top3 Top 4 Fujitsu Group La view di Fujitsu sull Homeland Security Le opportunità e rischi del Cloud Computing La strategia di Fujitsu 8 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Multi Agency Environment: Opportunity & Risk with Cloud Computing ADVANTAGES vs RISKS 1. Virtual Crisis Center enabler 2. Scalability 3. Faster Time to Deploy 4. Economies of scale and scope 5. Extreme standardization 6. Cost Shared between users/departments 7. Cost shifted from fixed to variable 1. Data Security 2. Infrastructure Availability 3. Privacy 4. Legislation 5. Data Theft and or Loss 6. Security (virus, patch, firewall..) 7. Users and identities 9 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Risk on Data Security and Availability Data Management Data Access (fisical and logical) High Availability Identity management 10 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Agenda Top 1 Top 2 Top3 Top 4 Fujitsu Group La view di Fujitsu sull Homeland Security Le opportunità e rischi del Cloud Computing La strategia di Fujitsu 11 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Metodology based on Competences and Alliances Precesses and Competences on Vertical Market Processes Security Strategy Industry Technologies System Integrators Vertical Integrated Skills: Customer, SI, ISV, Technology Partner Architecture, Technologies & Policies CONSULT DESIGN BUILD OPERATE MAINTAIN IT Methodology based on standard GlassHouse 12 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Fujitsu innovative Cloud Technologies New Services lead to new Technologies New Services lead to new Technologies Data Protection & Security Server as a Service Client as a Service ETERNUS STORAGE PRIMERGY CX1000 Zero Client 13 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

PRIMERGY CX1000 The Cloud extension Massive and easy Scale-out: 100s, 1000s of nodes Power saving >20% versus Rack servers Innovative cooling concept to save on DC space: up to 40% vs. traditional Rack servers CAPEX saving up to 20% versus Rack servers 14 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

ETERNUS: Data encryption to control data privacy????????? Mettere picturona e 3 / 4 messaggi positivi da ricordare??? 123 123??? 123 123??? 123 123 Encrypted Not encrypted High level encryption method based on standard protocol (AES) Maximum protection in case of fraudulent access to the data Maintains data privacy in case of disk swap due to failure or entire storage is stolen. Data protection even in case of technological renewal 15 Copyright 2009 FUJITSU LIMITED

Identity & Access Management: Palm Secure Palm Secure Vein Authentication Contactless - hygienic and non-invasive High Security and Applicability Rate Advanced authentication accuracy FAR (false accept rate) of.00008% FRR (false reject rate) of 0.01% Easy to use World Smallest and Lightest 16 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Fujitsu RFID Technologies A more effective front line. Integrated with PalmSecure for Identity Management Washable and Ironable TAG: See our live demo! Support High temperature The right choice also for Asset Management Fujitsu's 64KB RFID tag 17 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Fujitsu Competences Fujitsu Future Concept Centre Fujitsu Trusted Cloud Square Demonstration & seminars on optimizing ICT infrastructure including virtualization technology and server consolidation for private clouds ICT System Testing optimizing operations through comprehensive lifecycle management after deployment, and on cloud services delivered over the network. 18 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

19

Defence Information Infrastructure (DII) One platform across defence UK and worldwide, fixed and floating installations History: 2003 - deployed in 10 weeks 2004 - linked to 70,000 users 2005 -Tier One partner (with EDS prime) to implement across UK Defence 300,000 users and 200,000 desk/laptops Current update 65,001 user access devices 627 sites at First User Live 164,887 MoD accounts provisioned 384 applications live Awarded Inc 2c Above Secret Domain Supplying key ops and intel users across MoD Improving intelligence gathering and exploitation 20 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS

Defence Information Infrastructure (DII) Benefits of DII Information when and where required Head Office to deployed operations Releasing military personnel to focus on delivering the mission Collaborative working in tightly controlled environments Better and quicker decision making with better use of information