Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Don't become a headline - secure your workplace

287 views

Published on

Investing in digital technology has become a number one priority for business. However, as seen from the recent ransomware attacks that have shaken organizations across Europe, the maturation of the digital industry has brought its own set of unique challenges. From phishing emails, to DDoS attacks, to mass-scale data breaches; protection against cyber-crime has risen up the business agenda in every organization, making it even more critical for businesses to build security into their workplace to ensure their data remains secure. So how do you stay in control without damaging the user experience? In this session we will examine what steps organizations need to take to deliver a secure workplace environment.

Speaker:

Christian Reilly
Vice President & CTO, Workspace Services
Citrix

Anna Kopp
Head of IT Germany
Microsoft

Karyn Jeffery
Head of Digital Workplace Services
Fujitsu

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Don't become a headline - secure your workplace

  1. 1. 0 © Copyright 2017 FUJITSU Fujitsu Forum 2017 #FujitsuForum
  2. 2. 1 © Copyright 2017 FUJITSU Don’t become a headline – Secure your workplace Karyn Jeffery Head of Digital Workplace Services, Global Delivery Group (Fujitsu) Anna Kopp Head of IT Germany (Microsoft) Christian Reilly Vice President & CTO (Citrix)
  3. 3. 2 © Copyright 2017 FUJITSU User Centric Security FEBRUARY CLOUDBLEED Cloudfare bug in platform caused random leakage of customer data
  4. 4. 3 © Copyright 2017 FUJITSU Insider Threats dwarfing any other threats A global survey by Citrix and the Ponemon Institute on IT security published Jan 2017:  79% percent of respondents are worried about security breaches involving high-value information.  71% percent say there is risk from their inability to control employees devices and apps.  74% percent of businesses saying that a new IT security framework is needed to improve security posture and reduce risk. Ponemon Institute: 2016 Cost of Data Breach: 874 incidents reported by companies  568 caused by employee/contractor negligence - greatest threats are email and browsing  191 caused by malicious employees and criminals  85 caused by outsiders using stolen credentials Insider Threat Report 2017:  74% companies vulnerable to insider attacks
  5. 5. 4 © Copyright 2017 FUJITSU The era of Digital Transformation Collapsing organisational boundaries: Fujitsu survey 2017  79% organisations are willing to share sensitive business information  63% already running or embarking on co-creation projects Digital Natives:  75% by 2020 Cloud First Policies GDPR : fines of up to 4% total revenue
  6. 6. 5 © Copyright 2017 FUJITSU Experience and Productivity Control and Security vs
  7. 7. 6 © Copyright 2017 FUJITSU Clip
  8. 8. 10 © Copyright 2017 FUJITSU Vulnerabilities Cyber Attack 3rd Party Maintenance finance system Housing Association website Third Party Maintenance CRM Housing Association email Legacy / Custom Apps Resident ID validation database Cyber Attack Cyber Attack Cyber Attack FirewallFirewall
  9. 9. 11 © Copyright 2017 FUJITSU Microsoft Microsoft 365
  10. 10. 12 © Copyright 2017 FUJITSU Microsoft + CITRIX Legacy/ Custom Apps Any applications, all data, hybrid Microsoft 365 Firewall Secure and improved UX Any device Single Sign On Contextual Access Contextual Performance Unified Experience Citrix Analytics Platform
  11. 11. 13 © Copyright 2017 FUJITSU Cyber Security, AI and Biometrics Biometric Enabled Hardware Unified, contextual digital workplace Fujitsu + Microsoft + CITRIX Workplace Anywhere Intelligent Engineering Social Command Center Hybrid IT Transformation Apps Users Dataand Analytics Legacy/ Custom Apps Any applications, all data, hybrid Microsoft 365 Firewall Secure and improved UX Any device Single Sign On Contextual Access Contextual Performance Unified Experience Citrix Analytics Platform
  12. 12. 14 © Copyright 2017 FUJITSU Cyber Security, AI and Biometrics Biometric Enabled Hardware Unified, contextual digital workplace Fujitsu + Microsoft + CITRIX Workplace Anywhere Intelligent Engineering Social Command Center Hybrid IT Transformation Apps Users Dataand Analytics Legacy/ Custom Apps Any applications, all data, hybrid Microsoft 365 Firewall Secure and improved UX Any device Single Sign On Contextual Access Contextual Performance Unified Experience Citrix Analytics Platform
  13. 13. 15 © Copyright 2017 FUJITSU Cyber Security, AI and Biometrics Biometric Enabled Hardware Unified, contextual digital workplace Fujitsu + Microsoft + CITRIX Workplace Anywhere Intelligent Engineering Social Command Center Hybrid IT Transformation Apps Users Dataand Analytics Legacy/ Custom Apps Any applications, all data, hybrid Microsoft 365 Firewall Secure and improved UX Any device Single Sign On Contextual Access Contextual Performance Unified Experience Citrix Analytics Platform
  14. 14. 16 © Copyright 2017 FUJITSU Delivering a truly secure user centric workplace Users Single sign on to all my Apps Know me, know where I am Know what I can or can’t share Protect my Data Protect my Identity Make it easy for me to collaborate
  15. 15. 17 © Copyright 2017 FUJITSU Summary  No silver bullet, but complexity is the enemy of security  Multi-layered clear strategy focused on the identity of the user and securing the data and apps  Cloud First strategy simplifies security  Focus on User Experience  Fujitsu, Microsoft and CITRIX, working together, have the skills and technology to protect enterprises
  16. 16. 18 © Copyright 2017 FUJITSU Fujitsu Sans Light – abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789 ¬!”£$%^&*()_+-=[]{};’#:@~,./<>?| ©¨~¡¢¤¥¦§¨ª«»¬- ®¯°±²³µ¶·¸¹º¼½¾¿ÀÁÂÃÄÅÇÈÆÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþ ÿĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝·-‒–—―‘’‚“”„†‡•…‰‹›‾⁄⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉€™Ω→∂∆∏∑−√∞∫≈≠≤≥⋅■◊fifl Fujitsu Sans – abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789 ¬!”£$%^&*()_+-=[]{};’#:@~,./<>?| ©¨~¡¢¤¥¦§¨ª«»¬- ®¯°±²³µ¶·¸¹º¼½¾¿ÀÁÂÃÄÅÇÈÆÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüý þÿĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝·-‒–—―‘’‚“”„†‡•…‰‹›‾⁄⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉€™Ω→∂∆∏∑−√∞∫≈≠≤≥⋅■◊fifl Fujitsu Sans Medium – abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789 ¬!”£$%^&*()_+-=[]{};’#:@~,./<>?| ©¨~¡¢¤¥¦§¨ª«»¬- ®¯°±²³µ¶·¸¹º¼½¾¿ÀÁÂÃÄÅÇÈÆÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúû üýþÿĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝·-‒–—―‘’‚“”„†‡•…‰‹›‾⁄⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉€™Ω→∂∆∏∑−√∞∫≈≠≤≥⋅■◊fifl

×