Fujitsu Enterprise and Cyber Security
Cloud computing, the Internet of Things among others, have ushered in a new era of IT, opening up organizations to rapid innovation – but also to new security threats. Fujitsu Enterprise and Cyber Security will work with you to address these specific challenges supported by expertise of our security professionals.
We offer a full portfolio of consulting and professional services as well as managed security services and work together with leading partners in the various disciplines of Enterprise and Cyber Security. Our managed security services are provided by our intelligence led Security Operations Centers, which protect your business with 24/7 proactive monitoring and incident response.
We develop our own security products and solutions, like the identity and access management solution Fujitsu PalmSecure, based on Fujitsu’s cutting edge biometric palm vein recognition technology.
Based on more than 40 years’ experience of working in highly secure environments in the public and private sector, Fujitsu provides a comprehensive portfolio of services, solutions and products to withstand in a world of cyber-security threats.
EventsHere you will find all the lectures and events of the exhibitor Fujitsu Technology Solutions GmbH, which take place as part of the it-sa program. Please note, that you may have to pay for some lectures.
Fujitsu Technology Solutions GmbH offers you products from these product groups:
- Authentication (151)
- Biometrics (24)
- BSI IT baseline protection (products and services) (133)
- CIP - Critical Infrastructure Protection (security solutions) (169)
- Cloud (computing) security (251)
- Compliance/GRC (products and services) (162)
- Data leakage/loss prevention (119)
- Denial of service protection (83)
- Endpoint Security (153)
- Hardware security (67)
- Identity and access management (189)
- Industrial IT security (209)
- Intrusion detection/prevention (144)
- Managed security services (172)
- Mobile security (190)
- Penetration tests (125)
- Risk analysis and management (123)
- Threat analyses (158)
- User (rights) administration (88)
- Web application security (124)
- Admission protection/access control (25)
- Data center securtiy (products and services) (57)
- Physical IT security (43)
- Time and attendance recording (5)
- Consulting IT security (222)
- Data center operation (33)