Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH...
Transcript of Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH...
![Page 1: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/1.jpg)
0 © Fujitsu Technology Solutions GmbH 2017
Executive Customer Council 2017
30. und 31. Mai 2017 Würzburg
![Page 2: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/2.jpg)
1 © Fujitsu Technology Solutions GmbH 2017
Geheime Informationen in unsicheren Umgebungen schützen
Leif Sundsbo CEO Hiddn Security AS
Rüdiger Landto Head of Client Business EMEIA
Product Business Group
![Page 3: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/3.jpg)
2 © Fujitsu Technology Solutions GmbH 2017
FUJITSU Notebooks and Tablets LIFEBOOK and STYLISTIC
Digitaler Wandel Mobilität Sicherheit
![Page 4: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/4.jpg)
3 © Fujitsu Technology Solutions GmbH 2017
Digitalisation within a hyper connected world challenges companies in different ways …
Connectivity Modern Workplace
Design Mobility Security
![Page 5: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/5.jpg)
4 © Fujitsu Technology Solutions GmbH 2017
Digitale Transformation Firmen setzen auf mobile Endgeräte
26%
40%
41%
47%
57%
62%
64%
66%
MDM
Services, excl cloud
App development for mobile
Cloud
Tablets
Servers
Notebook
Storage
2017 IT SPENDING PRIORITIES
34%
43%
46%
46%
51%
52%
53%
54%
54%
62%
65%
70%
Current devices not suitable
Improve competitive advantage/market share
Drive innovative image
Needs/apps not fulfilled by trad devices
Improve customer facing engagement
Reducing cost of business
Facilitate collab and info sharing
Workspace transformation
Digital transformation
Part of mobility strategy
Increase employees' flexibility/mobility
Increase employee's productivity
KEY DEPLOYMENT DRIVERS
Source: IDC Tablet in Enterprise 2.0 - The Larger
Opportunity - Multi Client Study 2016, IDC Europe,
Sep 2016
![Page 6: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/6.jpg)
5 © Fujitsu Technology Solutions GmbH 2017
Hurdles and inhibitors
Source : IDC Study Aggregate data for all countries (France, UK, Germany), all company sizes (10 – 500+ employees), all verticals
B9a. What do you see as the key challenges or inhibitors for deploying tablets or hybrids in your organization?
N = 1203
52% 48%
44%
39% 37% 35% 35% 34%
29% 26%
21%
Security issues,
data loss
Total cost of
ownership
App
development
challenges
Mobile device
management
complexity
Version control
issues between
mobile and
enterprise appS
Employees'
resistance to
change
Compliance and
regulatory
challenges
Concerns
related to
linking mobile
platform to
existing IT
systems
Senior
management
resistance to
change
Insufficient tools
to demonstrate
ROI
Doubts on
advantage of
tablets and
other devices
![Page 7: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/7.jpg)
6 © Fujitsu Technology Solutions GmbH 2017
Fujitsu Product Values
Reliability – quality and investment protection
Test center to put notebooks to the acid test
30 years of experience
Green – harmonise the environment and business
0-Watt AC Adapter
Reuse of waste plastics for new parts
Human-centric – perfect in form and functional design
Products empowering new work styles
Configurable to individual needs (e.g. shell concept)
Superior security and flexibility
Embedded PalmSecure™ technology
Choice of fingerprint sensor, SmartCard reader, TPM
![Page 8: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/8.jpg)
7 © Fujitsu Technology Solutions GmbH 2017
NATO TEMPEST standard, SDIP-27 level A.
CELSIUS H760
TEMPEST A
Mobile Server
LIFEBOOK E746
TEMPEST A
1.7 kg => 3kg Ultra light
![Page 9: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/9.jpg)
8 © Fujitsu Technology Solutions GmbH 2017
The Palm Secure Ecosystem is growing
Best Practice von BWO Switzerland
Youtube: BWO Handbiometrie Fujitsu (92CSQ4RGTL4)
BWO Handbiometrie Fujitsu
![Page 10: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/10.jpg)
9 © Fujitsu Technology Solutions GmbH 2017
Cyber Facts
GDPR
Securing the Endpoint
How Hiddn are working with the Norwegian Defense and NBV
Leif Sundsbo CEO Hiddn Security AS
![Page 11: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/11.jpg)
10 © Fujitsu Technology Solutions GmbH 2017
Cyber Facts
![Page 12: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/12.jpg)
11 © Fujitsu Technology Solutions GmbH 2017
List of Cyber Stats – Cyber Spending
Cyber Spending and the Cost of Cyber Crime
Security budgets have increased 35X over the past 13 years
(Cybersecurity Ventures)
In 2004 the global cybersecurity market was worth $3.5 billion. By
the end of 2017 it will be worth $120 billion (Wired)
Cybercrime will cost the world in excess of $6 trillion annually by
2021 (Cybersecurity Ventures)
The average cost per breach worldwide was $4 million, that figure
rose to $7 million in the U.S. (Ponemon Institute)
![Page 13: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/13.jpg)
12 © Fujitsu Technology Solutions GmbH 2017
List of Cyber Stats - Ransomware
According to IBM:
Ransomware increased 6,000% in 2016
Ransomware was in almost 40% of all spam messages in 2016
70% of business victims paid the hackers to get their data back
Of those who paid, 50% paid more than $10,000 and 20% paid more
than $40,000
Almost 40% of consumers would be willing to pay more than $100 to
get data back
![Page 14: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/14.jpg)
13 © Fujitsu Technology Solutions GmbH 2017
List of Cyber Stats – The Human Factor
95 % of all security incidents involve human error (IBM)
According to Ponemon
53 % of mobile professionals carry confidential company information
65 % of those who carry confidential company information don’t take steps to protect it
Up to 12,000 laptop computers are lost weekly
60 % of fired employees steal important corporate data after departing their position (Global HR)
According to the Verizon 2016 Data Breach Investigations Report:
30 % of phishing messages were opened by the receiver
89 % of all attacks involve financial or espionage motivations
63 % percent of confirmed data breaches involve weak, default or stolen passwords
![Page 15: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/15.jpg)
14 © Fujitsu Technology Solutions GmbH 2017
Dissecting Data Breaches and Debunking Myths
Source: Trend Micro
![Page 16: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/16.jpg)
15 © Fujitsu Technology Solutions GmbH 2017
Almost 40 % of Data loss from physical media
Source: McAfee Labs
![Page 17: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/17.jpg)
16 © Fujitsu Technology Solutions GmbH 2017
Lost Laptops – Heathrow Airport
58 lost laptops
last week
![Page 18: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/18.jpg)
17 © Fujitsu Technology Solutions GmbH 2017
GDPR
![Page 19: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/19.jpg)
18 © Fujitsu Technology Solutions GmbH 2017
The EU General Data Protection Regulation (GDPR): Are you ready?
![Page 20: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/20.jpg)
19 © Fujitsu Technology Solutions GmbH 2017
GDPR – What does it mean (Data breaches)
Article 33: The reporting of a data breach must be reported to the
Supervisory Authority within 72 hours of the data breach
Article 34: The notice to data subjects is not required if the data
controller has implemented pseudonymizing techniques like
encryption along with adequate technical and organizational
protection measures to the personal data affected by the data breach
![Page 21: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/21.jpg)
20 © Fujitsu Technology Solutions GmbH 2017
GDPR – What does it mean (Sanctions)
A fine up to 20,000,000 EUR or up to 4% of the annual worldwide
turnover of the preceding financial year in case of an enterprise,
whichever is greater (Article 83, Paragraph 5 & 6)
![Page 22: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/22.jpg)
21 © Fujitsu Technology Solutions GmbH 2017
Securing the Endpoint
![Page 23: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/23.jpg)
22 © Fujitsu Technology Solutions GmbH 2017
The Information is important to protect
![Page 24: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/24.jpg)
23 © Fujitsu Technology Solutions GmbH 2017
No Silver Bullett
![Page 25: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/25.jpg)
24 © Fujitsu Technology Solutions GmbH 2017
Layered Security
![Page 26: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/26.jpg)
25 © Fujitsu Technology Solutions GmbH 2017
Modern Endpoint Protection Strategy
Source: Gartner
![Page 27: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/27.jpg)
26 © Fujitsu Technology Solutions GmbH 2017
How Hiddn have worked with the Norwegian Defense and NBV
![Page 28: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/28.jpg)
27 © Fujitsu Technology Solutions GmbH 2017
1998 2010 2013 2015 2014 2017 2016 2011
FINANCIAL The company
receives
10mnok in funding
from the US
Defence. FINANCIAL IPO
SALES Start building Partner
and Distributor
program
R&D ACTIVITIES
PRODUCTS CoCrypt: NSM Re-Certification in
process
Laptop1+: NSM Re-Certification in
process
SALES
Hiddn secures contract with a Key Opinion Leader in
Europe
SafeDisK: NBV agreement signed
MARKET SCOPE New market- and
product strategy
launched. Target
segments are i) Military,
ii) government, iii)large
industrial companies, iv)
healthcare institutions,
v) financial enterprises
2012
SCALING AND PRODUCT DEVELOPMENT Cloud authentication
PKI Protocols
USB disk
PROTOTYPING PROOF OF
CONCEPT
2003
FINANCIAL Receives funding
from VC. New
HDD launched.
2009
PRODUCT SCOPE To develop a hardware encryption
solution where all encryption keys
are stored on an external token.
PRODUCT CoCrypt: NSM Re-
Certification 28/10-14 (til
28/2-16)
Laptop1+: NSM Re-
Certification 28/10-14 (til
28/2-16)
FINANCIAL Listed on OTC
SALES Strategic co-operation with
Fujitsu Norge
NEW NAME Hiddn Security
COMMERSIALI-
SATION
PROTOTYPE Start building
Partner and
Distributor program
PRODUCT Phasing out CM1 based
products
Starting CM1+ tech upgrade
of CM1 (Former SecureD)
PRODUCTS Laptop1+ (CM1+
based) Tested by
N.Defence, 8.2013 PRODUCTS CoCrypt CM1+: FIPS Certified
#2565
Laptop1+/CM1+:FIPS Certified
#2569
PRODUCTS IRD-Contract /NBV
(SafeDisk)
IRD-Contract /FLO
(coCrypt)
IN-kontrakt tilskudd
PRODUCT/Module SecureD FIPS 140-2 L3
Certified
#592, 12.01.2005. #717,
01.05.07
SecureD Common Criteria
EAL4+
Certified, 18.10.2006
SALES CM2 delivered to
NBV, 6.2014
SALES CM2 FW upgrade
delivered to NBV,
6.2015
PRODUCT /
SALES CM2/SafeDisk
IATO
CONFIDENTIAL
in NL., 25/11-16
Shipment of
SafeDisk to NL
Governm.,
13.12.2016
PRODUCT SecureD godkjent
12.09.2008 av NSM,
dette for 3 år, generell
regel.
PRODUCT SecureD utløp av NSM
Godkjenning
13.09.2011
PRODU
CTS coCrypt:
Midlertidig
Godkjenni
ng
utvidelse
jobbes
med
Latop1+:
Nei.
![Page 29: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/29.jpg)
28 © Fujitsu Technology Solutions GmbH 2017
Our Value proposition
Security
Your data is always encrypted when powered off and all keys are deleted
Usability
No user training is needed
Be confident that data remains
secure even if a device is lost
or stolen
![Page 30: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/30.jpg)
29 © Fujitsu Technology Solutions GmbH 2017
Solutions
Fully encrypted USB flash drive (micro-SD)
Display for ease of use
Two factor authentication
Encryption key deleted when flash drive is
removed from PC
User friendly; the user only need to type a
pin code
Fully encrypted laptop hard drive (SSD)
Pre-boot authentication PIN
Two factor authentication
Encryption key deleted when laptop is turned off or in hibernation
User friendly; the user only needs to insert a smart card and a pin code
Encrypted laptop hard drive (SafeDisk) Encrypted USB flash drive (CoCrypt) Encrypted external USB hard drive
Fully encrypted external hard drive connecting through USB
Pre-boot authentication PIN
Two factor authentication
Encryption key deleted when drive is not connected to a PC / laptop
User friendly; the user only needs to insert a smart card and a pin code
Can operate independently of PC / laptop’s own operating system
NEW
![Page 31: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/31.jpg)
30 © Fujitsu Technology Solutions GmbH 2017
Certifications
FIPS 140-2 Level 3
The Norwegian National Security Authority (NSM)
NBV in The Netherlands
![Page 32: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/32.jpg)
31 © Fujitsu Technology Solutions GmbH 2017
Target markets and use cases
Defence
• From Restricted to Secret
• Unclassified when turned off
• Northrop Grumman
Public Sector (The Netherlands)
• Employees can bring their PC`s out of the office
• Compliance
Enterprises
• Secure internal information
• Compliance
![Page 33: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/33.jpg)
32 © Fujitsu Technology Solutions GmbH 2017
Company Overview
Founded in 1998
Develops, manufactures and markets hardware-based encryption and authentication solutions
Located in Oslo
All solutions are designed, developed and produced in Norway
Listed on OSEBX with ticker Hiddn
![Page 34: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/34.jpg)
33 © Fujitsu Technology Solutions GmbH 2017
![Page 35: Executive Customer Council 2017 - Fujitsu Aktuell€¦ · 4 © Fujitsu Technology Solutions GmbH 2017 Digitale Transformation Firmen setzen auf mobile Endgeräte 26% 40% 41% 47% 57%](https://reader034.fdocuments.us/reader034/viewer/2022050223/5f688c75f00eaa49d45179cb/html5/thumbnails/35.jpg)
34 © Fujitsu Technology Solutions GmbH 2017
Leif Sundsbø
+47 984 40 400
www.hiddn.no