1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard.

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Copyright © 2005 Toshiba Corporation. All rights reserved. The Tecra A3 Sales presentation.
Toshiba Europe (Schweiz) GmbH The Tecra A3 Sales presentation.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Public Safety Law Enforcement Fire EMS Government Federal/Military State & Local Utilities Gas Electric Telco “WorkBook”
BETTER LCD PROTECTION BETTER DISPLAY HINGES BETTER MOTHERBOARD BETTER KEYBOARD EXPERIENCE BETTER HDD CASE PROTECTION Tecra A8 Putting quality first for.
BETTER LCD PROTECTION BETTER DISPLAY HINGES BETTER MOTHERBOARD BETTER KEYBOARD EXPERIENCE BETTER HDD CASE PROTECTION Satellite Pro A120 Putting quality.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Chapter 9: Privacy, Crime, and Security
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
1.1 Installing Windows Server 2008 Windows Server 2008 Editions Windows Server 2008 Installation Requirements X64 Installation Considerations Preparing.
Information Technology, the Internet, and You © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Acer TravelMate P253 PRODUCT BRIEF Fast, efficient and reliable computing.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
CISCO ROUTER.  The Cisco router IOS  Enhanced editing  Administrative functions  Hostnames  Banners  Passwords  Interface descriptions  Verifying.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Toshiba Europe (Schweiz) GmbH The Portégé M300 Sales presentation.
Chapter 8 Operating Systems and Utility Programs Serena Oldhouser.
Copyright © 2006 Toshiba Corporation. All rights reserved. Sales presentation The Satellite L30 series TEG, July 2006.
Toshiba Europe (Schweiz) GmbH The Tecra A4 Sales presentation.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Chapter 4 System Software.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Week #7 Objectives: Secure Windows 7 Desktop
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Commercial Notebooks Accessories.
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.
Copyright © Toshiba Corporation. All rights reserved. The Tecra A4 Sales presentation.
UNOCODE 299 Copyright Silca S.p.A UNOCODE 299.
Initial Tiger Team Briefing New Dells with TPM Peter Leight Richard Hammer May 2006.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
UNIT 19 Data Security 2.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
Copyright © 2005 Toshiba Corporation. All rights reserved. The Tecra A5 Sales presentation.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Cscape EnvisionFX Horner APG, LLC March 7, EnvisionFX - What Does it Do? Graphical interface allows easy transfers of data to and from the PC and.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Introduction to Operating System. 1.1 What is Operating System? An operating system is a program that manages the computer hardware. It also provides.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Chapter 1: Computer Basics Instructor:. Chapter 1: Computer Basics Learning Objectives: Understand the purpose and elements of information systems Recognize.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
How Much Do I Remember? Are you ready to play.....
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Sales presentation The Tecra M3.
Sales presentation The Satellite L30 series TEG, July 2006.
- P47 SELLING FEATURE - USAGE MODEL
HC Hyper-V Module GUI Portal VPS Templates Web Console
TPM, UEFI, Trusted Boot, Secure Boot
The bios.
Presentation transcript:

1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard ISSUES

RESEARCH SUPPORTS TOSHIBA EASYGUARD 20MB of data takes 21 days and € to reproduce Virus attacks cost global businesses an estimated € 43 billion SMBs in EMEA are losing an estimate € 22 billion in downtime each year IT security spending set to double to 4% of overall IT spending 5,000 notebooks were found in taxis in the last 6 months in London

RESEARCH SUPPORTS TOSHIBA EASYGUARD NOTEBOOK FEATURE APPRAISAL

1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard STRATEGY

VALUE LEADERSHIP STRATEGY TO DRIVE MOBILE GROWTH

TOSHIBA IS READY TO MAKE THE NEXT SHIFT HAPPEN

TOSHIBA PC ARCHITECTURE ENHANCEMENTS

1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard CONCEPT

Toshiba EasyGuard is the better way to enhanced data security, advanced system protection and easy connectivity.

HDD Protection Shock Protection Design Spill-Resistant Keyboard PC Diagnostic Tool Easy Fix Components Magnesium Case Work Kensington Lock Data Backup Durable Design Diversity Antenna Toshiba ConfigFree™ Device Lock Utility Password Utilities Trusted Platform Module XD-Bit TOSHIBA EASYGUARD FEATURES Protect & Fix Connect Secure

1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard TECHNOLOGIES

Bigger base than LCD (Sticking out corners) Rounded corners Space for shock absorption (No PCB inside the corner) SHOCK PROTECTION DESIGN 2mm6mm

SPILL-RESISTANT KEYBOARD Will not work when 30 ml of water is spilt.Will work when 30 ml of water is spilt. w/o Spill Resistantwith new Spill Resistant KB CoverInsulatorTapeTwo-sided Tape Front Back

Unload head from HDD disks HDD Protection reduces risk of damage in case of fall, shock or vibration HDD PROTECTION Improvement durability of HDD Detects free fall 3D accelerometer: Detects free fall in all directions HDD head unloading: Decreases risk of media disk damage Various protection levels: Decreases possibility of false detection Shock absorption material: Improves hard-disk durability

TRUSTED PLATFORM MODULE Trusted Platform Module, TPM for short, is a secure storage chip for unique Public Key Infrastructure (PKI) key pairs and credentials. In other words, it is the ideal “safety box” where keys of encrypted data can be kept. Store keys, digital certificates, passwords and data securely in hardware Protect digital identities Ability to withstand logical and physical attacks to protected stored keys and credentials

EXECUTE DISABLE BIT (XD-BIT) Execute Disable Bit (XD-Bit) Prevention of buffer overflow virus attacks by enabling the system processor to distinguish between code that can and cannot be executed Data Execution Protection (DEP) Process that allows the system processor to disable code execution, thereby preventing virus damage or worm propagation Four DEP configurations User flexibility

Seamless control of both I/O and disk devices Isolate devices, making Them invisible Stops unwanted copying And distribution of data Secure, supervisor only administration Easy to use and manage Via software DEVICE LOCK UTILITY

NOTEBOOK FEATURE APPRAISAL Displays nearby active WiFi access point and Bluetooth in radar GUI. Draw a line to connect to devices WIRELESS RADAR Analyze your network connection and assist in fixing the problem. CONNECTIVITY DOCTOR CONFIGFREE™ SUMMIT PROFILE SETTINGS Enables you to easily switch between network configuration. Get connect with the members nearby. Members icon will show around the table, and document can be shared by Dragging the file on the center.

DIVERSITY ANTENNA 3 Antenna better than 1 up to 395% better performance

FUTURE 1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard

TOSHIBA EASYGUARD ROADMAP & TECHNOLOGY TRENDS 90 cm fall1 m fall1.5 m fall Software RAIDrain-proof notebookall-weather notebook Privacy screenMIMOUWB Biometric sensorvoice recognitionface recognition Integrated headset802.11e n GPS locatorWIFI detectorMobile IP CORE TECHNOLOGIES