News Feed Item

Fujitsu Offers FENICS II Business Wi-Fi Service to Promote Business Use of Smart Devices

Makes it easy to deploy and operate a secure wireless LAN environment

Tokyo, Aug 6, 2014 - (JCN Newswire) - Fujitsu announces the launch of FUJITSU Managed Infrastructure Service FENICS II Business Wi-Fi Service, which makes it easy for companies to deploy and operate a wireless LAN environment and to use the cloud. The new service will be available from today, in Japan only.

The new service builds the functions that companies need for their wireless LAN environments, such as authentication and management, into Fujitsu's cloud, allowing for centralized management of customer access points, including changing settings and checking signal condition, even after deployment. This reduces the up-front effort and costs that the customer bears when setting up a wireless LAN environment, makes it possible to deploy environments at the level of individual locations or other smaller-scale units, and simplifies maintenance and operations post-deployment.

The service can be used to prevent unauthorized devices or devices that are not permitted from joining a company network, and to provide access to the open Internet to guests. Functions like these support changing office work styles, where customers bring their own smart devices, and facilitate in-store online-to-offline (O2O) business.

Fujitsu plans to expand the products and services it offers as part of the FUJITSU Mobile Initiative, which supports innovation through the use of mobile technologies by customers and society.


The popularity of smart devices has created a sudden need for wireless LANs in offices as a part of a company's business infrastructure. Wireless LANs are not used only in business systems. They can also be used for Internet connectivity in retail stores and commercial facilities, and for tracking and navigation using a device's positioning information. They may also lead to the development of entirely new services.

Connecting to a company's wireless LAN, however, demands a high level of security, as this also may be a connection to the company's internal network. This would require that authentication servers be set up and access points be configured, an added effort and expense that creates a higher barrier to deploying a wireless LAN. Even after deployment, maintaining and operating the wireless LAN equipment, detecting radio-frequency problems with access points, and diagnosing problems with them in order to maintain stable connectivity all create additional burdens for network administrators.

To solve these problems, Fujitsu has incorporated its know-how for administering on-premises equipment into the new FENICS II Business Wi-Fi Service, which lightens the customer's workload from deployment through operations.

Service Features

The new service realizes the robust security that business requires based on authentication certificates that specify the devices allowed to connect to a company's internal network. Furthermore, by allowing Internet connections that visitors can use without any additional work on the existing network, retail stores and commercial facilities gain a new marketing platform.

1.Simple deployment, reduced operational workload

Authentication server and access points needed for a wireless LAN are provided as a service for a monthly fee, cutting customers' up-front costs and labor.

Access points installed on the customer premises can be monitored remotely using Fujitsu's own datacenter-management platform.

The system provides a reliable wireless communications environment by quantifying the noise that can impair communications quality and tracking the effects of radio interference. When problems arise with access points, the situation can be accurately assessed based on consistently configured settings information and log information, and problems can be quickly solved.

2.Safe and secure connectivity environment

In addition to authenticating by ID when attempting to connect, the service also supports device-certificate authentication. Using certificate permission prevents unauthorized third-party devices, or unauthenticated devices, from connecting to the company network. With support for Windows, Android, and iOS, the same level of security is available for multiple platforms.

3.Encourages new uses for wireless LANs

The service can provide connections to the public Internet, so that visitors to stores can access the web. Because this runs over the same access point used for reaching the company network, no extra work is involved in changing the existing network environment.

Usage scenario: office / Usage scenario: Store

Future Plans

- Fujitsu plans to enable access to the Business Wi-Fi Service using Windows Active Directory IDs and the company's own IDs for remote-access services, further increasing convenience for users and lightening administrator workloads (due in December 2014).

- Fujitsu plans to capture position-measurement data based on wireless LAN radio signals, for collection in the cloud. This can be used to visualize the paths that customers take through stores and where they pause. It could also be used to provide navigation services to workers in a factory (due in March 2015).

About Fujitsu Limited

Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Approximately 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.4 trillion yen (US$47 billion) for the fiscal year ended March 31, 2013 For more information, please see www.fujitsu.com.

Source: Fujitsu Limited

Fujitsu Limited
Public and Investor Relations

Copyright 2014 JCN Newswire. All rights reserved. www.japancorp.net

More Stories By JCN Newswire

Copyright 2008 JCN Newswire. All rights reserved. Republication or redistribution of JCN Newswire content is expressly prohibited without the prior written consent of JCN Newswire. JCN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Digital transformation is about embracing digital technologies into a company's culture to better connect with its customers, automate processes, create better tools, enter new markets, etc. Such a transformation requires continuous orchestration across teams and an environment based on open collaboration and daily experiments. In his session at 21st Cloud Expo, Alex Casalboni, Technical (Cloud) Evangelist at Cloud Academy, explored and discussed the most urgent unsolved challenges to achieve fu...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
DXWorldEXPO LLC announced today that "Miami Blockchain Event by FinTechEXPO" has announced that its Call for Papers is now open. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expe...
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.