Welcome!

News Feed Item

Fujitsu Offers FENICS II Business Wi-Fi Service to Promote Business Use of Smart Devices

Makes it easy to deploy and operate a secure wireless LAN environment

Tokyo, Aug 6, 2014 - (JCN Newswire) - Fujitsu announces the launch of FUJITSU Managed Infrastructure Service FENICS II Business Wi-Fi Service, which makes it easy for companies to deploy and operate a wireless LAN environment and to use the cloud. The new service will be available from today, in Japan only.

The new service builds the functions that companies need for their wireless LAN environments, such as authentication and management, into Fujitsu's cloud, allowing for centralized management of customer access points, including changing settings and checking signal condition, even after deployment. This reduces the up-front effort and costs that the customer bears when setting up a wireless LAN environment, makes it possible to deploy environments at the level of individual locations or other smaller-scale units, and simplifies maintenance and operations post-deployment.

The service can be used to prevent unauthorized devices or devices that are not permitted from joining a company network, and to provide access to the open Internet to guests. Functions like these support changing office work styles, where customers bring their own smart devices, and facilitate in-store online-to-offline (O2O) business.

Fujitsu plans to expand the products and services it offers as part of the FUJITSU Mobile Initiative, which supports innovation through the use of mobile technologies by customers and society.

Background

The popularity of smart devices has created a sudden need for wireless LANs in offices as a part of a company's business infrastructure. Wireless LANs are not used only in business systems. They can also be used for Internet connectivity in retail stores and commercial facilities, and for tracking and navigation using a device's positioning information. They may also lead to the development of entirely new services.

Connecting to a company's wireless LAN, however, demands a high level of security, as this also may be a connection to the company's internal network. This would require that authentication servers be set up and access points be configured, an added effort and expense that creates a higher barrier to deploying a wireless LAN. Even after deployment, maintaining and operating the wireless LAN equipment, detecting radio-frequency problems with access points, and diagnosing problems with them in order to maintain stable connectivity all create additional burdens for network administrators.

To solve these problems, Fujitsu has incorporated its know-how for administering on-premises equipment into the new FENICS II Business Wi-Fi Service, which lightens the customer's workload from deployment through operations.

Service Features

The new service realizes the robust security that business requires based on authentication certificates that specify the devices allowed to connect to a company's internal network. Furthermore, by allowing Internet connections that visitors can use without any additional work on the existing network, retail stores and commercial facilities gain a new marketing platform.

1.Simple deployment, reduced operational workload

Authentication server and access points needed for a wireless LAN are provided as a service for a monthly fee, cutting customers' up-front costs and labor.

Access points installed on the customer premises can be monitored remotely using Fujitsu's own datacenter-management platform.

The system provides a reliable wireless communications environment by quantifying the noise that can impair communications quality and tracking the effects of radio interference. When problems arise with access points, the situation can be accurately assessed based on consistently configured settings information and log information, and problems can be quickly solved.

2.Safe and secure connectivity environment

In addition to authenticating by ID when attempting to connect, the service also supports device-certificate authentication. Using certificate permission prevents unauthorized third-party devices, or unauthenticated devices, from connecting to the company network. With support for Windows, Android, and iOS, the same level of security is available for multiple platforms.

3.Encourages new uses for wireless LANs

The service can provide connections to the public Internet, so that visitors to stores can access the web. Because this runs over the same access point used for reaching the company network, no extra work is involved in changing the existing network environment.

Usage scenario: office / Usage scenario: Store

Future Plans

- Fujitsu plans to enable access to the Business Wi-Fi Service using Windows Active Directory IDs and the company's own IDs for remote-access services, further increasing convenience for users and lightening administrator workloads (due in December 2014).

- Fujitsu plans to capture position-measurement data based on wireless LAN radio signals, for collection in the cloud. This can be used to visualize the paths that customers take through stores and where they pause. It could also be used to provide navigation services to workers in a factory (due in March 2015).

About Fujitsu Limited

Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Approximately 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.4 trillion yen (US$47 billion) for the fiscal year ended March 31, 2013 For more information, please see www.fujitsu.com.



Source: Fujitsu Limited

Contact:
Fujitsu Limited
Public and Investor Relations
www.fujitsu.com/global/news/contacts/
+81-3-3215-5259


Copyright 2014 JCN Newswire. All rights reserved. www.japancorp.net

More Stories By JCN Newswire

Copyright 2008 JCN Newswire. All rights reserved. Republication or redistribution of JCN Newswire content is expressly prohibited without the prior written consent of JCN Newswire. JCN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"Tintri focuses on the Ops side of the DevOps, which basically is pushing more and more of the accessibility of the infrastructure to the developers and trying to get behind the scenes," explained Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Cloud applications are seeing a deluge of requests to support the exploding advanced analytics market. “Open analytics” is the emerging strategy to deliver that data through an open data access layer, in the cloud, to be directly consumed by external analytics tools and popular programming languages. An increasing number of data engineers and data scientists use a variety of platforms and advanced analytics languages such as SAS, R, Python and Java, as well as frameworks such as Hadoop and Spark...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 21st Int\ernational Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their ...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide re...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists discussed...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...