close

IT Operations Management & credential security – best practice

I always tend to bring napkins for meetings with network security & infrastructure teams during an implementation of ITOM. When they hear you need domain admin credentials to discover windows machines they either cry or spit out their coffee on my suit. L...

How leading with threats helps prioritise your cyber security strategy

Security practitioners have long held the opinion that an understanding of assets and risk is the bedrock for security. This understanding increases confidence in the decisions made to allocate resources to protect the assets that really matter from the things...

Our new CELSIUS workstations reach new heights of security and performance

It’s a very exciting time for us here at FUJITSU as we’ve just introduced four new CELSIUS works...

Fujitsu included in prestigious Gartner Magic Quadrant for Managed Security Services

For the first time, Fujitsu has gained inclusion in the Gartner Magic Quadrant for Managed Security ...

Conference on Digital Administration

New perspectives for the work of police and security authorities

In recent years, security of citizens has become one of the top issues in Germany in society, politi...