fujitsu logo

Fujitsu Announces Availability of PalmSecure BioLock

Brand

fujitsu_logo

Fujitsu today announces immediate availability of PalmSecure BioLock, the industry’s most secure access control technology for SAP systems. Providing biometric access control for SAP ERP and HANA systems, Fujitsu PalmSecure BioLock is now available for the first time.

Through a global reseller agreement with realtime AG, the SAP Gold partner that develops bioLock biometric control software for SAP access, Fujitsu is now the only SAP Global Partner able to offer this advanced biometric security capability as an SAP-certified, natively-embedded solution either directly or via it’s sales partners. As a consequence, SAP customers worldwide can add an extra layer of biometric security to their SAP environments and protect sensitive data from theft, loss and fraud with highly secure, convenient identity and access management.

By extending its existing partnership with realtime AG with a new, global contract, Fujitsu is now able to offer its advanced biometric identity management solution. This enables strict, granular access control to SAP systems by assigning user rights following biometric identification – which avoids the problem of user passwords being shared or copied.

Seamlessly integrated with traditional SAP security including Single Sign-On and SAP Governance, Risk and Compliance (GRC), Fujitsu PalmSecure bioLock identifies users by the unique pattern of blood vessels in their palm to control login to critical SAP systems including human resources, customer relationship management, supply chain management and finance software, retail point-of-sale systems, as well as the SAP HANA platform. Biometric authentication even allows for secure access to SAP systems from shared devices. Important or risk-prone activities can be further protected with additional biometric re-authentication checkpoints to ensure that only authorized employees can execute critical transactions.

New and enhanced features of Fujitsu PalmSecure bioLock include biometric authentication for physical access control to restricted areas of company premises, as well as full integration with the SAP Time and Attendance Management module. Advanced bundling and pre-configured solution packages shorten deployment times within SAP environments.

According to Fujitsu customer Mapula Mano, SAP Specialist Plant Maintenance, Sales and Distribution at Transnet Engineering: “We use Fujitsu PalmSecure bioLock to secure SAP plant maintenance, production planning and shop-floor processes across our railway engineering business. Users are authenticated biometrically before they can access SAP systems via shared access kiosks installed in factories and train depots. We no longer have to worry about password fraud from users at all.”

Martin Lum, Vice President Marketing at realtime AG North America, said: “Just like the customers they serve, Fujitsu has the global reach and capability to offer security solutions to their international customers. We are very pleased to work with them to help their SAP and HANA customers overcome current security business challenges.”

Thomas Bengs, Director and Head of PalmSecure Products and Solutions of Fujitsu EMEIA comments: “Current statistics show that most large organizations lose a minimum of five percent of their global revenue to fraud, every year. Whether it’s with intent or through carelessness, employees can actually pose a bigger security risk than external hackers, making it a business imperative that only authorized employees can access sensitive data. With our easy-to-deploy and highly secure PalmSecure bioLock solution, organizations can enforce strict but user-friendly access control to all areas of their SAP environment and log all activities with extensive audit trails. Typically, they will benefit from a return on investment in less than 12 months. We are delighted to build on our existing partnership with realtime AG to help SAP customers worldwide achieve the highest level of security and provide the industry’s highest levels of protection to ensure that sensitive data is not compromised.”

 

Leave a Reply

5 × 4 =