1 / 23

1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard

ISSUES. 1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard. RESEARCH SUPPORTS TOSHIBA EASYGUARD. 20MB of data takes 21 days and €15.000 to reproduce

libra
Download Presentation

1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ISSUES 1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard

  2. RESEARCH SUPPORTS TOSHIBA EASYGUARD 20MB of data takes 21 days and €15.000 to reproduce Virus attacks cost global businesses an estimated € 43 billion SMBs in EMEA are losing an estimate € 22 billion in downtime each year IT security spending set to double to 4% of overall IT spending 5,000 notebooks were found in taxis in the last 6 months in London

  3. RESEARCH SUPPORTS TOSHIBA EASYGUARD NOTEBOOK FEATURE APPRAISAL

  4. STRATEGY 1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard

  5. VALUE LEADERSHIP STRATEGY TO DRIVE MOBILE GROWTH

  6. TOSHIBA IS READY TO MAKE THE NEXT SHIFT HAPPEN

  7. TOSHIBA PC ARCHITECTURE ENHANCEMENTS

  8. CONCEPT 1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard

  9. Toshiba EasyGuard is the better way to enhanced data security, advanced system protection and easy connectivity.

  10. TOSHIBA EASYGUARD FEATURES Connect Protect & Fix Diversity Antenna Toshiba ConfigFree™ HDD Protection Shock Protection Design Spill-Resistant Keyboard PC Diagnostic Tool Easy Fix Components Magnesium Case Work Kensington Lock Data Backup Durable Design Secure Device Lock Utility Password Utilities Trusted Platform Module XD-Bit

  11. TECHNOLOGIES 1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard

  12. SHOCK PROTECTION DESIGN • Bigger base than LCD (Sticking out corners) • Rounded corners • Space for shock absorption • (No PCB inside the corner) 6mm 2mm

  13. SPILL-RESISTANT KEYBOARD Two-sided Tape Insulator Tape KB Cover Back Front Will not work when 30 ml of water is spilt. Will work when 30 ml of water is spilt. w/o Spill Resistant with new Spill Resistant

  14. HDD PROTECTION HDD Protection reduces risk of damage in case of fall, shock or vibration 3D accelerometer: Detects free fall in all directions HDD head unloading: Decreases risk of media disk damage Various protection levels: Decreases possibility of false detection Shock absorptionmaterial: Improves hard-disk durability  Unload head from HDD disks Improvement durability of HDD Detects free fall

  15. TRUSTED PLATFORM MODULE Trusted Platform Module, TPM for short, is a secure storage chip for unique Public Key Infrastructure (PKI) key pairs and credentials. In other words, it is the ideal “safety box” where keys of encrypted data can be kept. Store keys, digital certificates, passwords and data securely in hardware Protect digital identities Ability to withstand logical and physical attacks to protected stored keys and credentials

  16. EXECUTE DISABLE BIT (XD-BIT) Execute Disable Bit (XD-Bit) Prevention of buffer overflow virus attacks by enabling the system processor to distinguish between code that can and cannot be executed Data Execution Protection (DEP) Process that allows the system processor to disable code execution, thereby preventing virus damage or worm propagation Four DEP configurations User flexibility

  17. DEVICE LOCK UTILITY Seamless control of both I/O and disk devices Isolate devices, making Them invisible Stops unwanted copying And distribution of data Secure, supervisor only administration Easy to use and manage Via software

  18. PROFILE SETTINGS WIRELESS RADAR NOTEBOOK FEATURE APPRAISAL Enables you to easily switch between network configuration. Displays nearby active WiFi access point and Bluetooth in radar GUI. Draw a line to connect to devices CONNECTIVITY DOCTOR CONFIGFREE™ SUMMIT Analyze your network connection and assist in fixing the problem. Get connect with the members nearby. Members icon will show around the table, and document can be shared by Dragging the file on the center.

  19. DIVERSITY ANTENNA 3 Antenna better than 1 up to 395% better performance

  20. FUTURE 1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard

  21. TOSHIBA EASYGUARD ROADMAP & TECHNOLOGY TRENDS CORE TECHNOLOGIES 90 cm fall 1 m fall 1.5 m fall Software RAID rain-proof notebook all-weather notebook Privacy screen MIMO UWB Biometric sensor voice recognition face recognition Integrated headset 802.11e 802.11 n GPS locator WIFI detector Mobile IP

More Related