Skip to main content


United States

  1. Home > About Us > Security

Mobile Security

Security - Rich Features Provide Layers of Protection

One of the biggest threats to enterprise security is illicit access to mobile devices that contain sensitive, confidential data and provide access to corporate networks. Since your mobile computer must be flexible and deployable in a variety of environments, Fujitsu uses multiple methods for securing its LIFEBOOK® and STYLISTIC® PCs from unauthorized access.

  • Using the highly complex vein pattern in the palm of your hand, the palm vein sensor is a contactless, hygienic, highly secure authentication technology that’s extremely difficult to forge. Ideal for login/single sign-on entry security, infrastructure access management, secured cloud access, and shared use environments.
  • Our Trusted Platform Module solution combines an embedded TPM chip with software to uniquely identify the mobile device, authenticate it to the network, and securely encrypt files and data. For truly hardened security, encryption keys are stored on the chip and not on the hard drive.
  • Two-level BIOS and hard drive password protection prevent unauthorized users from changing BIOS settings or unlocking the drive, even if removed.
  • Smart Cards can store consolidated passwords and authenticate the user, preventing unauthorized logons or e-commerce actions.
  • An optional fingerprint sensor provides user authentication and easy password management via pre-installed biometric software.
  • Absolute's patented Persistence technology is embedded in the BIOS of most Fujitsu mobile PCs. Once activated, Persistence powers Absolute DDS and other critical security applications, providing unrivalled visibility and resilience – even if devices are off network. If attempts are made to disable this, Persistence initiates an automatic, zero-touch reinstallation of Absolute DDS or any other software agent, ensuring that your devices, data and applications are always protected.

More information on Product Security
Overview | Mobile | Servers | Storage | Software | Services