Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
MOBILIZING CRM ONE STEP AT A TIME Mark Wright, Sybase Senior Systems Consultant Nora Tucker, Sybase Product Marketing Manager Bill Laberis, IDG.
Building Mobile Apps in the Cloud – Comparing Approaches.
Enterprise Mobility Platform Microsoft Differentiation Managed Mobile Productivity Layered Protection Hybrid Solutions Office 365DynamicsWorkday.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
Steve Lamb - QAD QAD Enterprise Applications and Mobile Devices.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Mobility Methods for document access while away from the office.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
VISITBASIS Автоматизация работы тайных покупателей с приложением VisitBasis для Android и iOS. Android & iOS Mobile App for Field Data Collection. VisitBasis.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.
Mobility Project iPad Experiences & Results Child Welfare Technology Conference October 23, 2013 PRESENTED BY County of Ventura, Human Services Agency.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
Empowering Mobile Sales Force with Variant Configuration at Thompson Creek Dan Pletcher (Thompson Creek) Daniel Naus (ConfigAir) SESSION CODE: MP425.
It’s time to get Personal – Customer Engagement and Commerce for the Chemical Industry Frank Kochendoerfer, Qnovate SESSION CODE: CH966.
Brooks Brothers Embarks on a Business Transformation with SAP HANA Sahal S SESSION CODE: RL2325.
Best practices from The Coca-Cola Company in using technology for improving change management Saurabh Parikh, Director BI & Appdev, Coca-Cola Chris Trueman,
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Orange County Convention Center Orlando, Florida | June 3-5, 2014 Project and Change Management for LMS Implementation Susie Howell & Ginger McCullough.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Welcome. Welcome to this TechNet Event URL for on-line feedback is in your reminder No Planned Fire Drills Please turn your Mobile Phones off To.
Make Mobile Work For You Dave Lewis. Why Mobile GIS? Key Business Drivers for Field Operations Empowering Field Operations with Data Replace paper maps.
User and Device Management
Pat Fetty – Principal PM Manager Securing your mobile assets with Microsoft Intune WIN33 1.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Craig Pringle & Derek Moir
Inspirienc e the Future. Devices 1 billion smartphones by 2016, 350M of those being used at work People 82 % of the world's online population engages.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
#SummitNow Managing Mobile Content Wednesday 13 th November 2013 Mike Hatfield, Lead Engineer Mobile Apps, Alfresco Marc Dubresson, Dir. Mobile Product.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
Rapid Launch Workshop ©CC BY-SA.
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
Transforming business
Utilize Internal Data via Mobile Business Apps
Deploying ArcGIS for Water
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Protect sensitive information with Office 365 DLP
Booklet365 Office 365 Outlook Add-In Makes Easy Work of Managing Schedules for Fitness Gyms, Sports Associations, Trainers, and Their Customers Partner.
Microsoft Services Cloud Productivity Solutions
Introduction to Soonr by ….
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Frequently Asked Questions NCSC Product Certification
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
AddIn Intranet for Office 365 Lets Teams Contribute and Communicate from Any Device. AddIn Analytics on Microsoft Azure Measures Employee Adoption Partner.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Yooba File Sync: A Microsoft Office 365 Add-In That Syncs Sales Content in SharePoint Online to Yooba’s Sales Performance Management Solution OFFICE 365.
In the attack index…what number is your Company?
Presentation transcript:

Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas Muno, SAP Labs, LLC SESSION CODE: BT1718

 Android devices are coming to work in your enterprise! Learn how to play it safe with Google and SAP Mobile Secure  Distribute pre-enrolled iOS devices with the Apple Device Enrollment Program and protect them with SAP Mobile Secure  Learn how to apply SAP Best Practices™ as you secure your Fiori enterprise apps with best in class Mobility Management solutions from SAP. LEARNING POINTS

 Employee productivity increases with simple to use Fiori apps on secure mobile devices  IT support is relieved from burdensome routine tasks as employees enroll devices and download enterprise apps on their own  Compliance improves with self-enforcing security policies for mobile apps and mobile devices  Your enterprise mobilization strategy expands to new user groups outside of the company as secure mobile apps reach business partners and customers  You gain new data points from interacting more efficiently with employees, suppliers, and customers  SAP Best Practices™, Rapid Deployment Solutions and openSAP courses get you there with confidence RETURN ON INVESTMENT

 Implement your enterprise mobility strategy with SAP Best Practices™ in the cloud or on premise and go live in just a few weeks  SAP Rapid Deployment Solutions for Fiori apps and mobility, and openSAP learning on Fiori design, provide you with tried and true practices and guidance for secure mobilization of delightful user experiences  One lock may not be enough: Protect your network and your data with multiple layers of security to prevent data leakage and intrusion BEST PRACTICES

 Why mobilizing the enterprise?  Threats to the mobile enterprise  Strategies to mitigate risks and increase adoption  User group segmentation and access rights  Security layering for different user groups  Android for Work, Apple Volume Purchase Program, and typical use cases in your enterprise and beyond  Spreading the wealth of Fiori to the masses, securely, and with best practices Agenda

 Expectation of productivity gains main initial motivator for mobilization of employees, BYOD programs  Usefulness of mobile apps and their ease of use driving forces for user adoption  The New Frontier: Mobile use cases with users beyond your enterprise. Temp workers, suppliers, customers  [Replace this slide with recent statistics on productivity expectations, user adoption per platform] Why mobilizing the enterprise?

Mobile use cases beyond your own staff:  Temp Workers / Consultants  Suppliers / Service and Logistics Providers  Customers Mobilize Your Brand!

Security, integrity of enterprise data, and cost major concern of IT departments Threats to The Mobile Enterprise Security & ComplianceCost & Efficiency Corporate EspionageExcessive Roaming / Data / SMS usage SabotageLack of end user adoption Data LeakageLack of business integration

Methodically Reduce Risks  Identify Vulnerabilities: Devices, Apps, connections to enterprise, their users  Categorize and group risk factors  Conceive policies per group Boost Mobile End User Adoption  Simple wins  Convenience  Ease of use  Usefulness  Absence of Obstructions Strategies to counter risks, boost adoption

Keep it simple:  Access rights shall correspond with level of enterprise control  Corporate liable devices in the hands of executive officers may have broadest access  BYOD of employees get & task- specific access rights User group segmentation & access rights

Security layering for different user groups

Android Work  Google’s container for corporate-managed secure mobile apps on Android devices  With APIs, EMM like SAP Mobile Secure can manage work apps in the container  Google partnered with SAP’s Mobile Secure team to get Android Work ready for serious BYOD business

iPhone & iPad in Business  Managed Accounts  Managed Apps  Managed Document Providers  Managed iBooks  Certificate Single Sign-On  Per-app VPN  256-bit AES encryption  Volume Purchase Program

 SAP Fiori apps  Ready to run on any device  SAP Fiori apps Rapid- Deployment solution  Your own Fiori apps  Learn how to create them with openSAP  Build on the SAP Mobile Platform or HCPms using a Rapid Deployment Solution  Deploy your Fiori apps on the Mobile Place  Your secure corporate app store  For your employees, temps, suppliers, customers  Learn how with SAP Best Practices™  Empower your Workers  Use the SAP Work Manager RDS Spreading the Wealth of Fiori to all

Demo: How to secure and publish a Fiori app with SAP Mobile Secure

Now you have learned  How to secure your enterprise as you mobilize native and Fiori apps, with packaged SAP Best Practices™  How to take advantage of Google’s new Android Work program and of Apple’s iPhone and iPad for Business for your BYOD policies or corporate liable devices  How to safely expand the reach of your apps to temp workers, suppliers, and customers KEY LEARNINGS

STAY INFORMED Follow the ASUGNews team: Tom Chris Craig Follow the presenter: Andreas

THANK YOU FOR PARTICIPATING Please provide feedback on this session by completing a short survey via the event mobile application. SESSION CODE: BT1718 For ongoing education on this area of focus, visit