Mobilizing our Sales Force via Paperless In-Store Selling
iPads in the Business Environment
Security Framework Outline General Approach to Mobility Security A 4 point approach to engineering a security architecture: 1.Policy – PVPs, IT Policies, etc 2.Control – Device controls, network security, data security (next slide) 3.Compliance – Internal Audits, Security Reviews, Change Management Protocols 4.Incentive – TCO, Risk Reporting, Policy Compliance
Control - 3 Vectors of Security VPN data transfer HTTPS protocols for access outside P&G network Secure Data Storage in P&G Data Centers or P&G Private Cloud Access Granted via Centrally Managed Access Groups using P&G Credentials. Device SecurityNetwork SecurityDatabase Security Paperless In-Store Selling Winning In-Store with Technology Transformation Inherent iOS Architecture security Data encryption at rest Complex passcode Auto Screen Locks Mobile Device Management platform Virtual Private Network to Access Data Data filtered to specific sales rep Mobile App Scanning (Automated)
Questions