Mobilizing our Sales Force via Paperless In-Store Selling.

Slides:



Advertisements
Similar presentations
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Advertisements

Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Artaker Computersysteme Unseren Lösungen können Sie vertrauen!
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
Unified Logs and Reporting for Hybrid Centralized Management
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Barracuda Networks Steve Scheidegger Commercial Account Manager
1© Copyright 2014 EMC Corporation. All rights reserved. Kenny Pool Advisory Systems Engineer Third Platform Apps & EMC: Redefining IT & Helping Our Customers.
Your storage on the ground; Your files in the cloud.
Steering Committee CSRIC Working Group 2A Cyber Security Best Practices October 7, 2010.
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
1 NETE4631 Mobile Cloud Computing Lecture Notes #10.
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
Dell Connected Security Solutions Simplify & unify.
ENTERPRISE COMPUTING QUIZ By: Lean F. Torida
University of Wisconsin-Madison MobileUW Hideko J. Mills Manager of IT Research Infrastructure, MobileUW Project Manager Office of the CIO & VP for IT.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Paul Stich CEO Mobile App Risk Management – Over 5 million mobile apps – Small customer – 300 employees = 13,800 apps – Enterprise customer – 100K employees.
BARRY JINKS President & CEO March 22, 2011 President & CEO March 22, 2011.
IS Network and Telecommunications Risks Chapter Six.
Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Anthony Bettini Founder & CEO Appthority – The Authority in App Security.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Technology Trends and the Productivity Gains for Life Sciences Companies Randy Paroda, Director of Product Development September 17, 2013.
GOTBACKUP THE BEST BACKUP SOLUTIONS. SIGN UP TODAY! CLICK HERECLICK HERE.
Cloud Strategy made Simple David G. Fletcher. 2 Hybrid Cloud Approach Utah is building a private cloud to provision services from its virtualized infrastructure.
You Got Chocolate On My iPad! Barry Caplin Chief Information Security Officer MN Department of Human Services MN Gov’t. IT Symposium Session 100: Thurs.
Jericho Commandments, Future Trends, & Positioning.
© 2009 VMware Inc. All rights reserved VMworld General Session Core Content Summary Name, Title, Company.
Interconnecting Autonomous Medical Domains Gritzalis, S.Gritzalis, S. ; Belsis, P. ; Katsikas, S.K. ; Univ. of the Aegean, Samos Belsis, P.Katsikas, S.K.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
LEADING FACET OF NETWORKING- CLOUD COMPUTING. Infrastructure provided by the service provider to build internet application. The service provided by cloud.
1 AaS 2.5 Hybrid Cloud - The Best Solution? Bryan Porter, CTO - DataBank.
Citrix ShareFile. Instant file access from any device Sharing and collaboration—with anyone Easy & Familiar (love Dropbox) USERS DEMAND Security Control.
Technical and organisational measures for protecting data and ensuring data security Simon Rice Group Manager (Technology) 29 May 2014.
- Company Confidential - Corporate Overview March 2015.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Example First: Cost savings conversation Cloud-First Dynamics AX Architecture Microsoft Dynamics AX Data Management Services AX MorphX Dev Tools.
Clouding with Microsoft Azure
Grid Wide IoT Gateway Supports open standards and technologies, with open interfaces that provide support for proprietary gas-meter reading protocols and.
Barracuda Mobile Device Manager
Hybrid Cloud Web Filtering Platform
Barracuda Web Security Flex
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Power BI Security Best Practices
Secure & Unified Identity
Network Access Control 101 Securing the Critical Edge of Your Network
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Above the Clouds A Berkeley View of Cloud Computing
Hosted on Microsoft Azure, Seismic is Drastically Changing How Enterprise Sales Teams Utilize Content to Accelerate Sales and Close Deals MICROSOFT AZURE.
Data Security for Microsoft Azure
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Automating Security in the Cloud
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Andy Puckett – Sales Engineer
Features Overview.
Virtual Machine Migration for Secure Out-of-band Remote Management in Clouds T.Unoki, S.Futagami, K.Kourai (Kyushu Institute of Technology) OUT-OF-BAND.
Chapter 10. Mobile Device Security
NeXT PC Building PC Integration IaaS Networking DaaS Telephony Audit
Presentation transcript:

Mobilizing our Sales Force via Paperless In-Store Selling

iPads in the Business Environment

Security Framework Outline General Approach to Mobility Security A 4 point approach to engineering a security architecture: 1.Policy – PVPs, IT Policies, etc 2.Control – Device controls, network security, data security (next slide) 3.Compliance – Internal Audits, Security Reviews, Change Management Protocols 4.Incentive – TCO, Risk Reporting, Policy Compliance

Control - 3 Vectors of Security VPN data transfer HTTPS protocols for access outside P&G network Secure Data Storage in P&G Data Centers or P&G Private Cloud Access Granted via Centrally Managed Access Groups using P&G Credentials. Device SecurityNetwork SecurityDatabase Security Paperless In-Store Selling Winning In-Store with Technology Transformation Inherent iOS Architecture security Data encryption at rest Complex passcode Auto Screen Locks Mobile Device Management platform Virtual Private Network to Access Data Data filtered to specific sales rep Mobile App Scanning (Automated)

Questions