Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.

Similar presentations


Presentation on theme: "Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas."— Presentation transcript:

1

2 Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas Muno, SAP Labs, LLC SESSION CODE: BT1718

3  Android devices are coming to work in your enterprise! Learn how to play it safe with Google and SAP Mobile Secure  Distribute pre-enrolled iOS devices with the Apple Device Enrollment Program and protect them with SAP Mobile Secure  Learn how to apply SAP Best Practices™ as you secure your Fiori enterprise apps with best in class Mobility Management solutions from SAP. LEARNING POINTS

4  Employee productivity increases with simple to use Fiori apps on secure mobile devices  IT support is relieved from burdensome routine tasks as employees enroll devices and download enterprise apps on their own  Compliance improves with self-enforcing security policies for mobile apps and mobile devices  Your enterprise mobilization strategy expands to new user groups outside of the company as secure mobile apps reach business partners and customers  You gain new data points from interacting more efficiently with employees, suppliers, and customers  SAP Best Practices™, Rapid Deployment Solutions and openSAP courses get you there with confidence RETURN ON INVESTMENT

5  Implement your enterprise mobility strategy with SAP Best Practices™ in the cloud or on premise and go live in just a few weeks  SAP Rapid Deployment Solutions for Fiori apps and mobility, and openSAP learning on Fiori design, provide you with tried and true practices and guidance for secure mobilization of delightful user experiences  One lock may not be enough: Protect your network and your data with multiple layers of security to prevent data leakage and intrusion BEST PRACTICES

6  Why mobilizing the enterprise?  Threats to the mobile enterprise  Strategies to mitigate risks and increase adoption  User group segmentation and access rights  Security layering for different user groups  Android for Work, Apple Volume Purchase Program, and typical use cases in your enterprise and beyond  Spreading the wealth of Fiori to the masses, securely, and with best practices Agenda

7  Expectation of productivity gains main initial motivator for mobilization of employees, BYOD programs  Usefulness of mobile apps and their ease of use driving forces for user adoption  The New Frontier: Mobile use cases with users beyond your enterprise. Temp workers, suppliers, customers  [Replace this slide with recent statistics on productivity expectations, user adoption per platform] Why mobilizing the enterprise?

8 Mobile use cases beyond your own staff:  Temp Workers / Consultants  Suppliers / Service and Logistics Providers  Customers Mobilize Your Brand!

9 Security, integrity of enterprise data, and cost major concern of IT departments Threats to The Mobile Enterprise Security & ComplianceCost & Efficiency Corporate EspionageExcessive Roaming / Data / SMS usage SabotageLack of end user adoption Data LeakageLack of business integration

10 Methodically Reduce Risks  Identify Vulnerabilities: Devices, Apps, connections to enterprise, their users  Categorize and group risk factors  Conceive policies per group Boost Mobile End User Adoption  Simple wins  Convenience  Ease of use  Usefulness  Absence of Obstructions Strategies to counter risks, boost adoption

11 Keep it simple:  Access rights shall correspond with level of enterprise control  Corporate liable devices in the hands of executive officers may have broadest access  BYOD of employees get email & task- specific access rights User group segmentation & access rights

12 Security layering for different user groups

13 Android Work  Google’s container for corporate-managed secure mobile apps on Android devices  With APIs, EMM like SAP Mobile Secure can manage work apps in the container  Google partnered with SAP’s Mobile Secure team to get Android Work ready for serious BYOD business

14 iPhone & iPad in Business  Managed Accounts  Managed Apps  Managed Document Providers  Managed iBooks  Certificate Single Sign-On  Per-app VPN  256-bit AES encryption  Volume Purchase Program

15  SAP Fiori apps  Ready to run on any device  SAP Fiori apps Rapid- Deployment solution  Your own Fiori apps  Learn how to create them with openSAP  Build on the SAP Mobile Platform or HCPms using a Rapid Deployment Solution  Deploy your Fiori apps on the Mobile Place  Your secure corporate app store  For your employees, temps, suppliers, customers  Learn how with SAP Best Practices™  Empower your Workers  Use the SAP Work Manager RDS Spreading the Wealth of Fiori to all

16 Demo: How to secure and publish a Fiori app with SAP Mobile Secure

17 Now you have learned  How to secure your enterprise as you mobilize native and Fiori apps, with packaged SAP Best Practices™  How to take advantage of Google’s new Android Work program and of Apple’s iPhone and iPad for Business for your BYOD policies or corporate liable devices  How to safely expand the reach of your apps to temp workers, suppliers, and customers KEY LEARNINGS

18 STAY INFORMED Follow the ASUGNews team: Tom Wailgum: @twailgum Chris Kanaracus: @chriskanaracus Craig Powers: @Powers_ASUG Follow the presenter: Andreas Muno: @andreasmuno

19 THANK YOU FOR PARTICIPATING Please provide feedback on this session by completing a short survey via the event mobile application. SESSION CODE: BT1718 For ongoing education on this area of focus, visit www.ASUG.com


Download ppt "Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas."

Similar presentations


Ads by Google