what are the top three priorities for it? security, security and security

29
What Are the Top Three Priorities for IT? Security, Security, and Security Secure your mobile devices, apps, and content with SAP Mobile Secure August 21, 2013 Milja Gillespie, Product Marketing, SAP Mobile Secure James Naftel, Product Manager, SAP Mobile Secure http://twitter.com/SAPMobile http://www.facebook.com/SAPMobile Watch Webcast Replay

Upload: sap-mobile

Post on 10-May-2015

765 views

Category:

Technology


2 download

DESCRIPTION

Securing your enterprise for mobile operations is similar to protecting your home. If you have valuable property to protect, you can’t merely lock your doors. You need to lock the doors and windows, add a burglar alarm, install video surveillance, and maybe buy a safe to be completely secure from top to bottom. Your organization needs a similar approach for mobile security. The SAP Mobile Secure set of solutions addresses all the possible security gaps that come from supporting mobile devices, apps, and content. This comprehensive mobile management and security portfolio embraces mobile device diversity while safeguarding corporate information. It comes at security from multiple angles and combines the different hardware, application, and content approaches that are now available. IT no longer needs to integrate multiple point solutions. With SAP Mobile Secure, you can optimize the mobile experience for users and protect your organization by sealing vulnerable entry points: devices, apps, and content.

TRANSCRIPT

Page 1: What Are the Top Three Priorities for IT? Security, Security and Security

What Are the Top Three Priorities for IT?

Security, Security, and Security Secure your mobile devices, apps, and content with SAP Mobile Secure

August 21, 2013

Milja Gillespie, Product Marketing, SAP Mobile Secure

James Naftel, Product Manager, SAP Mobile Secure

http://twitter.com/SAPMobile

http://www.facebook.com/SAPMobile

Watch Webcast Replay

Page 2: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 2

The information in this presentation is confidential and proprietary to SAP and may not be disclosed without

the permission of SAP. This presentation is not subject to your license agreement or any other service or

subscription agreement with SAP. SAP has no obligation to pursue any course of business outlined in this

document or any related presentation, or to develop or release any functionality mentioned therein. This

document, or any related presentation and SAP's strategy and possible future developments, products and

or platforms directions and functionality are all subject to change and may be changed by SAP at any time

for any reason without notice. The information in this document is not a commitment, promise or legal

obligation to deliver any material, code or functionality. This document is provided without a warranty of any

kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness

for a particular purpose, or non-infringement. This document is for informational purposes and may not be

incorporated into a contract. SAP assumes no responsibility for errors or omissions in this document, except

if such damages were caused by SAP´s willful misconduct or gross negligence.

All forward-looking statements are subject to various risks and uncertainties that could cause actual results

to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-

looking statements, which speak only as of their dates, and they should not be relied upon in making

purchasing decisions.

Legal disclaimer

Page 3: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 3

Today’s presenters

James Naftel

Product Manager,

SAP Mobile Secure

@jamesnaftel

Milja Gillespie

Solution Marketing,

SAP Mobile Secure

@miljagillespie

Page 4: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 4

Agenda

Trends impacting how mobile devices are managed

Understanding Enterprise Mobility Management

Device: Mobile Device Management

Applications: Mobile Application Management, Enterprise App Stores

Content: Mobile Content Management

Key points to take home

Page 5: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 5

To run better is to run mobile

Productivity and end-user satisfaction

Empowerment and real-time decision making

Increase efficiency and “wrench time”

Improved visibility, risk mitigation, cost

controls

Greater customer communication and

personalization

Business Impact

Employees

Managers / Executives

Field Workers

Corporate IT

Customers / Consumers

Roles enabled by Mobile

Page 6: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 6

A secure foundation makes mobile run better

Start the day with email

Read earnings report, watch

video, prepare presentation

Get the latest new app

Managed Email Containerized Email Secure Content

App Dist’n

Page 7: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 7

Get to work using dozens of apps

Know apps are secure

A secure foundation makes mobile run better

View analytic reports

Prep for boardroom meeting

SAP Mobile Platform

Page 8: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 8

$7.7b

$2.7b

Business Apps:

Fastest Growing App Category in Apple App Store

2010 2015

1. IDC; 2. Forrester – “Mobile Trends of “Fortune 500” Companies” – Jun 2012; 3. Custom Solutions Group – “Mobile in the Enterprise: The Gap Between Expectations and Expertise” - 2012

WW enterprise apps market1

of Fortune 500 plan to implement mobile apps in 20122 of Enterprises lack mobile

app developers3

80% 50%

Yet...

WW apps market in 20161 Mobile app downloads by 20162 Average # of apps per device1

44b 41 $52b

Page 9: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 9

Trends impacting how mobile devices are managed

Cloud-based mobility services gaining momentum

Device ownership and use models changing

Mobile first and mobile only increasingly common

Increasing quantity of information to and from mobile devices 1100101 1011010 0100101

Ever-changing privacy requirements

Page 10: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 10

Overcome hardware

management

limitations

The four imperatives driving evolution

of enterprise mobility management

E-mail was the killer app

of the past. Today people

have dozens of apps to

manage and lots of

content to access

Management capabilities

are mandated by operating

system (OS) vendors,

limiting enterprise ability to

manage devices

Telecommunications

expense management and

BYOD cost containment

are key, along with multi-

device support and cloud

computing

There’s a need to better

integrate application

experience and

management experience,

along with a need to

support multiple mobile

architectures for each

device

Manage content and

applications

Maintain flexibility

and agility

Drive cost

containment

Page 11: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 11

Covering your bases: Mobile security approaches

Technology Description

App

Wrapping A method of containerization that involves segregating or isolating individual apps to

provide added security. After development, an app is “wrapped” and controls like

authentication, data connection tunnels, data encryption, and data loss prevention

policies are added with no coding required

Mobile Device

Management Focuses on the device level including the management and security of certificates, Wi-Fi

settings, E-Mail settings, VPN settings, and hardware and software inventory aspects,

and is typically responsible for deploying applications

App-specific

Containers A method of containerization that involves an application being placed into an existing

3rd party container. The container’s SDK is built into the mobile application source code

at the time of development

Virtualization An approach in which two virtual platforms are installed on a single wireless device. A

platform is simply an underlying computer system on which apps can run. The app runs

and data is stored remotely on a server, not the mobile device

Page 12: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 12

Agenda

Trends impacting how mobile devices are managed

Understanding SAP Mobile Secure

Devices: Mobile Device Management

Applications: Mobile Application Management, Enterprise App Stores

Content: Mobile Content Management

Key points to take home

Page 13: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 13

Internet

of

Things

Secure

Content

Management

SAP’s Mobile Security vision Millions of devices – billions of apps / docs – trillions of “things”

Mobile

Application

Management

Reach

Ric

hn

ess

Mobile

Device

Management

Services

Page 14: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 15

Single sign on Per-app VPN

Managed App Configuration

App provisioning User authentication

De

vic

e e

ncry

ptio

n

Ap

p d

istr

ibu

tio

n Asset tracking

Passcode control

Jailbreak detection

Content Management

Vers

ion c

ontr

ol

Co

nte

nt

en

cry

pti

on

Certificate

management

App wrapping Email provisioning

SAP Mobile Secure

Page 15: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 16

SAP Mobile Secure

Mobile Security Mobile Information Protection and Control – Mobile VPN - Mobile Identity and Access Management

Device

Mobile Device

Management

Application

Mobile App Security

Mobile Enterprise

App Store

Secure e-Mail Container

Content

Mobile Content

Management

Communication

Telecom Expense

Management

Network Access

Control

Enterprise Mobility Management System

SAP Mobile Secure

On-Premise Hybrid Cloud

Page 16: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 17

SAP Mobile Secure

SAP Afaria

Secure mobile devices

SAP Mobile

Documents

Secure Mobile Content

SAP Mobile

App Protection by Mocana

Secure Mobile Apps

Page 17: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 18

Securing devices: SAP Afaria

SAP Afaria is the trusted solution to manage and secure deployments of mobile devices for

any size of company – in the cloud or on-premise

Use built-in robust analytics

for instant insight into

mobile device usage and

the ability to take

immediate action

Meet the requirements of

the world’s largest

enterprises. Remotely lock

and wipe managed

devices, control security

settings for bring-your-own-

device (BYOD) or

corporate-owned devices

Quickly self-enroll devices

for enterprise use; have

control needed by pre-

configuring settings and

enforcing security and

compliance policies

Robust analytics Mobile device management Highly secure and scalable

Page 18: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 19

SAP Mobile Secure

SAP Afaria

Secure mobile devices

SAP Mobile

Documents

Secure Mobile Content

SAP Mobile

App Protection by Mocana

Secure Mobile Apps

Page 19: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 20

Securing content: SAP Mobile Documents

HTTP XML

iWork

Share files with teams,

colleagues, and business

partners from anywhere

Discover and access

content from corporate

document management

systems

Access personal business

documents instantly on

your laptop or any mobile

device

Share my files My files – any device Corporate content access

SAP Mobile Documents is designed for enterprise deployments where collaboration, security,

and control of business content are critical. Users enjoy anytime, anywhere access to view

and collaborate on personal and corporate content, in an easy-to-use, native mobile app

Page 20: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 21

SAP Mobile Secure

SAP Afaria

Secure mobile devices

SAP Mobile

Documents

Secure Mobile Content

SAP Mobile

App Protection by Mocana

Secure Mobile Apps

Page 21: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 22

Securing Apps: SAP Mobile App Protection by Mocana

SAP Mobile App Protection by Mocana helps organizations accelerate mobile initiatives by

automating app security. App-wrapping technology enables enterprises to quickly secure

existing corporate and third-party applications without having to write any code

Ensure security when

managing the device isn’t

ideal (for example, BYOD)

and when building B2B

apps

Accelerate app adoption:

no coding or security

expertise required.

Eliminate security

bottlenecks for operational

app deployments at scale

Protect corporate data and

meet compliance and audit

requirements in highly

regulated industries with

additional encryption and

security requirements

Increase flexibility Meet strict regulations Speed mobile initiatives

Page 22: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 23

SAP Mobile Secure

Active

Directory

Employee

Android Tablet Contractor

Apple iPhone

Distribute via Afaria

~ OR ~

Distribute via

SAP Enterprise Store

Executive

Android Phone

Page 23: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 24

Managing Apps: SAP Enterprise Store

SAP Enterprise Store is corporate enterprise app store. This HTML 5 based solution

provides a rich catalog experience for discovery and consumption of digital content

Responsive design runs on

many devices and

systems. Supports varied

digital content including

mobile and desktop apps,

eLearnings, etc. B2E, B2B,

B2B2C and B2C focus

Accelerate app adoption

with no coding or security

expertise required.

Eliminate security

bottlenecks for unmanaged

and managed devices

Tightly integrated with

customer’s SAP landscape:

SAP Store, SAP Solution

Manager, SAP Afaria, SAP

Portal, SRM, etc.

Multi-device, multi-

channel, multi-content

Enterprise Integration Accelerate App Adoption

Page 24: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 26

SAP Mobile Secure Architecture

SAP

Afaria Mobile Device

Management

SAP Mobile Secure

On-Premise Hybrid Cloud

SAP Mobile App

Protection Mobile Device

Management

SAP Mobile

Documents Mobile Device

Management

Enterprise Integration Management

iPhone / iPad Android Windows Desktop*

Windows Phone

Page 25: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 27

Agenda

Trends impacting how mobile devices are managed

Understanding Enterprise Mobility Management

Device: Mobile Device Management

Applications: Mobile Application Management, Enterprise App Stores

Content: Mobile Content Management

Key points to take home

Page 26: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 28

Analysts on SAP Mobile Secure

SAP Positioned as “Leader”

in Magic Quadrant for Mobile

Device Management Software

Source: Gartner: Magic Quadrant for Mobile Device Management Software23 May 2013 ID:G00249820

Analyst(s): Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available

upon request from SAP. http://www.gartner.com/reprints/sap-v7?id=1-1FRIMGV&ct=130523&st=sb

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest

ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties,

expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Page 27: What Are the Top Three Priorities for IT? Security, Security and Security

© 2013 SAP AG. All rights reserved. 29

Key points to take home

1 The mobile landscape changes frequently

3 Mobility management begins with solid planning

4 Understand the various approaches to manage mobility and choose wisely

5 Leverage SAP research and experience in mobile strategy

6 Consider the SAP Mobile Secure portfolio as your EMM solution

2 Mobile devices are not created equally

Page 28: What Are the Top Three Priorities for IT? Security, Security and Security

Thank you

Page 29: What Are the Top Three Priorities for IT? Security, Security and Security

Closing and Q&A

SAP Mobile Insights Webcast Series

http://bit.ly/sapmobileinsight

September 11, 2013

Gartner Names SAP a Leader in Mobile Application Development Platform Report The 2013 Gartner Mobile Application Development Platform Magic Quadrant report is now available to help you find

solutions that meet your exact challenges in making your mobile plans a reality. SAP is proud to be positioned as a

leader in this new report. Join Bill Clark and Anthony Reynolds for an interactive Webcast where they will share the

Gartner report and explore how mobile vision and execution strategies have empowered organizations to become

leaders in their own industries.

September 18, 2013

Transform Your Business with Mobile Solutions Learn how an engineering workforce stays connected to real-time data 24x7. Hear how British Airways deployed

enterprise applications, co-developed with Tata Consultancy Services Ltd., to improve workforce productivity and work

quality with on-the-go engineering information, ultimately driving customer satisfaction.