SlideShare a Scribd company logo
1 of 36
Download to read offline
© 2014 SECUDE AG |
© 2014 SECUDE AG | WWW.SECUDE.COM
BYOD Webinar for SAP
Securing Data in a Mobile World
© 2014 SECUDE AG |
Speakers
2
Michael Kummer
President Americas, SECUDE
Aparna Jue
Technical Product Manager, SECUDE
© 2014 SECUDE AG |
Agenda
!   Mobility & BYOD trends and what they mean for you
!   Mobility & BYOD challenges
!   Current approach and why it’s failing
!   What else can be done? A look at new technologies
3
1
2
3
4
© 2014 SECUDE AG |
About SECUDE
4
1996 Startup of Secude, Spin-Off from Fraunhofer & SAP
2000 SAP partnership (world-wide deployment of SECUDE SNC-SW)
2001 Market entry file/folder encryption
2002 Market entry Smartcard Management and E-SSO
2004 Startup of SECUDE USA
2005 Market entry Full Disc Encryption (FDE)
2006 Launch of FinallySecure Enterprise with Seagate (HW-based FDE)
2011 Spin-off of SECUDE’s SAP Security products to SAP AG
2011 Re-focus on endpoint protection & later SAP NetWeaver Single Sign-On
2012 Halocore initiative to bridge MS AD RMS with SAP
© 2014 SECUDE AG |
!   83% of people sleep next to
their cell phones (Pew Research
Center)
! 29% of Americans say their
phone is the first and last
thing they look at every day
(Qualcomm)
Mobility Goes Boom
St. Peter's Square in 2005 and 2013
© 2014 SECUDE AG |
4.38%
14.79%
24.02%
27.21%
29.59%
Mobility Landscape
Other
NO CONSENSUS ON OPERATING SYSTEM
DEVICE OBSESSION
86% are device obsessed
or “always on”
44% use their devices to
work during meals
20% consider themselves
workaholics
15% bring their devices on
vacation
Source:
Varonis
Systems
© 2014 SECUDE AG |
What is “Bring Your Own Device”?
!   Bring Your Own Devices enables users to bring devices they choose to
perform company work activities
!   Employees want BYOD for choice of device, applications, and ability to
combine personal and work lives
BYOD means any device
with any ownership, used anywhere.
© 2014 SECUDE AG |
There is No Stopping BYOD
!   The BYOD market will increase to $181 billion by
2017 (MarketsandMarkets)
!   95% of organizations permit employee-owned
devices (Cisco IBSG)
!   71% require technology that enables their staff to
work anywhere at any time (Microsoft)
!   70% of employees use personal devices for
business use (Forrester)
© 2014 SECUDE AG |
Why They BYOD: Benefits to Employees
Flexibility: No hassle with one device to combine work and
personal activities
Efficiency: Can get more done with my own device
Control: Can have greater control of my work experience
through choice of device
© 2014 SECUDE AG |
Why They BYOD: Benefits to Enterprises
Cost reduction: Annual benefits from BYOD range from $300
to $1300 per employee (Cisco IBSG)
Productivity: 53% have raised work productivity through
innovative practices enabled by their devices (Cisco IBSG)
Employee satisfaction: Employees feel more comfortable
while working on personal devices, which improves their job
satisfaction levels.
© 2014 SECUDE AG |
This is What We are Facing
End-User Behavior
•  Over 15 billion devices by
2015, with average worker
with 3 devices
•  New workspace: anywhere,
anytime
•  60% will download sensitive
corporate data on a personal
device
•  71% of Gen Y workforce don’t
obey policies
IT Trends
•  Must control multiple devices
and guests
•  Security: top concern for BYOD
•  75% of IT professionals believe
their organization’s sensitive
data is at risk due to mobile
devices
•  IT consumed with
fragmentation
Source: Logicalis
© 2014 SECUDE AG |
Issues in BYOD
!   Security issues
!   Privacy issues
!   Support issues
!   Infrastructure issues
!   Device control issues
© 2014 SECUDE AG |
Bring Your Own DISASTER
9 out of 10
employees
don’t use
password
security on
their devices
(Osterman Research)
51%
have had data
loss due to
insecure devices
(Websense)
81%
admit
accessing their
employer’s
network
without their
employer’s
knowledge or
permission (Juniper
Network)
46%
who use a
personal
device for
work have let
someone else
use It
(Harris Poll of US Adults)
66%
who use a
personal
device for
work say that
their
organization
doesn’t have a
BYOD policy
(Harris Poll of US Adults)
© 2014 SECUDE AG |
Main BYOD Security Concerns
7%
23%
29%
37%
44%
47%
65%
75%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Other
Support & Maintenance
Compliance with industry regulations
Device management
Lost or stolen devices
Malware infections
Unauthorized access to company data and
systems
Loss of company or client data
Source: Lumension
© 2014 SECUDE AG |
Data is Most Valuable Resource
Apps $ Devices $$ Data $$$$$$$$$
Secure your data, not apps or devices
3 key factors
© 2014 SECUDE AG |
Storing Data
37%
12%
8%
51%
42%
11%
0%
10%
20%
30%
40%
50%
60%
Keep work files on
personal laptops
Store work files on
personal smartphones
Keep enterprise
documents on personal
tablets
All Workers
Millenials
© 2014 SECUDE AG |
!   Corporate perimeter is eroding/has
eroded
!   Knowing where your data has
become a challenge
!   Keeping track is next to impossible
!   Let’s not forget: data exists to be
consumed
●  So locking everything down and
disallowing employees to productively
use data is counter-productive
The IT Challenge
File Server
Employees
Partner
© 2014 SECUDE AG |
Questions?
© 2014 SECUDE AG |
Existing Security Technologies
19
© 2014 SECUDE AG |
!   Firewall
●  Protects the (eroded) perimeter
!   DLP
●  Monitoring
§  Good to understand where data is
going
§  Problem is wealth of information it
produces
●  Prevention
§  Too far away from where data is born
§  Doesn’t know the context
§  Frustrates users
§  Often switched off
!   VPN
●  Protects data in transit only
Network-centric Solutions
© 2014 SECUDE AG |
!   FDE
●  Power-off protection
●  Good if you lose device or it’s stolen
●  No protection for data-in-use
!   Database encryption
●  Good to protect against unauthorized users
●  Complex and high maintenance
!   Mobile device encryption
●  Why that’s not possible
§  iOS devices come with built-in HW-based
encryption
§  App sandboxes prevents encryption of app data
Storage-centric Solutions
© 2014 SECUDE AG |
!   File-encryption (PGP…)
●  Key/password management issues
●  Protection is gone once file is
unlocked/decrypted
!   Rights Management (DRM, IRM
à RMS)
●  Capabilities of IRM
§  Protection = encryption + policy
§  Control who can open, edit, print,
copy/paste…
§  Expiration date
●  Established IRM solutions
§  Adobe
§  Oracle (SealedMedia)
§  Microsoft
Data-centric Solutions
© 2014 SECUDE AG |
Data-centric protection
Industry leading Microsoft Rights Management technology
Access Control
Encryption
Policy Enforcement
Unauthorized
User
Trusted
Partner
23
© 2014 SECUDE AG |
Data is Protected
!   Inside and outside the
organization
!   At a single location
u  And when moving amongst various locations
Partner
On premise Shared
© 2014 SECUDE AG |
Fine-grained Control
!   Content owners can define who can
●  Open the document
●  Edit the contents
●  Print the document
●  Forward to anyone, internal or external
●  Take other actions with the information
© 2014 SECUDE AG |
Questions?
© 2014 SECUDE AG |
Halocore for SAP NetWeaver
!   Innovative: Enforces RMS protection on all data leaving SAP
!   Secure: Determines what users are authorized to access sensitive data
!   Customizable: Offers fine-tuned control over who can do what with information
(view, edit, print, forward, etc.)
!   Flexible: Works for any file type
!   Powerful: Protection persists beyond SAP, including mobile platforms
© 2014 SECUDE AG |
Comprehensive Approach
1. Protection 2. Compliance 3. Audit
© 2014 SECUDE AG |
Demo
© 2014 SECUDE AG |
Where to Start?
!   Data Export Auditor for SAP
●  Free tool to monitor all data leaving SAP
●  Each and every download is tracked
●  Intelligent classification
●  Request download at www.secude.com
30
© 2014 SECUDE AG |
Auditing Capabilities - Customizing your view
© 2014 SECUDE AG |
Auditing Capabilities - The Log File
© 2014 SECUDE AG |
Questions?
© 2014 SECUDE AG |
Visit us at www.SECUDE.com
Tweet us @SECUDE
6/27/14 34
© 2014 SECUDE AG |
Aparna Jue
Technical Product Manager
www.secude.com
SECUDE IT Security, LLC
Alpharetta, GA USA
© 2014 SECUDE AG |
Copyright
SECUDE AG © 2014 All rights reserved.
All product and service names mentioned are the trademarks of their
respective companies. No part of this publication may be reproduced or
transmitted in any form or for any purpose without the express written
permission of SECUDE AG. The information contained herein may be
changed without prior notice.
Microsoft, Windows, and Active Directory are the brand names or
registered trademarks of Microsoft Corporation in the United States.
6/27/14 36

More Related Content

What's hot

Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Ivanti
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyCisco Mobility
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthrcnossen
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.CIOEastAfrica
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellAMD Developer Central
 
Business continuity strategy to combat coronavirus (covid 19) - innova global...
Business continuity strategy to combat coronavirus (covid 19) - innova global...Business continuity strategy to combat coronavirus (covid 19) - innova global...
Business continuity strategy to combat coronavirus (covid 19) - innova global...www.securitysystems.best
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityOptiv Security
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramNetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 

What's hot (18)

Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme!
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case study
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
Business continuity strategy to combat coronavirus (covid 19) - innova global...
Business continuity strategy to combat coronavirus (covid 19) - innova global...Business continuity strategy to combat coronavirus (covid 19) - innova global...
Business continuity strategy to combat coronavirus (covid 19) - innova global...
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 

Similar to BYOD Webinar for SAP: Securing Data in a Mobile World

Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...UL Transaction Security
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptx_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptxSeclore
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...Achim D. Brucker
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
Samsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial ServicesSamsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial ServicesSamsung SDS America
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 

Similar to BYOD Webinar for SAP: Securing Data in a Mobile World (20)

Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptx_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptx
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...Security in the Context of Business Processes: Thoughts from a System Vendor'...
Security in the Context of Business Processes: Thoughts from a System Vendor'...
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
Samsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial ServicesSamsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial Services
 
Awingu 4.0
Awingu 4.0Awingu 4.0
Awingu 4.0
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 

More from UL Transaction Security

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataUL Transaction Security
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsUL Transaction Security
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPUL Transaction Security
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesUL Transaction Security
 

More from UL Transaction Security (6)

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management Services
 

Recently uploaded

Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 

Recently uploaded (20)

Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 

BYOD Webinar for SAP: Securing Data in a Mobile World

  • 1. © 2014 SECUDE AG | © 2014 SECUDE AG | WWW.SECUDE.COM BYOD Webinar for SAP Securing Data in a Mobile World
  • 2. © 2014 SECUDE AG | Speakers 2 Michael Kummer President Americas, SECUDE Aparna Jue Technical Product Manager, SECUDE
  • 3. © 2014 SECUDE AG | Agenda !   Mobility & BYOD trends and what they mean for you !   Mobility & BYOD challenges !   Current approach and why it’s failing !   What else can be done? A look at new technologies 3 1 2 3 4
  • 4. © 2014 SECUDE AG | About SECUDE 4 1996 Startup of Secude, Spin-Off from Fraunhofer & SAP 2000 SAP partnership (world-wide deployment of SECUDE SNC-SW) 2001 Market entry file/folder encryption 2002 Market entry Smartcard Management and E-SSO 2004 Startup of SECUDE USA 2005 Market entry Full Disc Encryption (FDE) 2006 Launch of FinallySecure Enterprise with Seagate (HW-based FDE) 2011 Spin-off of SECUDE’s SAP Security products to SAP AG 2011 Re-focus on endpoint protection & later SAP NetWeaver Single Sign-On 2012 Halocore initiative to bridge MS AD RMS with SAP
  • 5. © 2014 SECUDE AG | !   83% of people sleep next to their cell phones (Pew Research Center) ! 29% of Americans say their phone is the first and last thing they look at every day (Qualcomm) Mobility Goes Boom St. Peter's Square in 2005 and 2013
  • 6. © 2014 SECUDE AG | 4.38% 14.79% 24.02% 27.21% 29.59% Mobility Landscape Other NO CONSENSUS ON OPERATING SYSTEM DEVICE OBSESSION 86% are device obsessed or “always on” 44% use their devices to work during meals 20% consider themselves workaholics 15% bring their devices on vacation Source: Varonis Systems
  • 7. © 2014 SECUDE AG | What is “Bring Your Own Device”? !   Bring Your Own Devices enables users to bring devices they choose to perform company work activities !   Employees want BYOD for choice of device, applications, and ability to combine personal and work lives BYOD means any device with any ownership, used anywhere.
  • 8. © 2014 SECUDE AG | There is No Stopping BYOD !   The BYOD market will increase to $181 billion by 2017 (MarketsandMarkets) !   95% of organizations permit employee-owned devices (Cisco IBSG) !   71% require technology that enables their staff to work anywhere at any time (Microsoft) !   70% of employees use personal devices for business use (Forrester)
  • 9. © 2014 SECUDE AG | Why They BYOD: Benefits to Employees Flexibility: No hassle with one device to combine work and personal activities Efficiency: Can get more done with my own device Control: Can have greater control of my work experience through choice of device
  • 10. © 2014 SECUDE AG | Why They BYOD: Benefits to Enterprises Cost reduction: Annual benefits from BYOD range from $300 to $1300 per employee (Cisco IBSG) Productivity: 53% have raised work productivity through innovative practices enabled by their devices (Cisco IBSG) Employee satisfaction: Employees feel more comfortable while working on personal devices, which improves their job satisfaction levels.
  • 11. © 2014 SECUDE AG | This is What We are Facing End-User Behavior •  Over 15 billion devices by 2015, with average worker with 3 devices •  New workspace: anywhere, anytime •  60% will download sensitive corporate data on a personal device •  71% of Gen Y workforce don’t obey policies IT Trends •  Must control multiple devices and guests •  Security: top concern for BYOD •  75% of IT professionals believe their organization’s sensitive data is at risk due to mobile devices •  IT consumed with fragmentation Source: Logicalis
  • 12. © 2014 SECUDE AG | Issues in BYOD !   Security issues !   Privacy issues !   Support issues !   Infrastructure issues !   Device control issues
  • 13. © 2014 SECUDE AG | Bring Your Own DISASTER 9 out of 10 employees don’t use password security on their devices (Osterman Research) 51% have had data loss due to insecure devices (Websense) 81% admit accessing their employer’s network without their employer’s knowledge or permission (Juniper Network) 46% who use a personal device for work have let someone else use It (Harris Poll of US Adults) 66% who use a personal device for work say that their organization doesn’t have a BYOD policy (Harris Poll of US Adults)
  • 14. © 2014 SECUDE AG | Main BYOD Security Concerns 7% 23% 29% 37% 44% 47% 65% 75% 0% 10% 20% 30% 40% 50% 60% 70% 80% Other Support & Maintenance Compliance with industry regulations Device management Lost or stolen devices Malware infections Unauthorized access to company data and systems Loss of company or client data Source: Lumension
  • 15. © 2014 SECUDE AG | Data is Most Valuable Resource Apps $ Devices $$ Data $$$$$$$$$ Secure your data, not apps or devices 3 key factors
  • 16. © 2014 SECUDE AG | Storing Data 37% 12% 8% 51% 42% 11% 0% 10% 20% 30% 40% 50% 60% Keep work files on personal laptops Store work files on personal smartphones Keep enterprise documents on personal tablets All Workers Millenials
  • 17. © 2014 SECUDE AG | !   Corporate perimeter is eroding/has eroded !   Knowing where your data has become a challenge !   Keeping track is next to impossible !   Let’s not forget: data exists to be consumed ●  So locking everything down and disallowing employees to productively use data is counter-productive The IT Challenge File Server Employees Partner
  • 18. © 2014 SECUDE AG | Questions?
  • 19. © 2014 SECUDE AG | Existing Security Technologies 19
  • 20. © 2014 SECUDE AG | !   Firewall ●  Protects the (eroded) perimeter !   DLP ●  Monitoring §  Good to understand where data is going §  Problem is wealth of information it produces ●  Prevention §  Too far away from where data is born §  Doesn’t know the context §  Frustrates users §  Often switched off !   VPN ●  Protects data in transit only Network-centric Solutions
  • 21. © 2014 SECUDE AG | !   FDE ●  Power-off protection ●  Good if you lose device or it’s stolen ●  No protection for data-in-use !   Database encryption ●  Good to protect against unauthorized users ●  Complex and high maintenance !   Mobile device encryption ●  Why that’s not possible §  iOS devices come with built-in HW-based encryption §  App sandboxes prevents encryption of app data Storage-centric Solutions
  • 22. © 2014 SECUDE AG | !   File-encryption (PGP…) ●  Key/password management issues ●  Protection is gone once file is unlocked/decrypted !   Rights Management (DRM, IRM à RMS) ●  Capabilities of IRM §  Protection = encryption + policy §  Control who can open, edit, print, copy/paste… §  Expiration date ●  Established IRM solutions §  Adobe §  Oracle (SealedMedia) §  Microsoft Data-centric Solutions
  • 23. © 2014 SECUDE AG | Data-centric protection Industry leading Microsoft Rights Management technology Access Control Encryption Policy Enforcement Unauthorized User Trusted Partner 23
  • 24. © 2014 SECUDE AG | Data is Protected !   Inside and outside the organization !   At a single location u  And when moving amongst various locations Partner On premise Shared
  • 25. © 2014 SECUDE AG | Fine-grained Control !   Content owners can define who can ●  Open the document ●  Edit the contents ●  Print the document ●  Forward to anyone, internal or external ●  Take other actions with the information
  • 26. © 2014 SECUDE AG | Questions?
  • 27. © 2014 SECUDE AG | Halocore for SAP NetWeaver !   Innovative: Enforces RMS protection on all data leaving SAP !   Secure: Determines what users are authorized to access sensitive data !   Customizable: Offers fine-tuned control over who can do what with information (view, edit, print, forward, etc.) !   Flexible: Works for any file type !   Powerful: Protection persists beyond SAP, including mobile platforms
  • 28. © 2014 SECUDE AG | Comprehensive Approach 1. Protection 2. Compliance 3. Audit
  • 29. © 2014 SECUDE AG | Demo
  • 30. © 2014 SECUDE AG | Where to Start? !   Data Export Auditor for SAP ●  Free tool to monitor all data leaving SAP ●  Each and every download is tracked ●  Intelligent classification ●  Request download at www.secude.com 30
  • 31. © 2014 SECUDE AG | Auditing Capabilities - Customizing your view
  • 32. © 2014 SECUDE AG | Auditing Capabilities - The Log File
  • 33. © 2014 SECUDE AG | Questions?
  • 34. © 2014 SECUDE AG | Visit us at www.SECUDE.com Tweet us @SECUDE 6/27/14 34
  • 35. © 2014 SECUDE AG | Aparna Jue Technical Product Manager www.secude.com SECUDE IT Security, LLC Alpharetta, GA USA
  • 36. © 2014 SECUDE AG | Copyright SECUDE AG © 2014 All rights reserved. All product and service names mentioned are the trademarks of their respective companies. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express written permission of SECUDE AG. The information contained herein may be changed without prior notice. Microsoft, Windows, and Active Directory are the brand names or registered trademarks of Microsoft Corporation in the United States. 6/27/14 36