SlideShare a Scribd company logo
1 of 8
Download to read offline
SAP Solution Brief
Enterprise Mobility
SAP Mobile App Protection by Mocana
Secure Enterprise Apps in
Seconds Across Managed and
Unmanaged Mobile Devices
BenefitsSolutionObjectives Quick Facts
©2013SAPAGoranSAPaffiliatecompany.Allrightsreserved.
2 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved.
Objectives
App security for enterprise safety
Security concerns can slow the momentum toward mobile computing.
Whether your enterprise is deploying third-party mobile apps or developing
them internally, they must be locked down tight. That’s not easy. Users bring
in their own mobile devices, download their own apps, mix personal and
business content, and carry confidential business data outside of corporate
protection.
Device management is the cornerstone of a
complete strategy for enterprise mobility
management. Today, new mobile app security
methods are shifting device management
and security into mobile apps and removing
dependence on hardware. Enterprises are
increasingly looking to such “app wrapping”
for added security.
App wrapping separates security from the
development process and provides fine-grain
usage and security policies in mobile apps. By
“wrapping” security into each app, the SAP®
Mobile App Protection solution by Mocana
helps administrators meet security needs in
deploying either internal or third-party
software.
Companies with strict security requirements
and those in highly regulated industries –
such as financial services, healthcare, retail,
and government – are realizing that app
wrapping adds flexibility in bring-your-own-
device (BYOD) environments. It can also
speed the development process for business-
to-business or business-to-employee apps.
App security for enterprise safety
Benefits Quick FactsSolution
3 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved.
Automated security to meet
compliance and audit requirements
SAP Mobile App Protection helps you accel­
erate mobile initiatives by automating app
security. You can apply consistent, replicable
controls across all your enterprise apps
without writing any code, and you can secure
business and confidential data on managed
or unmanaged corporate devices.
You can also secure apps on devices that you
don’t control or are not on your network –
including those of partners, contractors, or
employees. Just choose an app or group of
apps, select the related security policies, and
add functions for encryption, data protection,
authentication, and virtual private networks
(VPNs).
SAP Mobile App Protection also helps you ful-
fill compliance and audit requirements, such
as those for the Health Insurance Portability
and Accountability Act (HIPAA), regulations
for the payment card industry (PCI), and
other industry rules. You can readily integrate
security policies that suit your organization
and industry into an existing IT environment.
Automated security to meet
compliance and audit requirements
Speed mobile initiatives
Secure communications and
prevent data loss
Solution BenefitsObjectives Quick Facts
Apply meaningful security policies across
all your apps.
4 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved.
Speed mobile initiatives
By streamlining the process of making apps
more secure, SAP Mobile App Protection helps
keep mobile projects on track. By quickly add-
ing security features to one or many mobile
apps across your user community, you can
reduce the time required for app development
and deployment phases by days and weeks.
In addition to app-level encryption, data
protection, authentication, and VPN, you can
choose from a variety of security policies,
including:
•• User authentication
•• Data loss prevention
•• Secure data transfer between wrapped
apps
•• Data-at-rest encryption with cryptography
certified by Federal Information Processing
Standard (FIPS) 140-2
•• Jailbreak – or rooting – detection
•• Per-app VPN tunnel
•• Contextual usage
•• Controls for cut, copy, and paste
BenefitsSolutionObjectives Quick Facts
Automated security to meet
compliance and audit requirements
Speed mobile initiatives
Secure communications and
prevent data loss
Quickly protect valuable corporate app data with
your choice of security functions and policies.
5 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved.
Secure communications and
prevent data loss
SAP Mobile App Protection keeps data in
motion safe by communicating with an app
over a 256-bit encrypted tunnel.This prevents
potential rogue applications and malware from
accessing your enterprise network. It prohibits
unauthorized copying and pasting from spe-
cific applications to help stop data leaks.
A smart firewall policy lets you block several
types of potentially insecure network traffic
from the app and require proper digital certi-
fication before communicating with a server.
By requiring user-authentication passwords for
access to an app, SAP Mobile App Protection
also helps ensure that data is quickly made
inaccessible when devices are lost or stolen.
The software supports app-data wipes based
on certain conditions, such as too many failed
authentication attempts.
Geofencing adds another layer of protection
by restricting app usage and availability
within a specific geographic perimeter. You
can also set an expiration date on an app to
create time-limited access. If a device is com-
promised by jailbreaking or rooting, you can
rapidly disable the app and prevent access
to stored data.
BenefitsSolutionObjectives Quick Facts
Automated security to meet
compliance and audit requirements
Speed mobile initiatives
Secure communications and
prevent data loss
6 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved.
Safe mobile apps and an exceptional
user experience
The pressure for mobile business processes
comes from all sides of the enterprise. Execu-
tives and users at other levels want the con-
venience of mobile apps. Enterprise mobility
is a competitive differentiator that helps orga-
nizations respond more quickly to their cus-
tomers, partners, and employees. Businesses
are also realizing that mobile apps increase
productivity, improve efficiency, and speed
time to market.
With SAP Mobile App Protection, business
processes can be mobile and safe from mis-
use even when devices and apps are used by
partners, contractors, and customers. If your
mobile app deployments have been sidelined
by security concerns, let the automated
security that comes from app wrapping put
your project back on track. The software adds
robust security to business apps in seconds
and protects your enterprise from risk while
providing your users with a high-quality
mobile experience.
Users can interact with their mobile apps in
familiar ways without installing an additional
client or separating their business and per-
sonal apps. Authentication merely requires a
user name and passcode. Assisted passcode
recovery is available. Once authenticated,
users can connect to enterprise servers
through a VPN tunnel, which is maintained
and autoconnected even if a user moves from
one network to another.
Safe mobile apps and an exceptional
user experience
BenefitsSolutionObjectives Quick Facts
7 / 7
Summary
The SAP® Mobile App Protection solution by
Mocana speeds mobile initiatives by helping
eliminate security problems that bottleneck
the development and deployment of enter-
prise apps. SAP Mobile App Protection
“wraps” data protection and access control
features around an app – without any manual
changes or coding. Enterprises gain robust
security for their mobile apps in seconds.
Objectives
•• Add security to enterprise apps without
writing code
•• Enable bring-your-own-device (BYOD) envi-
ronments with safe, secure communications
•• Speed app deployment and development
•• Meet industry compliance and auditing
requirements, including HIPAA and payment
card industry (PCI)
Solution
•• Proven, robust app security automation
•• App-level virtual private network (VPN)
and encryption security with FIPS 140-2
cryptography
•• Consistent, repeatable security controls that
you can apply across all enterprise apps
•• User-friendly enterprise mobility with
assisted passcode recovery and rapid
authentication
Benefits
•• Secure apps and data across all managed
and unmanaged devices
•• Customized security that aligns with users
and business requirements
•• Compliance with industry requirements
•• Decreased liability from exposure to corpo-
rate data breaches
Learn more
To find out more, call your SAP
representative today, or visit us online at
www.sap.com/mobile-app-protection.
www.sap.com Quick FactsBenefitsSolutionObjectives
CMP25822 (13/05)
© 2013 SAP AG or an SAP affiliate company. All rights reserved.
© 2013 SAP AG or an SAP affiliate company. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG.
The information contained herein may be changed without prior notice.
Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors.
National product specifications may vary.
These materials are provided by SAP AG and its affiliated companies (“SAP Group”) for informational purposes only, without
representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials.
The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying
such products and services, if any. Nothing herein should be construed as constituting an additional warranty.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of
SAP AG in Germany and other countries.
Please see http://www.sap.com/corporate-en/legal/copyright/index.epx#trademark for additional trademark information and notices.

More Related Content

What's hot

McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookIftikhar Ali Iqbal
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365David J Rosenthal
 
Mastering APM With End User Monitoring - AppD Summit Europe
Mastering APM With End User Monitoring - AppD Summit EuropeMastering APM With End User Monitoring - AppD Summit Europe
Mastering APM With End User Monitoring - AppD Summit EuropeAppDynamics
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalIftikhar Ali Iqbal
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...Iftikhar Ali Iqbal
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesCA Technologies
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
 
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit EuropeCisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit EuropeAppDynamics
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdfAkhil Kumar
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 

What's hot (19)

McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365
 
Mastering APM With End User Monitoring - AppD Summit Europe
Mastering APM With End User Monitoring - AppD Summit EuropeMastering APM With End User Monitoring - AppD Summit Europe
Mastering APM With End User Monitoring - AppD Summit Europe
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit EuropeCisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
Cisco and AppDynamics: Redefining Application Intelligence - AppD Summit Europe
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdf
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 

Viewers also liked

Integrate, automate, and personalize business communications with greater ease
Integrate, automate, and personalize business communications with greater easeIntegrate, automate, and personalize business communications with greater ease
Integrate, automate, and personalize business communications with greater easeSAP Solution Extensions
 
TSG 1899 Hoffenheim Customer Success Profile
TSG 1899 Hoffenheim Customer Success ProfileTSG 1899 Hoffenheim Customer Success Profile
TSG 1899 Hoffenheim Customer Success ProfileSAP Solution Extensions
 
Customer Success Profile - Adobe and SAP Incentive Administration by Vistex
Customer Success Profile - Adobe and SAP Incentive Administration by VistexCustomer Success Profile - Adobe and SAP Incentive Administration by Vistex
Customer Success Profile - Adobe and SAP Incentive Administration by VistexSAP Solution Extensions
 
How Distributors Increase Income with Automated Rebates and Chargebacks
How Distributors Increase Income with Automated Rebates and ChargebacksHow Distributors Increase Income with Automated Rebates and Chargebacks
How Distributors Increase Income with Automated Rebates and ChargebacksSAP Solution Extensions
 

Viewers also liked (8)

Lenovo Customer Success Profile
Lenovo Customer Success ProfileLenovo Customer Success Profile
Lenovo Customer Success Profile
 
Integrate, automate, and personalize business communications with greater ease
Integrate, automate, and personalize business communications with greater easeIntegrate, automate, and personalize business communications with greater ease
Integrate, automate, and personalize business communications with greater ease
 
TSG 1899 Hoffenheim Customer Success Profile
TSG 1899 Hoffenheim Customer Success ProfileTSG 1899 Hoffenheim Customer Success Profile
TSG 1899 Hoffenheim Customer Success Profile
 
Lenovo InsiderPROFILES article
Lenovo InsiderPROFILES articleLenovo InsiderPROFILES article
Lenovo InsiderPROFILES article
 
Cheney Brother Customer Success Profile
Cheney Brother Customer Success ProfileCheney Brother Customer Success Profile
Cheney Brother Customer Success Profile
 
Customer Success Profile - Adobe and SAP Incentive Administration by Vistex
Customer Success Profile - Adobe and SAP Incentive Administration by VistexCustomer Success Profile - Adobe and SAP Incentive Administration by Vistex
Customer Success Profile - Adobe and SAP Incentive Administration by Vistex
 
SAP Solution Extensions [Infographic]
SAP Solution Extensions [Infographic] SAP Solution Extensions [Infographic]
SAP Solution Extensions [Infographic]
 
How Distributors Increase Income with Automated Rebates and Chargebacks
How Distributors Increase Income with Automated Rebates and ChargebacksHow Distributors Increase Income with Automated Rebates and Chargebacks
How Distributors Increase Income with Automated Rebates and Chargebacks
 

Similar to Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices

SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS America
 
Application Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxApplication Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxfestockton
 
Application Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxApplication Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxRAHUL126667
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksHyker Security
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsAlex Zaltsman
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataAppear
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus. SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus. Micro Focus
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - nowSymantec
 

Similar to Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices (20)

Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Go Mobile with SAP Cloud Platform
Go Mobile with SAP Cloud PlatformGo Mobile with SAP Cloud Platform
Go Mobile with SAP Cloud Platform
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for Healthcare
 
Application Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxApplication Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docx
 
Application Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxApplication Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docx
 
SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...
SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...
SAP Mobile Platform: Virtual Bootcamp – How to build your Enterprise Mobile A...
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platforms
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus. SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus.
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Autodesk Technical Webinar: SAP Mobile Platform
Autodesk Technical Webinar: SAP Mobile PlatformAutodesk Technical Webinar: SAP Mobile Platform
Autodesk Technical Webinar: SAP Mobile Platform
 
Microsoft Technical Webinar: SAP Mobile Platform for Windows 8 and Windows Ph...
Microsoft Technical Webinar: SAP Mobile Platform for Windows 8 and Windows Ph...Microsoft Technical Webinar: SAP Mobile Platform for Windows 8 and Windows Ph...
Microsoft Technical Webinar: SAP Mobile Platform for Windows 8 and Windows Ph...
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 

More from SAP Solution Extensions

Infographic - Digital Transformation with SAP Solution Extensions
Infographic - Digital Transformation with SAP Solution ExtensionsInfographic - Digital Transformation with SAP Solution Extensions
Infographic - Digital Transformation with SAP Solution ExtensionsSAP Solution Extensions
 
Use Data-Driven Enterprise Planning in Your Meat, Poultry, or Fish Company
Use Data-Driven Enterprise Planning in Your Meat, Poultry, or Fish CompanyUse Data-Driven Enterprise Planning in Your Meat, Poultry, or Fish Company
Use Data-Driven Enterprise Planning in Your Meat, Poultry, or Fish CompanySAP Solution Extensions
 
Centurion Medical Products - Customer Success Story
Centurion Medical Products - Customer Success Story Centurion Medical Products - Customer Success Story
Centurion Medical Products - Customer Success Story SAP Solution Extensions
 
SAP Extended Enterprise Content Management - Solution Brief
SAP Extended Enterprise Content Management - Solution Brief SAP Extended Enterprise Content Management - Solution Brief
SAP Extended Enterprise Content Management - Solution Brief SAP Solution Extensions
 
Application Test Management and Quality Assurance
Application Test Management and Quality Assurance Application Test Management and Quality Assurance
Application Test Management and Quality Assurance SAP Solution Extensions
 
Efficient Product, Pricing, and Partner Data Maintenance
Efficient Product, Pricing, and Partner Data Maintenance Efficient Product, Pricing, and Partner Data Maintenance
Efficient Product, Pricing, and Partner Data Maintenance SAP Solution Extensions
 
Capture and Feed Telecom Network Data and More Into SAP HANA - Quicky and Aff...
Capture and Feed Telecom Network Data and More Into SAP HANA - Quicky and Aff...Capture and Feed Telecom Network Data and More Into SAP HANA - Quicky and Aff...
Capture and Feed Telecom Network Data and More Into SAP HANA - Quicky and Aff...SAP Solution Extensions
 
E Signature Solution Brief - SAP Signature Management by Docusign
E Signature Solution Brief - SAP Signature Management by Docusign E Signature Solution Brief - SAP Signature Management by Docusign
E Signature Solution Brief - SAP Signature Management by Docusign SAP Solution Extensions
 
Solution Brief - Time and Attendance Management
Solution Brief - Time and Attendance Management Solution Brief - Time and Attendance Management
Solution Brief - Time and Attendance Management SAP Solution Extensions
 
Proactively manage your field workforce in real time
Proactively manage your field workforce in real time Proactively manage your field workforce in real time
Proactively manage your field workforce in real time SAP Solution Extensions
 
SAP Lease Administration by Nakisa Thought Leadership Whitepaper
SAP Lease Administration by Nakisa Thought Leadership WhitepaperSAP Lease Administration by Nakisa Thought Leadership Whitepaper
SAP Lease Administration by Nakisa Thought Leadership WhitepaperSAP Solution Extensions
 

More from SAP Solution Extensions (20)

Infographic - Digital Transformation with SAP Solution Extensions
Infographic - Digital Transformation with SAP Solution ExtensionsInfographic - Digital Transformation with SAP Solution Extensions
Infographic - Digital Transformation with SAP Solution Extensions
 
Use Data-Driven Enterprise Planning in Your Meat, Poultry, or Fish Company
Use Data-Driven Enterprise Planning in Your Meat, Poultry, or Fish CompanyUse Data-Driven Enterprise Planning in Your Meat, Poultry, or Fish Company
Use Data-Driven Enterprise Planning in Your Meat, Poultry, or Fish Company
 
Centurion Medical Products - Customer Success Story
Centurion Medical Products - Customer Success Story Centurion Medical Products - Customer Success Story
Centurion Medical Products - Customer Success Story
 
SAP Extended Enterprise Content Management - Solution Brief
SAP Extended Enterprise Content Management - Solution Brief SAP Extended Enterprise Content Management - Solution Brief
SAP Extended Enterprise Content Management - Solution Brief
 
Application Test Management and Quality Assurance
Application Test Management and Quality Assurance Application Test Management and Quality Assurance
Application Test Management and Quality Assurance
 
Efficient Product, Pricing, and Partner Data Maintenance
Efficient Product, Pricing, and Partner Data Maintenance Efficient Product, Pricing, and Partner Data Maintenance
Efficient Product, Pricing, and Partner Data Maintenance
 
Capture and Feed Telecom Network Data and More Into SAP HANA - Quicky and Aff...
Capture and Feed Telecom Network Data and More Into SAP HANA - Quicky and Aff...Capture and Feed Telecom Network Data and More Into SAP HANA - Quicky and Aff...
Capture and Feed Telecom Network Data and More Into SAP HANA - Quicky and Aff...
 
E Signature Solution Brief - SAP Signature Management by Docusign
E Signature Solution Brief - SAP Signature Management by Docusign E Signature Solution Brief - SAP Signature Management by Docusign
E Signature Solution Brief - SAP Signature Management by Docusign
 
SAP LoadRunner by HP Solution Brief
SAP LoadRunner by HP Solution Brief SAP LoadRunner by HP Solution Brief
SAP LoadRunner by HP Solution Brief
 
SAP S/4 HANA Information Sheet
SAP S/4 HANA Information Sheet SAP S/4 HANA Information Sheet
SAP S/4 HANA Information Sheet
 
SRP - Gaining efficiency
SRP - Gaining efficiency SRP - Gaining efficiency
SRP - Gaining efficiency
 
SAP Dynamic Authorization Management
SAP Dynamic Authorization Management SAP Dynamic Authorization Management
SAP Dynamic Authorization Management
 
Solution Brief - Time and Attendance Management
Solution Brief - Time and Attendance Management Solution Brief - Time and Attendance Management
Solution Brief - Time and Attendance Management
 
World kitchen - Reference Slide
World kitchen - Reference Slide World kitchen - Reference Slide
World kitchen - Reference Slide
 
SAP Content Management Solution Brief
SAP Content Management Solution Brief SAP Content Management Solution Brief
SAP Content Management Solution Brief
 
Lenovo Customer Success Story
Lenovo Customer Success Story Lenovo Customer Success Story
Lenovo Customer Success Story
 
SourceGas Insider Article
SourceGas Insider ArticleSourceGas Insider Article
SourceGas Insider Article
 
Proactively manage your field workforce in real time
Proactively manage your field workforce in real time Proactively manage your field workforce in real time
Proactively manage your field workforce in real time
 
SAP Lease Administration by Nakisa Thought Leadership Whitepaper
SAP Lease Administration by Nakisa Thought Leadership WhitepaperSAP Lease Administration by Nakisa Thought Leadership Whitepaper
SAP Lease Administration by Nakisa Thought Leadership Whitepaper
 
Iberdrola Insider PROFILES article
Iberdrola Insider PROFILES articleIberdrola Insider PROFILES article
Iberdrola Insider PROFILES article
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices

  • 1. SAP Solution Brief Enterprise Mobility SAP Mobile App Protection by Mocana Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices BenefitsSolutionObjectives Quick Facts ©2013SAPAGoranSAPaffiliatecompany.Allrightsreserved.
  • 2. 2 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved. Objectives App security for enterprise safety Security concerns can slow the momentum toward mobile computing. Whether your enterprise is deploying third-party mobile apps or developing them internally, they must be locked down tight. That’s not easy. Users bring in their own mobile devices, download their own apps, mix personal and business content, and carry confidential business data outside of corporate protection. Device management is the cornerstone of a complete strategy for enterprise mobility management. Today, new mobile app security methods are shifting device management and security into mobile apps and removing dependence on hardware. Enterprises are increasingly looking to such “app wrapping” for added security. App wrapping separates security from the development process and provides fine-grain usage and security policies in mobile apps. By “wrapping” security into each app, the SAP® Mobile App Protection solution by Mocana helps administrators meet security needs in deploying either internal or third-party software. Companies with strict security requirements and those in highly regulated industries – such as financial services, healthcare, retail, and government – are realizing that app wrapping adds flexibility in bring-your-own- device (BYOD) environments. It can also speed the development process for business- to-business or business-to-employee apps. App security for enterprise safety Benefits Quick FactsSolution
  • 3. 3 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved. Automated security to meet compliance and audit requirements SAP Mobile App Protection helps you accel­ erate mobile initiatives by automating app security. You can apply consistent, replicable controls across all your enterprise apps without writing any code, and you can secure business and confidential data on managed or unmanaged corporate devices. You can also secure apps on devices that you don’t control or are not on your network – including those of partners, contractors, or employees. Just choose an app or group of apps, select the related security policies, and add functions for encryption, data protection, authentication, and virtual private networks (VPNs). SAP Mobile App Protection also helps you ful- fill compliance and audit requirements, such as those for the Health Insurance Portability and Accountability Act (HIPAA), regulations for the payment card industry (PCI), and other industry rules. You can readily integrate security policies that suit your organization and industry into an existing IT environment. Automated security to meet compliance and audit requirements Speed mobile initiatives Secure communications and prevent data loss Solution BenefitsObjectives Quick Facts Apply meaningful security policies across all your apps.
  • 4. 4 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved. Speed mobile initiatives By streamlining the process of making apps more secure, SAP Mobile App Protection helps keep mobile projects on track. By quickly add- ing security features to one or many mobile apps across your user community, you can reduce the time required for app development and deployment phases by days and weeks. In addition to app-level encryption, data protection, authentication, and VPN, you can choose from a variety of security policies, including: •• User authentication •• Data loss prevention •• Secure data transfer between wrapped apps •• Data-at-rest encryption with cryptography certified by Federal Information Processing Standard (FIPS) 140-2 •• Jailbreak – or rooting – detection •• Per-app VPN tunnel •• Contextual usage •• Controls for cut, copy, and paste BenefitsSolutionObjectives Quick Facts Automated security to meet compliance and audit requirements Speed mobile initiatives Secure communications and prevent data loss Quickly protect valuable corporate app data with your choice of security functions and policies.
  • 5. 5 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved. Secure communications and prevent data loss SAP Mobile App Protection keeps data in motion safe by communicating with an app over a 256-bit encrypted tunnel.This prevents potential rogue applications and malware from accessing your enterprise network. It prohibits unauthorized copying and pasting from spe- cific applications to help stop data leaks. A smart firewall policy lets you block several types of potentially insecure network traffic from the app and require proper digital certi- fication before communicating with a server. By requiring user-authentication passwords for access to an app, SAP Mobile App Protection also helps ensure that data is quickly made inaccessible when devices are lost or stolen. The software supports app-data wipes based on certain conditions, such as too many failed authentication attempts. Geofencing adds another layer of protection by restricting app usage and availability within a specific geographic perimeter. You can also set an expiration date on an app to create time-limited access. If a device is com- promised by jailbreaking or rooting, you can rapidly disable the app and prevent access to stored data. BenefitsSolutionObjectives Quick Facts Automated security to meet compliance and audit requirements Speed mobile initiatives Secure communications and prevent data loss
  • 6. 6 / 7 © 2013 SAP AG or an SAP affiliate company. All rights reserved. Safe mobile apps and an exceptional user experience The pressure for mobile business processes comes from all sides of the enterprise. Execu- tives and users at other levels want the con- venience of mobile apps. Enterprise mobility is a competitive differentiator that helps orga- nizations respond more quickly to their cus- tomers, partners, and employees. Businesses are also realizing that mobile apps increase productivity, improve efficiency, and speed time to market. With SAP Mobile App Protection, business processes can be mobile and safe from mis- use even when devices and apps are used by partners, contractors, and customers. If your mobile app deployments have been sidelined by security concerns, let the automated security that comes from app wrapping put your project back on track. The software adds robust security to business apps in seconds and protects your enterprise from risk while providing your users with a high-quality mobile experience. Users can interact with their mobile apps in familiar ways without installing an additional client or separating their business and per- sonal apps. Authentication merely requires a user name and passcode. Assisted passcode recovery is available. Once authenticated, users can connect to enterprise servers through a VPN tunnel, which is maintained and autoconnected even if a user moves from one network to another. Safe mobile apps and an exceptional user experience BenefitsSolutionObjectives Quick Facts
  • 7. 7 / 7 Summary The SAP® Mobile App Protection solution by Mocana speeds mobile initiatives by helping eliminate security problems that bottleneck the development and deployment of enter- prise apps. SAP Mobile App Protection “wraps” data protection and access control features around an app – without any manual changes or coding. Enterprises gain robust security for their mobile apps in seconds. Objectives •• Add security to enterprise apps without writing code •• Enable bring-your-own-device (BYOD) envi- ronments with safe, secure communications •• Speed app deployment and development •• Meet industry compliance and auditing requirements, including HIPAA and payment card industry (PCI) Solution •• Proven, robust app security automation •• App-level virtual private network (VPN) and encryption security with FIPS 140-2 cryptography •• Consistent, repeatable security controls that you can apply across all enterprise apps •• User-friendly enterprise mobility with assisted passcode recovery and rapid authentication Benefits •• Secure apps and data across all managed and unmanaged devices •• Customized security that aligns with users and business requirements •• Compliance with industry requirements •• Decreased liability from exposure to corpo- rate data breaches Learn more To find out more, call your SAP representative today, or visit us online at www.sap.com/mobile-app-protection. www.sap.com Quick FactsBenefitsSolutionObjectives CMP25822 (13/05) © 2013 SAP AG or an SAP affiliate company. All rights reserved.
  • 8. © 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP AG and its affiliated companies (“SAP Group”) for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Please see http://www.sap.com/corporate-en/legal/copyright/index.epx#trademark for additional trademark information and notices.