SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Solving Security, Collaboration and Mobility 
Challenges in SAP with Microsoft Technologies 
WEBINAR 
September 17, 2014 
1 © 2014 SECUDE AG
Today’s Speakers 
Tim Davis 
Principal Program Manager Lead 
Microsoft 
Aparna Jue 
Technical Product Manager 
SECUDE 
2 © 2014 SECUDE AG
Agenda 
1 Challenges SAP Companies Face 
2 
3 
4 
Microsoft Enterprise Mobility Suite 
Extending Microsoft Technologies to SAP 
Demo 
3 © 2014 SECUDE AG
1 Challenges SAP Companies Face 
4 © 2014 SECUDE AG
SAP at the Heart of the Enterprise 
Trade secrets 
Secret formula 
Pricing strategy 
HR 
PII 
SSN 
Salary 
CO 
Balance sheets 
Cash flows 
Accounts payables & 
receivables 
FI/FHCM 
Bank account numbers 
Budgets 
Invoices 
BW 
Strategy details 
SD 
Revenues 
Billing 
QM Vendors and resources 
Product specs 
PP 
CRM 
Client info 
Credit card numbers 
Trade process secrets 
5 © 2014 SECUDE AG
Today’s Challenges 
Cloud & mobility Business collaboration Security 
: 
Data breaches on 
the rise 
Eroding enterprise 
perimeter 
IT consumerization 
Loss of control over 
corporate data 
Cloud-based and 
file-sharing tools 
No balance between 
sharing and security 
6 © 2014 SECUDE AG
There is NO Stopping Cloud & Mobility 
• 77% of IT leaders report cloud-based infrastructure 
in their companies (Forbes) 
• 71% require technology that enables their staff to 
work anywhere at any time (Microsoft) 
• The BYOD market will increase to $181 billion by 
2017 (MarketsandMarkets) 
• 84% of employees use personal devices for 
business use (IBM) 
7 © 2014 SECUDE AG
Bring Your Own DISASTER 
9 out of 10 
employees don’t 
use password 
security on their 
devices 
(Osterman Research) 
51% 
have had data 
loss due to 
insecure devices 
(Websense) 
81% 
admit accessing 
their employer’s 
network without 
their employer’s 
knowledge or 
permission (Juniper 
Network) 
46% 
who use a 
personal device 
for work have let 
someone else 
use It 
(Harris Poll of US Adults) 
66% 
who use a 
personal device 
for work say that 
their 
organization 
doesn’t have a 
BYOD policy 
(Harris Poll of US Adults) 
8 © 2014 SECUDE AG
The New Collaboration: Changing the Workplace 
54% worry 
about safety of 
their 
information 
when using 
collaborative 
tools (Athento) 
49% of 
organizations 
use document 
collaboration 
tools 
(Computer Weekly) 
On average, 
people send 
and receive 
15 emails with 
attachments a 
day (Microsoft) 
62% lose files 
sent to them 
in attachments 
(Microsoft) 
6 copies of 
every shared 
document are 
created on 
average (Silversky) 
9 © 2014 SECUDE AG
Data Security Concerns 
Fast-Paced Technology 
Explosion supports the success 
of your business 
That success is tied to 
your greatest asset - 
DATA 
How will you protect 
your assets? 
10 © 2014 SECUDE AG
Borderless IT 
• Corporate perimeter is 
eroding/has eroded 
• Knowing where your data has 
become a challenge 
• Keeping track is next to 
impossible 
• Data exists to be consumed and 
shared 
– Locking everything down and 
disallowing employees to use data 
is counter-productive 
– Data itself should be protected for 
secure movement and usage 
Partner 
Employees 
11 © 2014 SECUDE AG
The Risk is Real 
$5.85 million 
Average cost of data breach in USA in 2014 
Source: 2014 Cost of Data Breach, Ponemon Institute 
Financial consequences of a data breach 
Divided by categories 
29% 
21% 
Reputatio 
Lost 
n 
productivity 
damage 
12% 
Forensics 
19% 
Lost 
revenue 
Cause of Data Breach 
Malicious attack System glitch 
Human error 
42% 
30% 
29% 
10% 
Technical 
support 
8% 
Regulatory 
Source: IBM 
Source: 2014 Cost of Data Breach, Ponemon Institute 
12 © 2014 SECUDE AG
2 Microsoft Enterprise Mobility Suite 
13 © 2014 SECUDE AG
Introducing the Enterprise Mobility Suite 
Windows Intune 
Mobile device 
settings management 
Mobile application 
management 
Selective wipe 
Microsoft Azure Active Directory Premium 
Security reports, and 
audit reports, multi-factor 
authentication 
Self-service password 
reset and group 
management 
Connection between 
Active Directory and 
Azure Active Directory 
Mobile device 
management 
Microsoft Azure Rights Management service 
Information 
protection 
Connection to on-premises 
assets 
Bring your own key 
14 © 2014 SECUDE AG
Mobile Device Management (MDM) 
Enable your users 
Access company resources 
consistently across devices 
Simplify device registration and 
enrollment 
Synchronize corporate data 
Protect your data 
Protect corporate information by 
selectively wiping applications 
and data from retired or lost 
devices 
Use a common identity for 
accessing resources on-premises 
and in the cloud 
Identify compromised mobile 
devices 
Unify your environment 
Manage on-premises and cloud-based 
devices from a single 
console 
Get simplified, user-centric app 
management across devices 
Get comprehensive settings 
management across platforms, 
including certificates, VPNs, and 
wireless network profiles 
15 © 2014 SECUDE AG
Azure Active Directory Premium 
Take advantage of a 
directory in the cloud 
Group-based application access 
assignment and provisioning to 
thousands of software-as-a-service 
(SaaS) applications for single sign-on 
Company branding 
Enterprise SLA of 99.9 percent 
Built on top of a free offering 
Robust set of capabilities for empowering enterprises with 
demanding identity and access management needs 
Usage rights for Microsoft Forefront Identity Manager server 
licenses and CALs 
Empower users 
Self-service password reset 
Delegated group management 
Monitor and protect 
access to applications 
Security reports based on machine 
learning 
Application usage reports 
Multi-factor authentication 
16 © 2014 SECUDE AG
Windows Intune 
Enterprise Mobility Suite 
Mobile device 
settings management 
Self-service password 
reset and multi-factor 
authentication 
Selective wipe 
Microsoft Azure Active Directory Premium 
Group management, 
security reports, and 
audit reports 
Mobile application 
management 
Connection between 
Active Directory and 
Azure Active Directory 
Microsoft Azure Rights Management service 
Information 
protection 
Connection to on-premises 
assets 
Bring your own key 
17 © 2014 SECUDE AG
Enabling Data to Flow from One Org to 
Another 
Sharing data 
Securely share any file type, 
from within common user 
experiences 
Between organizations 
Authenticate users from other 
organizations (without having 
to implement point to point 
federation) 
Maintain control 
Enlightened applications such 
as Office and PDF readers offer 
the ability to enforce rights. 
18 © 2014 SECUDE AG
Our approach 
Protect any file type 
Delight with Office docs, 
PDF, Text, and Images. 
Important applications 
and services are 
enlightened 
Delight with Office docs, 
PDF, Text, and Images. 
Share with anyone 
B2B sharing is most 
important with 
B2C on the rise 
CSOs and Services can 
‘reason over data’ 
Delegated access to data 
with bring-your-own-key 
Protect in place, 
and in flight 
Data is protected all the 
time 
Meet the varied 
organizational needs 
Protection enforced in the 
cloud, or on-premises; with 
data in both places. 
19 © 2014 SECUDE AG
Microsoft Rights Management 
Client integration 
User 
Authentication 
Integration 
Authentication and 
collaboration 
BYO Key 
Client integration 
20 © 2014 SECUDE AG
Rights Management 101 
Usage rights + 
symmetric key stored 
in file as ‘license’ 
Secret 
Cola Formula 
Water 
HFCS 
Brown #16 
Secret 
License 
protected by org-owned 
RSA key 
Cola Formula 
Water 
HFCS 
Brown #16 
Use Rights + 
#!@#!#!@#! 
()&)(*&)(@#! 
#!@#!#!@#! 
()&)(*&)(@#! 
#!@#!#!@#! 
()&)(*&)(@#! 
Protect Unprotect 
File is protected 
by an AES 
symmetric key 
21 © 2014 SECUDE AG
Rights Management 101 
Use Rights + 
#!@#!#!@#! 
()&)(*&)(@#! 
#!@#!#!@#! 
()&)(*&)(@#! 
#!@#!#!@#! 
()&)(*&)(@#! 
RMS-enlightened apps 
enforce rights, Generic 
Protection offered by 
the RMS App 
Enlightened apps use 
the RMS SDK which 
communicates with the 
RMS key management 
servers 
File content is 
never sent to the 
RMS 
server/service 
22 © 2014 SECUDE AG
Questions? 
23 © 2014 SECUDE AG
3 Extending Microsoft Technologies into SAP 
24 © 2014 SECUDE AG
Microsoft RMS and SAP - Challenges 
• End-user Interaction is 
required 
• SAP’s Roles and 
Authorization Model vs. 
RMS Protection Templates 
• Gap in Protection 
• Lack of Audit Trail 
25 © 2014 SECUDE AG
Where do We Extend Rights Management? 
Employees 
Competitor 
Partner 
File Server 
26 © 2014 SECUDE AG
Halocore for SAP NetWeaver 
Intercepts 
data leaving 
SAP 
Data-centric 
protection 
Protection 
Suggests or 
enforces 
classification 
Protects data 
encryption 
+policy 
Creates 
audit trial 
Mobile and cloud 
security 
Safe 
collaboration 
Compliance Audit 
Halocore Benefits 
• Provides data-centric 
protection of sensitive SAP 
information 
• Minimizes risk of data 
breaches, theft and loss 
• Controls who has access to 
sensitive information 
• Boosts secure collaboration 
• Enables compliance 
• Offers advanced auditing 
capabilities 
27 © 2014 SECUDE AG
Powerful Architecture 
• Halocore Client: Add-in for SAP NetWeaver ABAP 
– LDAP and SOAP communication 
• Halocore Server: Windows Service 
– SOAP and FileProtection API 
28 © 2014 SECUDE AG
Innovative Design 
29 © 2014 SECUDE AG
Halocore Features 
1 Encryption: each file downloaded from SAP NetWeaver-based 
applications is protected with strong encryption 
Data-centric 
protection 
Data/documents 
themselves are 
protected 
30 © 2014 SECUDE AG
Halocore Features 
2 Fine-grained access policies: based on SAP’s existing 
roles and authorizations scheme, only authorized people 
can access certain information 
Policies 
Owner-only 
Department 
Company 
Partner 
Consultant 
31 © 2014 SECUDE AG
Halocore Features 
3 Mobile & cloud data security: documents remain 
protected when moved to mobile devices and the cloud 
Persistent 
protection 
In case device is 
lost or stolen or 
cloud is hacked, 
data is still 
secure 
32 © 2014 SECUDE AG
Halocore Features 
4 Advanced auditing & reporting: complete audit trail of 
all download activity 
Audit log 
filtering 
User role 
Functional area 
Geographic region 
Transaction type 
33 © 2014 SECUDE AG
User View 
• Choose from company 
policy list 
• Create own policy 
• Save unprotected 
• See nothing and do 
nothing 
34 © 2014 SECUDE AG
Auditing Capabilities - Customizing 
Your View 
35 © 2014 SECUDE AG
Auditing Capabilities - The Log File 
36 © 2014 SECUDE AG
4 Demo 
37 © 2014 SECUDE AG
Demo: Protecting HR Data Leaving SAP 
38 © 2014 SECUDE AG
Questions? 
39 © 2014 SECUDE AG
Next Steps 
Data Export Auditor for SAP 
• Free tool to monitor all data leaving SAP 
• Each and every download is tracked 
• Intelligent classification 
• Request download at http://www.secude.com/solutions/halocore-data- 
export-auditor-for-sap/ 
40 © 2014 SECUDE AG
Additional Product Information 
41 © 2014 SECUDE AG
Support Options 
Service offerings 
License and 
subscription 
support 
Technical support Premier Support details 
Azure Active 
Directory Premium 
Included in 
subscription 
Requires additional 
paid support 
Supported http://www.windowsazure.co 
m/en-us/support/plans/ 
Windows Intune Included in 
subscription 
Included in 
subscription 
Supported https://support.microsoftonlin 
e.com/default.aspx?productk 
ey=intunesupp&scrx=1 
Azure Rights 
Management 
Included in 
subscription 
Included in 
subscription 
Supported http://office.microsoft.com/en-us/ 
support/contact-us- 
FX103894077.aspx 
42 © 2014 SECUDE AG
Aparna Jue 
Technical Product Manager 
Office: +1 (404) 977-0940) 
Aparna.Jue@usa.secude.com | www.secude.com 
SECUDE IT Security, LLC 
3331 Sundew Ct, Alpharetta, GA 30005, USA 
43 © 2014 SECUDE AG
Copyright 
SECUDE AG © 2014 All rights reserved. 
All product and service names mentioned are the 
trademarks of their respective companies. No part of this 
publication may be reproduced or transmitted in any form or 
for any purpose without the express written permission of 
SECUDE AG. The information contained herein may be 
changed without prior notice. 
Microsoft, Windows, and Active Directory are the brand 
names or registered trademarks of Microsoft Corporation in 
the United States. 
44 © 2014 SECUDE AG
45 © 2014 SECUDE AG
46 © 2014 SECUDE AG

Weitere ähnliche Inhalte

Was ist angesagt?

Office365 security in depth
Office365 security in depthOffice365 security in depth
Office365 security in depthAlberto Pascual
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classificationDavid De Vos
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterCraig Jahnke
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveDavid J Rosenthal
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)Radhakrishnan Govindan
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-managementAmit Bhargava
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowM365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowJoanne Klein
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Joanne Klein
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationPatric Dahse
 

Was ist angesagt? (20)

Office365 security in depth
Office365 security in depthOffice365 security in depth
Office365 security in depth
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and HowM365 Virtual Marathon: Retention in Office 365 - the Where What and How
M365 Virtual Marathon: Retention in Office 365 - the Where What and How
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data Anonymization
 
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLPSecure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
 
How to Approach Tool Integrations
How to Approach Tool IntegrationsHow to Approach Tool Integrations
How to Approach Tool Integrations
 

Ähnlich wie Solving Security, Collaboration, and Mobility Challenges in SAP With Microsoft Technologies

BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldUL Transaction Security
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityIngram Micro Cloud
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptxAshvin Dixit
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaBipeen Sinha
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxHaekalAufar1
 

Ähnlich wie Solving Security, Collaboration, and Mobility Challenges in SAP With Microsoft Technologies (20)

BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
 

Mehr von UL Transaction Security

HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsUL Transaction Security
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...UL Transaction Security
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPUL Transaction Security
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesUL Transaction Security
 

Mehr von UL Transaction Security (6)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management Services
 

Kürzlich hochgeladen

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Solving Security, Collaboration, and Mobility Challenges in SAP With Microsoft Technologies

  • 1. Solving Security, Collaboration and Mobility Challenges in SAP with Microsoft Technologies WEBINAR September 17, 2014 1 © 2014 SECUDE AG
  • 2. Today’s Speakers Tim Davis Principal Program Manager Lead Microsoft Aparna Jue Technical Product Manager SECUDE 2 © 2014 SECUDE AG
  • 3. Agenda 1 Challenges SAP Companies Face 2 3 4 Microsoft Enterprise Mobility Suite Extending Microsoft Technologies to SAP Demo 3 © 2014 SECUDE AG
  • 4. 1 Challenges SAP Companies Face 4 © 2014 SECUDE AG
  • 5. SAP at the Heart of the Enterprise Trade secrets Secret formula Pricing strategy HR PII SSN Salary CO Balance sheets Cash flows Accounts payables & receivables FI/FHCM Bank account numbers Budgets Invoices BW Strategy details SD Revenues Billing QM Vendors and resources Product specs PP CRM Client info Credit card numbers Trade process secrets 5 © 2014 SECUDE AG
  • 6. Today’s Challenges Cloud & mobility Business collaboration Security : Data breaches on the rise Eroding enterprise perimeter IT consumerization Loss of control over corporate data Cloud-based and file-sharing tools No balance between sharing and security 6 © 2014 SECUDE AG
  • 7. There is NO Stopping Cloud & Mobility • 77% of IT leaders report cloud-based infrastructure in their companies (Forbes) • 71% require technology that enables their staff to work anywhere at any time (Microsoft) • The BYOD market will increase to $181 billion by 2017 (MarketsandMarkets) • 84% of employees use personal devices for business use (IBM) 7 © 2014 SECUDE AG
  • 8. Bring Your Own DISASTER 9 out of 10 employees don’t use password security on their devices (Osterman Research) 51% have had data loss due to insecure devices (Websense) 81% admit accessing their employer’s network without their employer’s knowledge or permission (Juniper Network) 46% who use a personal device for work have let someone else use It (Harris Poll of US Adults) 66% who use a personal device for work say that their organization doesn’t have a BYOD policy (Harris Poll of US Adults) 8 © 2014 SECUDE AG
  • 9. The New Collaboration: Changing the Workplace 54% worry about safety of their information when using collaborative tools (Athento) 49% of organizations use document collaboration tools (Computer Weekly) On average, people send and receive 15 emails with attachments a day (Microsoft) 62% lose files sent to them in attachments (Microsoft) 6 copies of every shared document are created on average (Silversky) 9 © 2014 SECUDE AG
  • 10. Data Security Concerns Fast-Paced Technology Explosion supports the success of your business That success is tied to your greatest asset - DATA How will you protect your assets? 10 © 2014 SECUDE AG
  • 11. Borderless IT • Corporate perimeter is eroding/has eroded • Knowing where your data has become a challenge • Keeping track is next to impossible • Data exists to be consumed and shared – Locking everything down and disallowing employees to use data is counter-productive – Data itself should be protected for secure movement and usage Partner Employees 11 © 2014 SECUDE AG
  • 12. The Risk is Real $5.85 million Average cost of data breach in USA in 2014 Source: 2014 Cost of Data Breach, Ponemon Institute Financial consequences of a data breach Divided by categories 29% 21% Reputatio Lost n productivity damage 12% Forensics 19% Lost revenue Cause of Data Breach Malicious attack System glitch Human error 42% 30% 29% 10% Technical support 8% Regulatory Source: IBM Source: 2014 Cost of Data Breach, Ponemon Institute 12 © 2014 SECUDE AG
  • 13. 2 Microsoft Enterprise Mobility Suite 13 © 2014 SECUDE AG
  • 14. Introducing the Enterprise Mobility Suite Windows Intune Mobile device settings management Mobile application management Selective wipe Microsoft Azure Active Directory Premium Security reports, and audit reports, multi-factor authentication Self-service password reset and group management Connection between Active Directory and Azure Active Directory Mobile device management Microsoft Azure Rights Management service Information protection Connection to on-premises assets Bring your own key 14 © 2014 SECUDE AG
  • 15. Mobile Device Management (MDM) Enable your users Access company resources consistently across devices Simplify device registration and enrollment Synchronize corporate data Protect your data Protect corporate information by selectively wiping applications and data from retired or lost devices Use a common identity for accessing resources on-premises and in the cloud Identify compromised mobile devices Unify your environment Manage on-premises and cloud-based devices from a single console Get simplified, user-centric app management across devices Get comprehensive settings management across platforms, including certificates, VPNs, and wireless network profiles 15 © 2014 SECUDE AG
  • 16. Azure Active Directory Premium Take advantage of a directory in the cloud Group-based application access assignment and provisioning to thousands of software-as-a-service (SaaS) applications for single sign-on Company branding Enterprise SLA of 99.9 percent Built on top of a free offering Robust set of capabilities for empowering enterprises with demanding identity and access management needs Usage rights for Microsoft Forefront Identity Manager server licenses and CALs Empower users Self-service password reset Delegated group management Monitor and protect access to applications Security reports based on machine learning Application usage reports Multi-factor authentication 16 © 2014 SECUDE AG
  • 17. Windows Intune Enterprise Mobility Suite Mobile device settings management Self-service password reset and multi-factor authentication Selective wipe Microsoft Azure Active Directory Premium Group management, security reports, and audit reports Mobile application management Connection between Active Directory and Azure Active Directory Microsoft Azure Rights Management service Information protection Connection to on-premises assets Bring your own key 17 © 2014 SECUDE AG
  • 18. Enabling Data to Flow from One Org to Another Sharing data Securely share any file type, from within common user experiences Between organizations Authenticate users from other organizations (without having to implement point to point federation) Maintain control Enlightened applications such as Office and PDF readers offer the ability to enforce rights. 18 © 2014 SECUDE AG
  • 19. Our approach Protect any file type Delight with Office docs, PDF, Text, and Images. Important applications and services are enlightened Delight with Office docs, PDF, Text, and Images. Share with anyone B2B sharing is most important with B2C on the rise CSOs and Services can ‘reason over data’ Delegated access to data with bring-your-own-key Protect in place, and in flight Data is protected all the time Meet the varied organizational needs Protection enforced in the cloud, or on-premises; with data in both places. 19 © 2014 SECUDE AG
  • 20. Microsoft Rights Management Client integration User Authentication Integration Authentication and collaboration BYO Key Client integration 20 © 2014 SECUDE AG
  • 21. Rights Management 101 Usage rights + symmetric key stored in file as ‘license’ Secret Cola Formula Water HFCS Brown #16 Secret License protected by org-owned RSA key Cola Formula Water HFCS Brown #16 Use Rights + #!@#!#!@#! ()&)(*&)(@#! #!@#!#!@#! ()&)(*&)(@#! #!@#!#!@#! ()&)(*&)(@#! Protect Unprotect File is protected by an AES symmetric key 21 © 2014 SECUDE AG
  • 22. Rights Management 101 Use Rights + #!@#!#!@#! ()&)(*&)(@#! #!@#!#!@#! ()&)(*&)(@#! #!@#!#!@#! ()&)(*&)(@#! RMS-enlightened apps enforce rights, Generic Protection offered by the RMS App Enlightened apps use the RMS SDK which communicates with the RMS key management servers File content is never sent to the RMS server/service 22 © 2014 SECUDE AG
  • 23. Questions? 23 © 2014 SECUDE AG
  • 24. 3 Extending Microsoft Technologies into SAP 24 © 2014 SECUDE AG
  • 25. Microsoft RMS and SAP - Challenges • End-user Interaction is required • SAP’s Roles and Authorization Model vs. RMS Protection Templates • Gap in Protection • Lack of Audit Trail 25 © 2014 SECUDE AG
  • 26. Where do We Extend Rights Management? Employees Competitor Partner File Server 26 © 2014 SECUDE AG
  • 27. Halocore for SAP NetWeaver Intercepts data leaving SAP Data-centric protection Protection Suggests or enforces classification Protects data encryption +policy Creates audit trial Mobile and cloud security Safe collaboration Compliance Audit Halocore Benefits • Provides data-centric protection of sensitive SAP information • Minimizes risk of data breaches, theft and loss • Controls who has access to sensitive information • Boosts secure collaboration • Enables compliance • Offers advanced auditing capabilities 27 © 2014 SECUDE AG
  • 28. Powerful Architecture • Halocore Client: Add-in for SAP NetWeaver ABAP – LDAP and SOAP communication • Halocore Server: Windows Service – SOAP and FileProtection API 28 © 2014 SECUDE AG
  • 29. Innovative Design 29 © 2014 SECUDE AG
  • 30. Halocore Features 1 Encryption: each file downloaded from SAP NetWeaver-based applications is protected with strong encryption Data-centric protection Data/documents themselves are protected 30 © 2014 SECUDE AG
  • 31. Halocore Features 2 Fine-grained access policies: based on SAP’s existing roles and authorizations scheme, only authorized people can access certain information Policies Owner-only Department Company Partner Consultant 31 © 2014 SECUDE AG
  • 32. Halocore Features 3 Mobile & cloud data security: documents remain protected when moved to mobile devices and the cloud Persistent protection In case device is lost or stolen or cloud is hacked, data is still secure 32 © 2014 SECUDE AG
  • 33. Halocore Features 4 Advanced auditing & reporting: complete audit trail of all download activity Audit log filtering User role Functional area Geographic region Transaction type 33 © 2014 SECUDE AG
  • 34. User View • Choose from company policy list • Create own policy • Save unprotected • See nothing and do nothing 34 © 2014 SECUDE AG
  • 35. Auditing Capabilities - Customizing Your View 35 © 2014 SECUDE AG
  • 36. Auditing Capabilities - The Log File 36 © 2014 SECUDE AG
  • 37. 4 Demo 37 © 2014 SECUDE AG
  • 38. Demo: Protecting HR Data Leaving SAP 38 © 2014 SECUDE AG
  • 39. Questions? 39 © 2014 SECUDE AG
  • 40. Next Steps Data Export Auditor for SAP • Free tool to monitor all data leaving SAP • Each and every download is tracked • Intelligent classification • Request download at http://www.secude.com/solutions/halocore-data- export-auditor-for-sap/ 40 © 2014 SECUDE AG
  • 41. Additional Product Information 41 © 2014 SECUDE AG
  • 42. Support Options Service offerings License and subscription support Technical support Premier Support details Azure Active Directory Premium Included in subscription Requires additional paid support Supported http://www.windowsazure.co m/en-us/support/plans/ Windows Intune Included in subscription Included in subscription Supported https://support.microsoftonlin e.com/default.aspx?productk ey=intunesupp&scrx=1 Azure Rights Management Included in subscription Included in subscription Supported http://office.microsoft.com/en-us/ support/contact-us- FX103894077.aspx 42 © 2014 SECUDE AG
  • 43. Aparna Jue Technical Product Manager Office: +1 (404) 977-0940) Aparna.Jue@usa.secude.com | www.secude.com SECUDE IT Security, LLC 3331 Sundew Ct, Alpharetta, GA 30005, USA 43 © 2014 SECUDE AG
  • 44. Copyright SECUDE AG © 2014 All rights reserved. All product and service names mentioned are the trademarks of their respective companies. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express written permission of SECUDE AG. The information contained herein may be changed without prior notice. Microsoft, Windows, and Active Directory are the brand names or registered trademarks of Microsoft Corporation in the United States. 44 © 2014 SECUDE AG
  • 45. 45 © 2014 SECUDE AG
  • 46. 46 © 2014 SECUDE AG

Hinweis der Redaktion

  1. 1)The message is clear- today’s fast pace technology landscape is in place to support the success of your business. 2)That success is tied to your information. Information, in the form of raw data, is collected, organized, analyzed, shared, and reported. 3)This makes data your business’s top asset. How will you protect it?
  2. The Enterprise Mobility Suite (EMS) provides you with: Hybrid identity enabled by Azure Active Directory Premium. Mobile device management enabled by Windows Intune. Data protection enabled by Azure Rights Management service. (CLICK) The EMS suite is available for as little as $4 per user per month. Let’s take a closer look at each part of the suite.
  3. Today, users want access to corporate applications from anywhere and on whatever device they choose, whether it’s their laptop, smartphone, tablet, or home PC. IT departments are challenged to empower users with consistent, rich experiences across a wide spectrum of device types. The Microsoft mobile device management solution helps reduce costs and improve IT efficiency by unifying the management and security for cloud- and on-premises-based PCs and mobile devices in an integrated infrastructure. With the releases of Windows Server 2012 R2, System Center 2012 R2 Configuration Manager, and Windows Intune, Microsoft builds on a comprehensive, people-centric solution that empowers user productivity while supporting the management needs of IT. For enterprise users, Microsoft solutions enable user productivity and provide: Access to company resources consistently across devices. Users can use the device of their choice to access corporate resources regardless of location. Simplified registration and enrollment of devices. Users can manage their devices as well as install corporate applications through a consistent company portal. Synchronized corporate data. Users will have access to data stored on a centralized file server and enable that data to be synchronized onto their mobile device. For IT professionals, Microsoft solutions unify the environment and provide: Unified management of on-premises and cloud-based mobile devices. IT can extend its System Center Configuration Manager infrastructure with Windows Intune to support cloud management of mobile devices. This enables IT to publish corporate applications and services across device types, regardless of whether they’re corporate-connected or cloud-based. Simplified, user-centric application management across devices. IT gains efficiency with a single administration console, where policies can be applied across group and device types. Comprehensive settings management across platforms, including certificates, virtual private networks (VPNs), and wireless network profiles. Policies can be applied across various devices and operating systems to meet compliance requirements, and IT can provision certificates, VPNs, and Wi-Fi profiles on personal devices within a single administration console. These solutions also help protect corporate data by providing: The ability to protect corporate information by selectively wiping applications and data. IT can access managed mobile devices to remove corporate data and applications in the event that the device is lost, stolen, or retired from use. A common identity for accessing resources on-premises and in the cloud. IT can better protect corporate information and mitigate risk by being able to restrict access to corporate resources based on user, device, and location.
  4. Azure Active Directory Premium, Microsoft’s advanced identity and access management solution for the cloud, has been generally available since April 2, 2014. Capabilities like synchronization with on-premises directories, single sign-on to thousands of software-as-a-service applications, security and usage reports based on machine learning, alerting, multi-factor authentication, company branding, self-service password reset, group management delegation, an enterprise-scale SLA, and more will provide the level of reliability required by enterprises with advanced identity and access management needs. In addition to all of its cloud capabilities, Azure Active Directory Premium offers usage rights for Microsoft Forefront Identity Manager Server and Client Access Licenses (CALs). Organizations get an unlimited number of servers and a use CAL for every Azure Active Directory Premium subscriber user. Free services, such as Azure Active Directory Free, do not have a service-level agreement (SLA). Azure Active Directory is the identity foundation for many Microsoft services like Windows Intune, Office 365, and others. These services have an uptime SLA of 99.9 percent, and Azure Active Directory has to maintain the same stringent availability standards as the services that depend on it.
  5. Let’s look at the Azure Rights Management service component now.
  6. Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations. Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT by: Enabling your end users by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices. Helping protect your data by protecting corporate information and managing risk. Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Azure. Let’s discuss each of these areas in more detail.
  7. With the Hybrid Cloud support, Halocore can support an environment with an on premise Active Directory and Azure RMS. Or Full Cloud support with Azure Rights Management and AD in the cloud. Full collaboration with 3rd parties Full mobile device support
  8. Convenient: Provides a simple, user-friendly experience for classifying sensitive information. When the user chooses to download information from SAP- this is the UI that pops up prompting them to apply a policy to the document. User can choose from Filtered list of Company Policies recommended by Halocore based on the attributes of the data Create his/her own policy depending on whether they have the authority to do so Choose to save unprotected upon which a text box can force a reason for wanting to download data without any protection Do nothing. This UI can be made transparent and a pre determined company policy can apply to any data being downloaded.
  9. We preconfigure the auditing log with certain basic maps that pertain to the Application Component. For instance- it PLM maps to domain Logistics and Engineering, Payroll maps to domain confidential and HR If you need a more fine grained auditing capabilities- this can be done by using the extended select option to map user groups and even transaction codes and so on.