Webinars on Topic Security & Identity Management

Mobile Technology challenges the Enterprise. Many companies implementing or extending the use of mobile technology in their organizations face challenges similar to those they faced when deploying corporate-wide software systems.

Historically, desktop machines were deployed within the firewall and secured on-premise, and only a small percentage of employees had mobile phones. Those mobile phones typically had a more limited application technology installed on them, and those apps were provisioned by services providers. With the onset of BYOD and cloud deployments of device management solutions, these service-provider solutions are shifting to home-grown solutions. And beyond just servicing employees, enterprises must now look at providing access to assets from a spectrum of internal and external users: from authenticated employees to unauthenticated users such as customers and partners.

The mobile security policy is the foundation of mobile operations management. Companies need to: enforce these policies, use a mobile platform is required that provides a common set of tools for managing security for all mobile apps and all devices in the business ecosystem. These tools include end-to-end data encryption, device-level user authentication, single-sign-on certificate management, and a seamless onboarding experience both for the administrator and the end-user.

The SAP Mobile Platform introduces a multilayer approach to corporate security, designed for mobility. This approach ensures that:
•Internal and external device users can securely connect to enterprise information systems.
•Every network link that transfers corporate information and every location that stores enterprise data guarantees confidentiality.

Read more >