SlideShare a Scribd company logo
© 2014 SECUDE AG |
© 2014 SECUDE AG | WWW.SECUDE.COM
BYOD Webinar for SAP
Securing Data in a Mobile World
© 2014 SECUDE AG |
Speakers
2
Michael Kummer
President Americas, SECUDE
Aparna Jue
Technical Product Manager, SECUDE
© 2014 SECUDE AG |
Agenda
!   Mobility & BYOD trends and what they mean for you
!   Mobility & BYOD challenges
!   Current approach and why it’s failing
!   What else can be done? A look at new technologies
3
1
2
3
4
© 2014 SECUDE AG |
About SECUDE
4
1996 Startup of Secude, Spin-Off from Fraunhofer & SAP
2000 SAP partnership (world-wide deployment of SECUDE SNC-SW)
2001 Market entry file/folder encryption
2002 Market entry Smartcard Management and E-SSO
2004 Startup of SECUDE USA
2005 Market entry Full Disc Encryption (FDE)
2006 Launch of FinallySecure Enterprise with Seagate (HW-based FDE)
2011 Spin-off of SECUDE’s SAP Security products to SAP AG
2011 Re-focus on endpoint protection & later SAP NetWeaver Single Sign-On
2012 Halocore initiative to bridge MS AD RMS with SAP
© 2014 SECUDE AG |
!   83% of people sleep next to
their cell phones (Pew Research
Center)
! 29% of Americans say their
phone is the first and last
thing they look at every day
(Qualcomm)
Mobility Goes Boom
St. Peter's Square in 2005 and 2013
© 2014 SECUDE AG |
4.38%
14.79%
24.02%
27.21%
29.59%
Mobility Landscape
Other
NO CONSENSUS ON OPERATING SYSTEM
DEVICE OBSESSION
86% are device obsessed
or “always on”
44% use their devices to
work during meals
20% consider themselves
workaholics
15% bring their devices on
vacation
Source:
Varonis
Systems
© 2014 SECUDE AG |
What is “Bring Your Own Device”?
!   Bring Your Own Devices enables users to bring devices they choose to
perform company work activities
!   Employees want BYOD for choice of device, applications, and ability to
combine personal and work lives
BYOD means any device
with any ownership, used anywhere.
© 2014 SECUDE AG |
There is No Stopping BYOD
!   The BYOD market will increase to $181 billion by
2017 (MarketsandMarkets)
!   95% of organizations permit employee-owned
devices (Cisco IBSG)
!   71% require technology that enables their staff to
work anywhere at any time (Microsoft)
!   70% of employees use personal devices for
business use (Forrester)
© 2014 SECUDE AG |
Why They BYOD: Benefits to Employees
Flexibility: No hassle with one device to combine work and
personal activities
Efficiency: Can get more done with my own device
Control: Can have greater control of my work experience
through choice of device
© 2014 SECUDE AG |
Why They BYOD: Benefits to Enterprises
Cost reduction: Annual benefits from BYOD range from $300
to $1300 per employee (Cisco IBSG)
Productivity: 53% have raised work productivity through
innovative practices enabled by their devices (Cisco IBSG)
Employee satisfaction: Employees feel more comfortable
while working on personal devices, which improves their job
satisfaction levels.
© 2014 SECUDE AG |
This is What We are Facing
End-User Behavior
•  Over 15 billion devices by
2015, with average worker
with 3 devices
•  New workspace: anywhere,
anytime
•  60% will download sensitive
corporate data on a personal
device
•  71% of Gen Y workforce don’t
obey policies
IT Trends
•  Must control multiple devices
and guests
•  Security: top concern for BYOD
•  75% of IT professionals believe
their organization’s sensitive
data is at risk due to mobile
devices
•  IT consumed with
fragmentation
Source: Logicalis
© 2014 SECUDE AG |
Issues in BYOD
!   Security issues
!   Privacy issues
!   Support issues
!   Infrastructure issues
!   Device control issues
© 2014 SECUDE AG |
Bring Your Own DISASTER
9 out of 10
employees
don’t use
password
security on
their devices
(Osterman Research)
51%
have had data
loss due to
insecure devices
(Websense)
81%
admit
accessing their
employer’s
network
without their
employer’s
knowledge or
permission (Juniper
Network)
46%
who use a
personal
device for
work have let
someone else
use It
(Harris Poll of US Adults)
66%
who use a
personal
device for
work say that
their
organization
doesn’t have a
BYOD policy
(Harris Poll of US Adults)
© 2014 SECUDE AG |
Main BYOD Security Concerns
7%
23%
29%
37%
44%
47%
65%
75%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Other
Support & Maintenance
Compliance with industry regulations
Device management
Lost or stolen devices
Malware infections
Unauthorized access to company data and
systems
Loss of company or client data
Source: Lumension
© 2014 SECUDE AG |
Data is Most Valuable Resource
Apps $ Devices $$ Data $$$$$$$$$
Secure your data, not apps or devices
3 key factors
© 2014 SECUDE AG |
Storing Data
37%
12%
8%
51%
42%
11%
0%
10%
20%
30%
40%
50%
60%
Keep work files on
personal laptops
Store work files on
personal smartphones
Keep enterprise
documents on personal
tablets
All Workers
Millenials
© 2014 SECUDE AG |
!   Corporate perimeter is eroding/has
eroded
!   Knowing where your data has
become a challenge
!   Keeping track is next to impossible
!   Let’s not forget: data exists to be
consumed
●  So locking everything down and
disallowing employees to productively
use data is counter-productive
The IT Challenge
File Server
Employees
Partner
© 2014 SECUDE AG |
Questions?
© 2014 SECUDE AG |
Existing Security Technologies
19
© 2014 SECUDE AG |
!   Firewall
●  Protects the (eroded) perimeter
!   DLP
●  Monitoring
§  Good to understand where data is
going
§  Problem is wealth of information it
produces
●  Prevention
§  Too far away from where data is born
§  Doesn’t know the context
§  Frustrates users
§  Often switched off
!   VPN
●  Protects data in transit only
Network-centric Solutions
© 2014 SECUDE AG |
!   FDE
●  Power-off protection
●  Good if you lose device or it’s stolen
●  No protection for data-in-use
!   Database encryption
●  Good to protect against unauthorized users
●  Complex and high maintenance
!   Mobile device encryption
●  Why that’s not possible
§  iOS devices come with built-in HW-based
encryption
§  App sandboxes prevents encryption of app data
Storage-centric Solutions
© 2014 SECUDE AG |
!   File-encryption (PGP…)
●  Key/password management issues
●  Protection is gone once file is
unlocked/decrypted
!   Rights Management (DRM, IRM
à RMS)
●  Capabilities of IRM
§  Protection = encryption + policy
§  Control who can open, edit, print,
copy/paste…
§  Expiration date
●  Established IRM solutions
§  Adobe
§  Oracle (SealedMedia)
§  Microsoft
Data-centric Solutions
© 2014 SECUDE AG |
Data-centric protection
Industry leading Microsoft Rights Management technology
Access Control
Encryption
Policy Enforcement
Unauthorized
User
Trusted
Partner
23
© 2014 SECUDE AG |
Data is Protected
!   Inside and outside the
organization
!   At a single location
u  And when moving amongst various locations
Partner
On premise Shared
© 2014 SECUDE AG |
Fine-grained Control
!   Content owners can define who can
●  Open the document
●  Edit the contents
●  Print the document
●  Forward to anyone, internal or external
●  Take other actions with the information
© 2014 SECUDE AG |
Questions?
© 2014 SECUDE AG |
Halocore for SAP NetWeaver
!   Innovative: Enforces RMS protection on all data leaving SAP
!   Secure: Determines what users are authorized to access sensitive data
!   Customizable: Offers fine-tuned control over who can do what with information
(view, edit, print, forward, etc.)
!   Flexible: Works for any file type
!   Powerful: Protection persists beyond SAP, including mobile platforms
© 2014 SECUDE AG |
Comprehensive Approach
1. Protection 2. Compliance 3. Audit
© 2014 SECUDE AG |
Demo
© 2014 SECUDE AG |
Where to Start?
!   Data Export Auditor for SAP
●  Free tool to monitor all data leaving SAP
●  Each and every download is tracked
●  Intelligent classification
●  Request download at www.secude.com
30
© 2014 SECUDE AG |
Auditing Capabilities - Customizing your view
© 2014 SECUDE AG |
Auditing Capabilities - The Log File
© 2014 SECUDE AG |
Questions?
© 2014 SECUDE AG |
Visit us at www.SECUDE.com
Tweet us @SECUDE
6/27/14 34
© 2014 SECUDE AG |
Aparna Jue
Technical Product Manager
www.secude.com
SECUDE IT Security, LLC
Alpharetta, GA USA
© 2014 SECUDE AG |
Copyright
SECUDE AG © 2014 All rights reserved.
All product and service names mentioned are the trademarks of their
respective companies. No part of this publication may be reproduced or
transmitted in any form or for any purpose without the express written
permission of SECUDE AG. The information contained herein may be
changed without prior notice.
Microsoft, Windows, and Active Directory are the brand names or
registered trademarks of Microsoft Corporation in the United States.
6/27/14 36

More Related Content

PDF
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
PDF
Beyond the PC: Combating Unmanaged Threats Security
PDF
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
PDF
Mobile Security in 2013
PPTX
Mobile device management and BYOD – simple changes, big benefits
PPTX
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
PDF
INTRODUCTION TO IVANTI NEURONS
PPTX
Scrubbing Your Active Directory Squeaky Clean
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Beyond the PC: Combating Unmanaged Threats Security
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Mobile Security in 2013
Mobile device management and BYOD – simple changes, big benefits
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
INTRODUCTION TO IVANTI NEURONS
Scrubbing Your Active Directory Squeaky Clean

What's hot (17)

PPTX
Mobile Device Managment
PPTX
BYOD (Bring Your Own Device)
PDF
Security in the News
PPTX
Noi siamo Ivanti: più forti insieme!
PPTX
Governance fail security fail
PPTX
Appsecurity, win or loose
PDF
7.5 steps to overlaying byod & iot
PPTX
Aisha visram presentacion bmobilew 2015 rev 2
PDF
Punahou school maintains a secure and open campus with cisco - case study
PPTX
Leveraging Identity to Manage Change and Complexity
PDF
Intel HIMSS WoHIT mhealth
PPTX
Oracle here. now. your choice.
PDF
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
PDF
Business continuity strategy to combat coronavirus (covid 19) - innova global...
PDF
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
PPTX
Building A Cloud-Ready Security Program
PPTX
A Smarter, More Secure Internet of Things
Mobile Device Managment
BYOD (Bring Your Own Device)
Security in the News
Noi siamo Ivanti: più forti insieme!
Governance fail security fail
Appsecurity, win or loose
7.5 steps to overlaying byod & iot
Aisha visram presentacion bmobilew 2015 rev 2
Punahou school maintains a secure and open campus with cisco - case study
Leveraging Identity to Manage Change and Complexity
Intel HIMSS WoHIT mhealth
Oracle here. now. your choice.
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
Business continuity strategy to combat coronavirus (covid 19) - innova global...
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
Building A Cloud-Ready Security Program
A Smarter, More Secure Internet of Things
Ad

Similar to BYOD Webinar for SAP: Securing Data in a Mobile World (20)

PPTX
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
PPTX
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
PDF
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
PPTX
_Bridging the Security and Usability Gap.pptx
PPTX
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
PDF
Mobile Security
PDF
BH SA A4 Brochure
PDF
Building Elastic into security operations
PPTX
Exploring byod approaches for mobile learning
PPTX
Gestión de identidad
PDF
Security in the Context of Business Processes: Thoughts from a System Vendor'...
PPTX
Enterprise Mobility+Security Overview
PDF
10 Risky Employee Practices - Security solutions
PDF
BluBØX Intro
PDF
Enterprise mobility
PDF
Samsung SDS FIDO for Financial Services
PDF
Awingu 4.0
PDF
Top 10 tech trends 2014
PDF
Cloud backup-for-endpoint-devices
PDF
MT50 Data is the new currency: Protect it!
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
_Bridging the Security and Usability Gap.pptx
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
Mobile Security
BH SA A4 Brochure
Building Elastic into security operations
Exploring byod approaches for mobile learning
Gestión de identidad
Security in the Context of Business Processes: Thoughts from a System Vendor'...
Enterprise Mobility+Security Overview
10 Risky Employee Practices - Security solutions
BluBØX Intro
Enterprise mobility
Samsung SDS FIDO for Financial Services
Awingu 4.0
Top 10 tech trends 2014
Cloud backup-for-endpoint-devices
MT50 Data is the new currency: Protect it!
Ad

More from UL Transaction Security (6)

PPTX
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
PPTX
BREACHED: Data Centric Security for SAP
PDF
Perimeter Security is Failing
PDF
HR Security in SAP: Securing Data Beyond HCM Authorizations
PDF
WEBINAR - A New Era in HR Security for SAP
PPTX
What's New in Microsoft Rights Management Services
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
BREACHED: Data Centric Security for SAP
Perimeter Security is Failing
HR Security in SAP: Securing Data Beyond HCM Authorizations
WEBINAR - A New Era in HR Security for SAP
What's New in Microsoft Rights Management Services

Recently uploaded (20)

PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PPTX
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
How to Get Approval for Business Funding
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
How to Get Funding for Your Trucking Business
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
Blood Collected straight from the donor into a blood bag and mixed with an an...
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
IFRS Notes in your pocket for study all the time
PPTX
sales presentation، Training Overview.pptx
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Solaris Resources Presentation - Corporate August 2025.pdf
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
How to Get Approval for Business Funding
NEW - FEES STRUCTURES (01-july-2024).pdf
How to Get Funding for Your Trucking Business
Comments on Crystal Cloud and Energy Star.pdf
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
Lecture 3344;;,,(,(((((((((((((((((((((((
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Slide gioi thieu VietinBank Quy 2 - 2025
Blood Collected straight from the donor into a blood bag and mixed with an an...
Digital Marketing & E-commerce Certificate Glossary.pdf.................
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
IFRS Notes in your pocket for study all the time
sales presentation، Training Overview.pptx
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)

BYOD Webinar for SAP: Securing Data in a Mobile World

  • 1. © 2014 SECUDE AG | © 2014 SECUDE AG | WWW.SECUDE.COM BYOD Webinar for SAP Securing Data in a Mobile World
  • 2. © 2014 SECUDE AG | Speakers 2 Michael Kummer President Americas, SECUDE Aparna Jue Technical Product Manager, SECUDE
  • 3. © 2014 SECUDE AG | Agenda !   Mobility & BYOD trends and what they mean for you !   Mobility & BYOD challenges !   Current approach and why it’s failing !   What else can be done? A look at new technologies 3 1 2 3 4
  • 4. © 2014 SECUDE AG | About SECUDE 4 1996 Startup of Secude, Spin-Off from Fraunhofer & SAP 2000 SAP partnership (world-wide deployment of SECUDE SNC-SW) 2001 Market entry file/folder encryption 2002 Market entry Smartcard Management and E-SSO 2004 Startup of SECUDE USA 2005 Market entry Full Disc Encryption (FDE) 2006 Launch of FinallySecure Enterprise with Seagate (HW-based FDE) 2011 Spin-off of SECUDE’s SAP Security products to SAP AG 2011 Re-focus on endpoint protection & later SAP NetWeaver Single Sign-On 2012 Halocore initiative to bridge MS AD RMS with SAP
  • 5. © 2014 SECUDE AG | !   83% of people sleep next to their cell phones (Pew Research Center) ! 29% of Americans say their phone is the first and last thing they look at every day (Qualcomm) Mobility Goes Boom St. Peter's Square in 2005 and 2013
  • 6. © 2014 SECUDE AG | 4.38% 14.79% 24.02% 27.21% 29.59% Mobility Landscape Other NO CONSENSUS ON OPERATING SYSTEM DEVICE OBSESSION 86% are device obsessed or “always on” 44% use their devices to work during meals 20% consider themselves workaholics 15% bring their devices on vacation Source: Varonis Systems
  • 7. © 2014 SECUDE AG | What is “Bring Your Own Device”? !   Bring Your Own Devices enables users to bring devices they choose to perform company work activities !   Employees want BYOD for choice of device, applications, and ability to combine personal and work lives BYOD means any device with any ownership, used anywhere.
  • 8. © 2014 SECUDE AG | There is No Stopping BYOD !   The BYOD market will increase to $181 billion by 2017 (MarketsandMarkets) !   95% of organizations permit employee-owned devices (Cisco IBSG) !   71% require technology that enables their staff to work anywhere at any time (Microsoft) !   70% of employees use personal devices for business use (Forrester)
  • 9. © 2014 SECUDE AG | Why They BYOD: Benefits to Employees Flexibility: No hassle with one device to combine work and personal activities Efficiency: Can get more done with my own device Control: Can have greater control of my work experience through choice of device
  • 10. © 2014 SECUDE AG | Why They BYOD: Benefits to Enterprises Cost reduction: Annual benefits from BYOD range from $300 to $1300 per employee (Cisco IBSG) Productivity: 53% have raised work productivity through innovative practices enabled by their devices (Cisco IBSG) Employee satisfaction: Employees feel more comfortable while working on personal devices, which improves their job satisfaction levels.
  • 11. © 2014 SECUDE AG | This is What We are Facing End-User Behavior •  Over 15 billion devices by 2015, with average worker with 3 devices •  New workspace: anywhere, anytime •  60% will download sensitive corporate data on a personal device •  71% of Gen Y workforce don’t obey policies IT Trends •  Must control multiple devices and guests •  Security: top concern for BYOD •  75% of IT professionals believe their organization’s sensitive data is at risk due to mobile devices •  IT consumed with fragmentation Source: Logicalis
  • 12. © 2014 SECUDE AG | Issues in BYOD !   Security issues !   Privacy issues !   Support issues !   Infrastructure issues !   Device control issues
  • 13. © 2014 SECUDE AG | Bring Your Own DISASTER 9 out of 10 employees don’t use password security on their devices (Osterman Research) 51% have had data loss due to insecure devices (Websense) 81% admit accessing their employer’s network without their employer’s knowledge or permission (Juniper Network) 46% who use a personal device for work have let someone else use It (Harris Poll of US Adults) 66% who use a personal device for work say that their organization doesn’t have a BYOD policy (Harris Poll of US Adults)
  • 14. © 2014 SECUDE AG | Main BYOD Security Concerns 7% 23% 29% 37% 44% 47% 65% 75% 0% 10% 20% 30% 40% 50% 60% 70% 80% Other Support & Maintenance Compliance with industry regulations Device management Lost or stolen devices Malware infections Unauthorized access to company data and systems Loss of company or client data Source: Lumension
  • 15. © 2014 SECUDE AG | Data is Most Valuable Resource Apps $ Devices $$ Data $$$$$$$$$ Secure your data, not apps or devices 3 key factors
  • 16. © 2014 SECUDE AG | Storing Data 37% 12% 8% 51% 42% 11% 0% 10% 20% 30% 40% 50% 60% Keep work files on personal laptops Store work files on personal smartphones Keep enterprise documents on personal tablets All Workers Millenials
  • 17. © 2014 SECUDE AG | !   Corporate perimeter is eroding/has eroded !   Knowing where your data has become a challenge !   Keeping track is next to impossible !   Let’s not forget: data exists to be consumed ●  So locking everything down and disallowing employees to productively use data is counter-productive The IT Challenge File Server Employees Partner
  • 18. © 2014 SECUDE AG | Questions?
  • 19. © 2014 SECUDE AG | Existing Security Technologies 19
  • 20. © 2014 SECUDE AG | !   Firewall ●  Protects the (eroded) perimeter !   DLP ●  Monitoring §  Good to understand where data is going §  Problem is wealth of information it produces ●  Prevention §  Too far away from where data is born §  Doesn’t know the context §  Frustrates users §  Often switched off !   VPN ●  Protects data in transit only Network-centric Solutions
  • 21. © 2014 SECUDE AG | !   FDE ●  Power-off protection ●  Good if you lose device or it’s stolen ●  No protection for data-in-use !   Database encryption ●  Good to protect against unauthorized users ●  Complex and high maintenance !   Mobile device encryption ●  Why that’s not possible §  iOS devices come with built-in HW-based encryption §  App sandboxes prevents encryption of app data Storage-centric Solutions
  • 22. © 2014 SECUDE AG | !   File-encryption (PGP…) ●  Key/password management issues ●  Protection is gone once file is unlocked/decrypted !   Rights Management (DRM, IRM à RMS) ●  Capabilities of IRM §  Protection = encryption + policy §  Control who can open, edit, print, copy/paste… §  Expiration date ●  Established IRM solutions §  Adobe §  Oracle (SealedMedia) §  Microsoft Data-centric Solutions
  • 23. © 2014 SECUDE AG | Data-centric protection Industry leading Microsoft Rights Management technology Access Control Encryption Policy Enforcement Unauthorized User Trusted Partner 23
  • 24. © 2014 SECUDE AG | Data is Protected !   Inside and outside the organization !   At a single location u  And when moving amongst various locations Partner On premise Shared
  • 25. © 2014 SECUDE AG | Fine-grained Control !   Content owners can define who can ●  Open the document ●  Edit the contents ●  Print the document ●  Forward to anyone, internal or external ●  Take other actions with the information
  • 26. © 2014 SECUDE AG | Questions?
  • 27. © 2014 SECUDE AG | Halocore for SAP NetWeaver !   Innovative: Enforces RMS protection on all data leaving SAP !   Secure: Determines what users are authorized to access sensitive data !   Customizable: Offers fine-tuned control over who can do what with information (view, edit, print, forward, etc.) !   Flexible: Works for any file type !   Powerful: Protection persists beyond SAP, including mobile platforms
  • 28. © 2014 SECUDE AG | Comprehensive Approach 1. Protection 2. Compliance 3. Audit
  • 29. © 2014 SECUDE AG | Demo
  • 30. © 2014 SECUDE AG | Where to Start? !   Data Export Auditor for SAP ●  Free tool to monitor all data leaving SAP ●  Each and every download is tracked ●  Intelligent classification ●  Request download at www.secude.com 30
  • 31. © 2014 SECUDE AG | Auditing Capabilities - Customizing your view
  • 32. © 2014 SECUDE AG | Auditing Capabilities - The Log File
  • 33. © 2014 SECUDE AG | Questions?
  • 34. © 2014 SECUDE AG | Visit us at www.SECUDE.com Tweet us @SECUDE 6/27/14 34
  • 35. © 2014 SECUDE AG | Aparna Jue Technical Product Manager www.secude.com SECUDE IT Security, LLC Alpharetta, GA USA
  • 36. © 2014 SECUDE AG | Copyright SECUDE AG © 2014 All rights reserved. All product and service names mentioned are the trademarks of their respective companies. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express written permission of SECUDE AG. The information contained herein may be changed without prior notice. Microsoft, Windows, and Active Directory are the brand names or registered trademarks of Microsoft Corporation in the United States. 6/27/14 36