Technology Blogs by SAP
Learn how to extend and personalize SAP applications. Follow the SAP technology blog for insights into SAP BTP, ABAP, SAP Analytics Cloud, SAP HANA, and more.
cancel
Showing results for 
Search instead for 
Did you mean: 
milja_gillespie
Active Participant
0 Kudos

Mobile security is increasingly important topic in today's ever-changing mobile world. It comes up in almost every conversation with customers, at every industry conference, and in boardroom meetings around the world. Security has been an issue that has slowed down some mobile deployments  as companies struggle with finding the right approach. In industries where regulations abound security can never be ignored.

Last week I had the pleasure of attending the Gartner Security and Risk Summit in Washington DC, and had the opportunity to have some great conversations with CISOs and IT Security executives. Some people walked by the booth, glanced at our sign, and did a double take. I recall one conversation with a gentleman who stopped and said what many were thinking "Okay, you got me, what's SAP doing in the mobile security space?"

The answer is as simple. SAP recognizes the importance of security to every one of our customers. We're addressing the many needs that an enterprise faces when it comes to mobile security. There isn't one single magic bullet to make a CISO's dreams come true. That’s because every company approaches the issue of security from a different angle. Historically, most companies approached it from the hardware perspective - they managed the settings of a mobile device to secure the data on it. This was typically done through a Mobile Device Management (MDM) solution like SAP Afaria.

Today we're seeing companies extend that approach to include application-level security. Think about the application as “the new endpoint”. Instead of managing the settings on a piece of hardware, you inject code directly into an application to add a management and security layer. And the beauty is that today you can do that without writing any code – through a technique known as app wrapping.

A third area focus for many companies is around securing the content itself. Imagine securing your documents, spreadsheets, videos and reports directly. This could include content sitting in a content management system like SharePoint or Documentum. Adding a layer of security at the content level and embedding that content into applications is another way many companies are looking at securing corporate data.

Consider all three means of securing corporate information – from the device, application and content perspective – you can start to get the full picture of what it means to truly secure your enterprise. After dozens of conversations at the Gartner conference, it became increasingly clear that this multi-layered approach is what many companies are searching for. However, stitching together a collection of tactical solutions is a nightmare for the security department, who wants to take a more strategic approach to security.

It is with this in mind that SAP created “SAP Mobile Secure” - a robust portfolio of mobile security solutions that address every aspect of secure mobile deployments. I encourage you to take a look at our Mobile Security solutions by visiting www.sap.com/mobile/emm.

1 Comment