SlideShare une entreprise Scribd logo
1  sur  45
STRICTLY CONFIDENTIAL | © 2015 SECUDE AGSTRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Eliminating Negative Impact on User
Experience from Security Solutions
Webinar
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
About SECUDE
• Established in 1996, Spin-Off from Fraunhofer & SAP
• Developer of a Secure Login (SAP Single Sign-On)
technology, sold to SAP in 2011
• SAP partner and Value Added Reseller (VAR)
• Trusted by a large number of Fortune 500 and DAX
companies
• 4 global locations: Switzerland, Germany, USA, India
• New focus extends to data-centric security and
classification with Halocore solutions
SECUDE is an innovative global provider of IT data protection solutions for SAP
customers. Our user-friendly solutions protect the integrity of data, prevent
intellectual property theft and data breaches, while enforcing regulatory compliance.
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
User eXperience (UX) is the process of enhancing
customer and loyalty by improving the usability, ease
to use and interaction between the user and product.
User eXperience (UX) is the understanding of what
people do and how we can
“Make It Better”.
OR
What is User Experience?
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
The Design of Everyday Things
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
The Design of Everyday Things
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Little Things That Make a Difference…
In the vast majority of cases, splash screens do little more than
needlessly annoy users. Rather than make us sit and stare at a
logo for five seconds every time we open an app, why not -- I don't
know -- just let us into the app?
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Little Things That Make a Difference…
There's rarely a reason for a "Loading" dialog to hijack our screen
and force us to stare at a spinning wheel. How about a Gmail-style
progress bar that doesn't take over the entire experience instead?
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Results of Little Things Big Difference - Uber
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
UX Research is About Changing Assumptions
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Shopping Experiences Are Measured By UX
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Wearables Are Changing UX
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
How the Customer
explained it
How the Project
Leader understood it
How the Analyst
designed it
How the Programmer
wrote it
How the Business
Consultant described it
How the project was
documented
What Operations
installed
What the customer
was billed
How it was supported What the Customer
really needed
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
UX Fails - Bad Design
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
UX Fails - Confusing Users
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
UX Fails - Registration
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
UX Fails – Bad Website Design
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
3 of 12
Reasons why software fails are directly
related to problems with UX
- IEEE Report “Why Software Fails?”
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Does This Sounds Familiar?
This software is very
complex!
I liked the old app
better
Why do I have to click
so many times to do
something?
Why can’t I copy/paste all
the data from my Excel
sheet?
Why can I not
download this
file?
Why do I get an
error message?
Why is this taking
so long?
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
• Are usability and security competing goals?
• Humans are the weakest link in the security chain
• Security systems are social as well as technical
• Security mechanisms require extra work. Humans find
shortcuts and workarounds
• Users will find ways to evade security demands that are
considered unreasonable or burdensome
Humans & Security
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Security vs User Experience
For user experience designers the question is
How do you design the security experience to fit the needs of the digital
identity. Behind the identity there is a person with the same basic needs as
stated in Maslow’s hierarchy of needs – security among the most critical.
For security professionals the question is
How do you enable your customers business in an environment, where the
speed and comfort override the traditional understanding of security –
environment, where user experience overrides security?
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Layered Approach to Security
Network
– Data Loss Prevention (DLP)
– Firewalls
– Virtual Private Network (VPN)
Storage
– Full Disk Encryption (FDE)
– Database Encryption
File
– Pretty Good Privacy (PGP)
– Information Rights Management (IRM)
File
Network
Storage
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Network Layer
• Common problems with VPNs
– Connection attempt is rejected
when it should be accepted
– Connection attempt is accepted
when it should be rejected
– Unable to reach locations beyond
the VPN server
– Disconnected from a VPN
session
More than three-quarters
(77%) of Americans are less
than satisfied with their
current capabilities offered by
their IT organization.
Source: Petino Study
58%
43%
31%
Issues with VPNs
Performance
Connection reliability
Ease of use
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Network Layer
• Common issues with DLP
– DLP is far away from where data
is created (applications)
– DLP lacks contextual awareness
– DLP can't make sense of content
sent as CAD diagrams, graphics,
pictures or non-text-based media
– DLP doesn’t understand the user
and her intentions
– Negative impact on user
experience
So secure
that it is
unusable?
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Storage Layer
Mobile technology impact on productivity:
Thinking about the next 24 months, how critical a role will the following
mobile technologies play in business productivity at your company?
Source: Information Week Mobile Device
Management and Security Survey
22%
21%
53%
36%
89%
38%
24%
34%
79%
82%
0% 20% 40% 60% 80% 100%
Netbooks
Kiosk-based web access
Laptops
Tablets
Smartphones
2011
2010
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Storage Layer
58%
16%
26%
73%
12%
15%
0%
10%
20%
30%
40%
50%
60%
70%
80%
Yes, and the IT department is
reponsible for procuring
devices and carriers
Yes, but users purchase the
devices themselves and select
their own carriers
No, employees use their own
devices
2010
2011
Standardizing on a mobile device platform:
Has your organization standardized on a mobile device platform?
Source: Information Week Mobile Device
Management and Security Survey
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Storage Layer
Level of data sensitivity allowed for storage on mobile devices:
What is the maximum data sensitivity level that is permitted to be stored on any type of mobile device?
Source: Information Week Mobile Device
Management and Security Survey
15%
24%
34%
4%
23%
Highly sensitive data
including financial and
compliance-related data
Sensitive data
Internal data that is not
deemed sensitive
Public data only
No restrictions
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Storage Layer
Mobile devices and data policies:
Does your organization currently have written policies or procedures
pertaining specifically to mobile devices or the handling of mobile data?
Source: Information Week Mobile Device
Management and Security Survey
49%
18%
6%
21%
6%
52%
19%
4%
22%
3%
0% 10% 20% 30% 40% 50% 60%
Yes, written policies and procedures
Yes, written policies only
Yes, written procedures only
No, but policies are being
considered
No
2011
2010
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Data Layer
• File-encryption (PGP…)
– Key/password management
issues
– Protection is gone once file is
unlocked/decrypted
• Rights Management (DRM,
IRM  RMS)
– Capabilities of IRM
• Protection = encryption +
policy
• Control who can open, edit,
print, copy/paste…
• Expiration date
– Established IRM solutions
• Adobe
• Microsoft
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
1. Create different user types. "Those that do not need access to the
sensitive information can't retrieve it”
2. Channel application flows. "Make it easy to get access to sensitive
information only if needed. And make sensitive information harder to
access otherwise."
3. Help users understand the potential consequences of their
actions. "Give them steps they must acknowledge to access sensitive
information or execute risky operations. Along with building in
automatic flows that may be invisible to users, develop agile
processes that enhance the sense of ownership.”
3 Ways to Accomplish Security
While Heightening User Experience
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
How Many Clicks Do You Need?
SAP Security
• Roles and Authorizations
• Segregation of Duties (SoD)
• Infotypes
• Single Sign-On (SSO)
• Password Hashes
• Secure Network Communications (SNC)
• …
Enterprise Security
• Firewalls
• VPNs
• Classification
• Data Loss Prevention (DLP)
• Cloud security and MDM
• Risk and vulnerability management
• …
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
SAP Data is the Heart of the Enterprise
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Every Day Data is Extracted from SAP
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Today: Traditional Security Solutions
Are Not Connected to SAP
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Cohesive UX with Securing Data
STRICTLY CONFIDENTIAL | © 2015 SECUDE AGSTRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Extend Existing Classification Frameworks
to Data Leaving SAP
STRICTLY CONFIDENTIAL | © 2015 SECUDE AGSTRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Block Sensitive Data Downloads
Directly from SAP
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Extend Roles and Authorizations
Configured in SAP for Continuous Protection
STRICTLY CONFIDENTIAL | © 2015 SECUDE AGSTRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Audit All Activity
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Demo
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Demo
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Aparna Jue
Technical Product Manager
Office: +1 (404) 977-0940
Aparna.Jue@usa.secude.com | www.secude.com
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
Copyright
SECUDE AG © 2015 All rights reserved.
All product and service names mentioned are the
trademarks of their respective companies. No part of this
publication may be reproduced or transmitted in any form or
for any purpose without the express written permission of
SECUDE AG. The information contained herein may be
changed without prior notice.
Microsoft, Windows, and Active Directory are the brand
names or registered trademarks of Microsoft Corporation in
the United States.

Contenu connexe

Tendances

GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization Patric Dahse
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLPRobert Kloots
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...Ulf Mattsson
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-managementAmit Bhargava
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securitywardell henley
 
BayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the CloudBayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the CloudSri Chilukuri
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked inJohn Masiliunas
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
Qubole GDPR Security and Compliance Whitepaper
Qubole GDPR Security and Compliance Whitepaper Qubole GDPR Security and Compliance Whitepaper
Qubole GDPR Security and Compliance Whitepaper Vasu S
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor
 
Data Security and Data Privacy – EU-GDPR Fields of Action
Data Security and Data Privacy – EU-GDPR Fields of ActionData Security and Data Privacy – EU-GDPR Fields of Action
Data Security and Data Privacy – EU-GDPR Fields of ActionPatric Dahse
 

Tendances (20)

GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization GDPR compliant data anonymization / pseudonymization
GDPR compliant data anonymization / pseudonymization
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Safeguarding the Enterprise. A new approach.
Safeguarding the Enterprise. A new approach.Safeguarding the Enterprise. A new approach.
Safeguarding the Enterprise. A new approach.
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20security
 
BayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the CloudBayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the Cloud
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
 
ITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORKITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORK
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Qubole GDPR Security and Compliance Whitepaper
Qubole GDPR Security and Compliance Whitepaper Qubole GDPR Security and Compliance Whitepaper
Qubole GDPR Security and Compliance Whitepaper
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLPSecure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
 
IRM Briefing
IRM BriefingIRM Briefing
IRM Briefing
 
Data Security and Data Privacy – EU-GDPR Fields of Action
Data Security and Data Privacy – EU-GDPR Fields of ActionData Security and Data Privacy – EU-GDPR Fields of Action
Data Security and Data Privacy – EU-GDPR Fields of Action
 

En vedette

JS Lab`16. Владимир Воевидка: "Как работает браузер"
JS Lab`16. Владимир Воевидка: "Как работает браузер"JS Lab`16. Владимир Воевидка: "Как работает браузер"
JS Lab`16. Владимир Воевидка: "Как работает браузер"GeeksLab Odessa
 
20130131 binck itude_m_commerce_v04
20130131 binck itude_m_commerce_v0420130131 binck itude_m_commerce_v04
20130131 binck itude_m_commerce_v04Robin Puthli
 
White Label features
White Label features White Label features
White Label features MEEwallet
 
Healthiest Seeds For Life
Healthiest Seeds For LifeHealthiest Seeds For Life
Healthiest Seeds For Lifevanya Gill
 
Discografia de selena gomez
Discografia de selena gomezDiscografia de selena gomez
Discografia de selena gomezlisita_95
 
Rpp jaringan dasar 1 3
Rpp jaringan dasar 1 3Rpp jaringan dasar 1 3
Rpp jaringan dasar 1 3Iam Cominx
 

En vedette (12)

Udated resume March
Udated resume MarchUdated resume March
Udated resume March
 
JS Lab`16. Владимир Воевидка: "Как работает браузер"
JS Lab`16. Владимир Воевидка: "Как работает браузер"JS Lab`16. Владимир Воевидка: "Как работает браузер"
JS Lab`16. Владимир Воевидка: "Как работает браузер"
 
FRM Certificate
FRM CertificateFRM Certificate
FRM Certificate
 
20130131 binck itude_m_commerce_v04
20130131 binck itude_m_commerce_v0420130131 binck itude_m_commerce_v04
20130131 binck itude_m_commerce_v04
 
Building apps for india
Building apps for indiaBuilding apps for india
Building apps for india
 
Մթնոլորտ
ՄթնոլորտՄթնոլորտ
Մթնոլորտ
 
White Label features
White Label features White Label features
White Label features
 
Healthiest Seeds For Life
Healthiest Seeds For LifeHealthiest Seeds For Life
Healthiest Seeds For Life
 
Scott Clayton Johnston ref
Scott Clayton Johnston refScott Clayton Johnston ref
Scott Clayton Johnston ref
 
Discografia de selena gomez
Discografia de selena gomezDiscografia de selena gomez
Discografia de selena gomez
 
Rpp 1 riil
Rpp 1 riilRpp 1 riil
Rpp 1 riil
 
Rpp jaringan dasar 1 3
Rpp jaringan dasar 1 3Rpp jaringan dasar 1 3
Rpp jaringan dasar 1 3
 

Similaire à Webinar: Eliminating Negative Impact on User Experience from Security Solutions

BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldUL Transaction Security
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudGoogle
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
Iasa Architect responsibilities in the cloud
Iasa Architect responsibilities in the cloudIasa Architect responsibilities in the cloud
Iasa Architect responsibilities in the cloudiasaglobal
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestAvere Systems
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudCapgemini
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...Amazon Web Services
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business CollateralVikram Sareen
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 

Similaire à Webinar: Eliminating Negative Impact on User Experience from Security Solutions (20)

BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure CloudEspion and SureSkills Presentation - Your Journey To A Secure Cloud
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Iasa Architect responsibilities in the cloud
Iasa Architect responsibilities in the cloudIasa Architect responsibilities in the cloud
Iasa Architect responsibilities in the cloud
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
AE foyer: From Server Virtualization to Hybrid Cloud
AE foyer: From Server Virtualization to Hybrid CloudAE foyer: From Server Virtualization to Hybrid Cloud
AE foyer: From Server Virtualization to Hybrid Cloud
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Integra presentation
Integra presentationIntegra presentation
Integra presentation
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...
AWS Summit Sydney 2014 | Building Tomorrow’s Digital Enterprise Leveraging SM...
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Implementing your APIs with zero trust
Implementing your APIs with zero trustImplementing your APIs with zero trust
Implementing your APIs with zero trust
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 

Plus de UL Transaction Security

HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsUL Transaction Security
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...UL Transaction Security
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPUL Transaction Security
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesUL Transaction Security
 

Plus de UL Transaction Security (6)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management Services
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Webinar: Eliminating Negative Impact on User Experience from Security Solutions

  • 1. STRICTLY CONFIDENTIAL | © 2015 SECUDE AGSTRICTLY CONFIDENTIAL | © 2015 SECUDE AG Eliminating Negative Impact on User Experience from Security Solutions Webinar
  • 2. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG About SECUDE • Established in 1996, Spin-Off from Fraunhofer & SAP • Developer of a Secure Login (SAP Single Sign-On) technology, sold to SAP in 2011 • SAP partner and Value Added Reseller (VAR) • Trusted by a large number of Fortune 500 and DAX companies • 4 global locations: Switzerland, Germany, USA, India • New focus extends to data-centric security and classification with Halocore solutions SECUDE is an innovative global provider of IT data protection solutions for SAP customers. Our user-friendly solutions protect the integrity of data, prevent intellectual property theft and data breaches, while enforcing regulatory compliance.
  • 3. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG User eXperience (UX) is the process of enhancing customer and loyalty by improving the usability, ease to use and interaction between the user and product. User eXperience (UX) is the understanding of what people do and how we can “Make It Better”. OR What is User Experience?
  • 4. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
  • 5. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG The Design of Everyday Things
  • 6. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG The Design of Everyday Things
  • 7. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Little Things That Make a Difference… In the vast majority of cases, splash screens do little more than needlessly annoy users. Rather than make us sit and stare at a logo for five seconds every time we open an app, why not -- I don't know -- just let us into the app?
  • 8. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Little Things That Make a Difference… There's rarely a reason for a "Loading" dialog to hijack our screen and force us to stare at a spinning wheel. How about a Gmail-style progress bar that doesn't take over the entire experience instead?
  • 9. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Results of Little Things Big Difference - Uber
  • 10. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG UX Research is About Changing Assumptions
  • 11. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Shopping Experiences Are Measured By UX
  • 12. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
  • 13. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Wearables Are Changing UX
  • 14. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG How the Customer explained it How the Project Leader understood it How the Analyst designed it How the Programmer wrote it How the Business Consultant described it How the project was documented What Operations installed What the customer was billed How it was supported What the Customer really needed
  • 15. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG UX Fails - Bad Design
  • 16. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG UX Fails - Confusing Users
  • 17. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG UX Fails - Registration
  • 18. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG UX Fails – Bad Website Design
  • 19. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG 3 of 12 Reasons why software fails are directly related to problems with UX - IEEE Report “Why Software Fails?”
  • 20. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Does This Sounds Familiar? This software is very complex! I liked the old app better Why do I have to click so many times to do something? Why can’t I copy/paste all the data from my Excel sheet? Why can I not download this file? Why do I get an error message? Why is this taking so long?
  • 21. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG • Are usability and security competing goals? • Humans are the weakest link in the security chain • Security systems are social as well as technical • Security mechanisms require extra work. Humans find shortcuts and workarounds • Users will find ways to evade security demands that are considered unreasonable or burdensome Humans & Security
  • 22. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Security vs User Experience For user experience designers the question is How do you design the security experience to fit the needs of the digital identity. Behind the identity there is a person with the same basic needs as stated in Maslow’s hierarchy of needs – security among the most critical. For security professionals the question is How do you enable your customers business in an environment, where the speed and comfort override the traditional understanding of security – environment, where user experience overrides security?
  • 23. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Layered Approach to Security Network – Data Loss Prevention (DLP) – Firewalls – Virtual Private Network (VPN) Storage – Full Disk Encryption (FDE) – Database Encryption File – Pretty Good Privacy (PGP) – Information Rights Management (IRM) File Network Storage
  • 24. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Network Layer • Common problems with VPNs – Connection attempt is rejected when it should be accepted – Connection attempt is accepted when it should be rejected – Unable to reach locations beyond the VPN server – Disconnected from a VPN session More than three-quarters (77%) of Americans are less than satisfied with their current capabilities offered by their IT organization. Source: Petino Study 58% 43% 31% Issues with VPNs Performance Connection reliability Ease of use
  • 25. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Network Layer • Common issues with DLP – DLP is far away from where data is created (applications) – DLP lacks contextual awareness – DLP can't make sense of content sent as CAD diagrams, graphics, pictures or non-text-based media – DLP doesn’t understand the user and her intentions – Negative impact on user experience So secure that it is unusable?
  • 26. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Storage Layer Mobile technology impact on productivity: Thinking about the next 24 months, how critical a role will the following mobile technologies play in business productivity at your company? Source: Information Week Mobile Device Management and Security Survey 22% 21% 53% 36% 89% 38% 24% 34% 79% 82% 0% 20% 40% 60% 80% 100% Netbooks Kiosk-based web access Laptops Tablets Smartphones 2011 2010
  • 27. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Storage Layer 58% 16% 26% 73% 12% 15% 0% 10% 20% 30% 40% 50% 60% 70% 80% Yes, and the IT department is reponsible for procuring devices and carriers Yes, but users purchase the devices themselves and select their own carriers No, employees use their own devices 2010 2011 Standardizing on a mobile device platform: Has your organization standardized on a mobile device platform? Source: Information Week Mobile Device Management and Security Survey
  • 28. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Storage Layer Level of data sensitivity allowed for storage on mobile devices: What is the maximum data sensitivity level that is permitted to be stored on any type of mobile device? Source: Information Week Mobile Device Management and Security Survey 15% 24% 34% 4% 23% Highly sensitive data including financial and compliance-related data Sensitive data Internal data that is not deemed sensitive Public data only No restrictions
  • 29. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Storage Layer Mobile devices and data policies: Does your organization currently have written policies or procedures pertaining specifically to mobile devices or the handling of mobile data? Source: Information Week Mobile Device Management and Security Survey 49% 18% 6% 21% 6% 52% 19% 4% 22% 3% 0% 10% 20% 30% 40% 50% 60% Yes, written policies and procedures Yes, written policies only Yes, written procedures only No, but policies are being considered No 2011 2010
  • 30. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Data Layer • File-encryption (PGP…) – Key/password management issues – Protection is gone once file is unlocked/decrypted • Rights Management (DRM, IRM  RMS) – Capabilities of IRM • Protection = encryption + policy • Control who can open, edit, print, copy/paste… • Expiration date – Established IRM solutions • Adobe • Microsoft
  • 31. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG 1. Create different user types. "Those that do not need access to the sensitive information can't retrieve it” 2. Channel application flows. "Make it easy to get access to sensitive information only if needed. And make sensitive information harder to access otherwise." 3. Help users understand the potential consequences of their actions. "Give them steps they must acknowledge to access sensitive information or execute risky operations. Along with building in automatic flows that may be invisible to users, develop agile processes that enhance the sense of ownership.” 3 Ways to Accomplish Security While Heightening User Experience
  • 32. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG How Many Clicks Do You Need? SAP Security • Roles and Authorizations • Segregation of Duties (SoD) • Infotypes • Single Sign-On (SSO) • Password Hashes • Secure Network Communications (SNC) • … Enterprise Security • Firewalls • VPNs • Classification • Data Loss Prevention (DLP) • Cloud security and MDM • Risk and vulnerability management • …
  • 33. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG SAP Data is the Heart of the Enterprise
  • 34. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Every Day Data is Extracted from SAP
  • 35. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Today: Traditional Security Solutions Are Not Connected to SAP
  • 36. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Cohesive UX with Securing Data
  • 37. STRICTLY CONFIDENTIAL | © 2015 SECUDE AGSTRICTLY CONFIDENTIAL | © 2015 SECUDE AG Extend Existing Classification Frameworks to Data Leaving SAP
  • 38. STRICTLY CONFIDENTIAL | © 2015 SECUDE AGSTRICTLY CONFIDENTIAL | © 2015 SECUDE AG Block Sensitive Data Downloads Directly from SAP
  • 39. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Extend Roles and Authorizations Configured in SAP for Continuous Protection
  • 40. STRICTLY CONFIDENTIAL | © 2015 SECUDE AGSTRICTLY CONFIDENTIAL | © 2015 SECUDE AG Audit All Activity
  • 41. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Demo
  • 42. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Demo
  • 43. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Aparna Jue Technical Product Manager Office: +1 (404) 977-0940 Aparna.Jue@usa.secude.com | www.secude.com
  • 44. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG
  • 45. STRICTLY CONFIDENTIAL | © 2015 SECUDE AG Copyright SECUDE AG © 2015 All rights reserved. All product and service names mentioned are the trademarks of their respective companies. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express written permission of SECUDE AG. The information contained herein may be changed without prior notice. Microsoft, Windows, and Active Directory are the brand names or registered trademarks of Microsoft Corporation in the United States.

Notes de l'éditeur

  1. SECUDE has many customers using SAP and each and every one we have spoken to has confirmed to us that they do NOT know when, what, who or how often data is extracted from their SAP systems! Clearly not knowing what data is leaving SAP, Who is accessing it, Where it is going is a serious Security Vulnerability.   Our Halocore solution can deal with that issue and more.   It is best described with the 5 simple words highlighted here which will be the basic sequence we us in understanding the Halocore solution.
  2. First a bit of history about SECUDE . . .
  3. It took our industry a number of years to fully understand how important user experience (UX) is to everything that we build. At its heart, UX design is about effectively addressing the needs and circumstances of your users, to produce an interface that is comfortable and even joyful to use. your users’ needs are always changing, as people continually evolve their expectations and technologies.
  4. Tradeoffs between security, privacy, and convenience are sometimes inevitable Active X controls Cookies Putting up walls just keeps people from getting their work done, from creating value in the organization. And, it creates discord between value creators and information protectors."
  5. Be enablers. non-intrusive tracking and monitoring capabilities. present users with understandable options that allow them to perform their tasks with a minimum of inconvenience.
  6.   As an SAP customer you run most of your business on SAP thus you have a tremendous amount of sensitive mission-critical data in SAP.   Your security team has spent a lot of time to ensure that what is in SAP can only be accessed by the people who have the roles and authorizations to access it. Strong Roles and Authorizations have been developed to ensure that.   SAP IS YOUR MISSION CRITICAL DATA STORE From PII to HR to Financial to Product Plan, your Crown Jewels reside in the SAP data stores.
  7. Unfortunately, every day a multitude of data is extracted from SAP by your users who need it to do their job, most of them likely spreadsheets but many other data types as well. It is then sent to many places like Dropbox, a PC hard drive, a mobile device and may be shared with employees, partners and possibly even a competitor. Or worse it may get out loose on the Internet!
  8.   Catch it if you can..   You have many DLP solutions to try to protect your data outside of SAP. Most GUESS what the data may be, look for cc # patterns, to decide to alert, block or so on, even ask for user input. EDC today, if used only comes into play when a user open a document after it has been downloaded from SAP and mostly depends on the User to do it. So why not classify data at creation? When data is extracted out of SAP, When all of the rich SAP meta-data is available, What system, What table, What roles, authorizations, even Where the user is at the time and much more is available?
  9. That is EXACTLY what Halocore does.   At the point of extraction/download using an algorithm called Attribute Derivation; Halocore intelligently classifies the data right then when most is known about it. App, System, Tx, table, even what device it is going to. Right at that time it can Audit, Block even Protect, By automatically and intelligently applying Classification Meta-Data Tags your downstream solutions become far more accurate and effective and produce far fewer false positives.
  10.   This UI is completely optional. Classification and Tagging can be done without any user involvement or it can involve the user in confirming or even changing the classification.   Many allow User involvement to create awareness of document sensitivity.   All actions are logged.   What you see is entirely configurable.
  11.   An Atlanta beverage company does not want password hashes to EVER be downloaded…   So they blocked any downloads of Tx SE16 Table USR02.   Locked and any access attempts Logged.
  12. MS RMS is template based, in this example we use a Finance template which allows open only and others only have read only print only access.   Once a user attempts to download, Halocore pops up and asks the user to confirm the template again. Assuming the user confirms (Save) in next step Excel comes as normal but as you can see by the yellow bar Excel confirms that this spreadshe Clicking will bring up the second example, will try to have changed into two distinct slides. As you can see user have View and Print only, cannot Copy, Edit or Save it elsewhere.   So if this was sent to someone outside of the finance department they would not even be able to open it.
  13. Helps to track sensitive data distribution in the company and identify possibly weak spots Does not require a Microsoft RMS infrastructure Each and every download is tracked The log can be displayed with an easy-to-use report transaction, in an ALV grid Data can be extracted and analyzed with more powerful tools, such as Business Objects