The SAP mobile security cannot be ignored.
The technical landscape of mobile devices is an environment riddled with weak spots and vulnerabilities. There is the mixing of business data with non-business data, as many devices enjoy both business and social networking applications. Connectivity weak-spots, via the internet, SAP ® gateways and middleware, each of which exposing their own vulnerabilities. There are back-ups, connection to the cloud, data encryption, social engineering factors, and the remote enablement of cameras and microphones to keep you awake at night. This is the age of BYOD (bring your own device), where employees, customers and vendors expect to use the mobile device of their choice to host applications and browsers that connect to company information systems. This brings enormous flexibility, and is hugely enabling for a highly mobile work-force. However, it does also bring enormous challenges in the sphere of information security. Ensuring company information security policy is adhered to across multiple devices, and geographically diverse locations, and ensuring that both PII (personally identifiable information), and sensitive company data are kept secure is a quantum headache. Devices that are easily portable, are easily lost and stolen. The same devices that hold PII and sensitive company data, also play host to social media, email, and internet enabled applications.