Two-Factor Authentication over Mobile: Simplifying Security and Authentication
|
|
|
- Hillary Butler
- 10 years ago
- Views:
Transcription
1 SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively
2 Table of Contents 4 Selecting the Key Factors for Two-Factor Authentication 5 Establishing Safeguards for Two-Factor Authentication 6 Enabling Security and Confidence with SMS-Generated Passcodes 7 Using Push Notifications as a Channel Smartphone Simple and More 8 Incorporating the Inherence Factor ABOUT THE AUTHOR William Dudley is group director and mobile evangelist of global strategy and solutions at SAP. He has almost 30 years of experience building and managing telecommunications network infrastructures. He defines global strategy and solutions for SAP Mobile Services, a division of SAP, within the mobile ecosystem, focusing on solutions for messaging, next-generation networks (LTE, IPX), and mobile consumer engagement. As mobile evangelist, Mr. Dudley communicates through both internal and external publications and is active in industry groups. 2 / 8
3 Two-factor authentication (2FA) is a means of controlling fraud and verifying end users. It can be implemented in a number of forms, by using software or hardware tokens or engaging through mobile devices. When implemented correctly especially when using mobile devices 2FA is a low-cost solution that is easy to implement, easy to use, and an effective deterrent to fraud thereby protecting both the end user and the enterprise. 3 / 8
4 Selecting the Key Factors for Two-Factor Authentication 2FA is a form of multifactor authentication. It requires at least two authentication factors, which may comprise: A knowledge factor something only the user knows, such as a password or personal identification number (PIN) A possession factor something only the user possesses, such as an ATM card, mobile device, or hardware token An inherence factor something unique to the user, such as a fingerprint or retina pattern 2FA is often used in situations where the user must be accurately identified. A common illustration is the ATM usage scenario. The user swipes an ATM card (something the user possesses) and then enters a secret PIN (something the user knows). Without both authentication factors working, the user can t withdraw cash from the ATM. For many years, to secure access to corporate or government systems and more, organizations around the world have relied on hardware tokens (something that you have) along with user IDs and passwords (something that you know). Recently, enterprises also have been able to make use of mobile devices as a common something that you have. Using mobile devices for 2FA opens up a variety of use cases that make it difficult for many hardware-based key fob devices to adequately compete. For example, many smartphone apps can generate 2FA PIN codes of varying lengths that replace the dedicated hardware token. Such apps use industry standard algorithms to generate PIN codes that synchronize with server-side applications and Web sites to enable a second authentication for end users. The goal of 2FA is to reduce instances of online fraud such as monetary theft or identity theft. While there are variations in the manner in which an individual can be authenticated (including the something that you are the inherence factor), the strength of 2FA lies in the strength of its implementation in particular, the strength of the two factors that are used to identify the individual. 2FA aims to reduce online fraud. Its strength lies in the strength of the two factors that are used to identify the individual. 4 / 8
5 Establishing Safeguards for Two-Factor Authentication When 2FA is deployed in a mobile ecosystem, safeguards must be in place to allow 2FA implementations to function securely and at all. Safeguards may include: Providing the second authentication factor through SMS messaging Using a dedicated application to generate the second authentication Employing biometric sensors on the mobile device Delivering tokens through some other channel such as push notifications Each of these safeguards must be considered in light of the security offered, benefits obtained, ease of use, and ease of implementation. TWO-FACTOR AUTHENTICATION OVER SMS A popular way to deliver one-time passcodes or 2FA authentication tokens (PINs, alphanumeric codes, and so on) is to send the token to a registered mobile device in a text message. With growing digital transformation, social networks, digital commerce, and financial institutions often use 2FA for resetting passwords, authorizing users, and validating transactions. Delivery of 2FA tokens over SMS typically is reliable and quick and uses a medium that virtually every mobile device can support. As a delivery channel for 2FA tokens, SMS is easy to implement and easy for the end user to employ. Today, most mobile users have received some sort of 2FA code over SMS. It s a very popular means of providing a second authentication method. While software alternatives to 2FA over SMS are common, they usually rely on the user having a smartphone and downloading an app. In contrast, SMS is available to all mobile devices smartphone or not and in all regions. Enterprises looking to implement 2FA with mobile devices should consider SMS as their first choice. Typically implemented using simple application programming interface calls, SMS can deliver a passcode that is already generated or, better yet, it both generates and delivers the message and then authenticates the code entered by the end user. Additionally, SMS can integrate easily into existing workflows. In a mobile ecosystem, safeguards must be in place to allow 2FA implementations to function securely. 5 / 8
6 Enabling Security and Confidence with SMS-Generated Passcodes While SMS is not inherently encrypted as the messages are transmitted over mobile networks, it s still a high-security solution. 2FA tokens generally have a short expiration time usually no more than a few minutes. Further, there are limits as to how many times a user may try to enter a received code before being locked out of an application for a specific period of time. While no scheme is 100% secure, 2FA over SMS works because, in virtually all situations, it provides enough security and confidence to protect both enterprises and end users from fraud. The figure depicts sample SMSgenerated codes received on mobile devices. routing for 2FA traffic run the risk of their messages being delayed or blocked entirely (for example, leveraging the so-called grey routes for SMS). Figure: SMS-Generated One-Time Passcodes Supporting Two-Factor Authentication When SMS is used, the delivery provider should make use of as many direct mobile operator connections as possible, using all high-quality routes, since many of these 2FA tokens have short expiration times. It is imperative that these SMS messages comply with all regulations and best practices for the country for which they are intended. Service providers that offer lower-cost or least-cost TYPICAL USE CASES FOR TWO-FACTOR AUTHENTICATION OVER SMS Employing two-factor authentication (2FA) over SMS enables a number of use cases that support greater security and confidence for your enterprise. For example, 2FA over SMS allows you to: Automate mobile devices while managing unrecognized IP addresses Enable secure logins by requiring users to input an additional code sent to their mobile devices Confirm user registration while using verification codes to validate mobile devices Enable more secure e-commerce transactions by validating a transaction with a code sent to the mobile device Reset an end-user password by sending a one-time passcode to the user s mobile device Validate money transfers using one-time passcodes to confirm secure transactions Support marketing or couponing engagement by sending codes to mobile devices, so users can enter codes to obtain on-site savings 6 / 8
7 Using Push Notifications as a Channel Smartphone Simple and More 2FA over SMS isn t the only route that 2FA tokens generated in the cloud (or server side) can use to reach smartphones. They may also be pushed to devices over direct IP links using various mechanisms called push notifications, which are typically specific to the mobile operating system. When push notifications are used, the enterprise or app builder incorporates specific functionality within the mobile app through integration of software development kits (SDKs). Using SDKs, messages sent through the IP connections of a device can be displayed within the app as well as within the notification panels of mobile devices. Both displays are commonly used in Android and Apple ios devices. 2FA push notifications act very similarly to 2FA over SMS in the sense that the 2FA token is generated on the server side and then transferred to the mobile device. But with 2FA push notifications, instead of using SMS, the data is delivered directly to the mobile app. There are some limitations that should be noted with 2FA push notifications especially Android or native ios push notifications. Some native push messages can time out or be blocked by Wi-Fi firewalls, and some servers stagger deliveries, which can affect delivery time which is paramount for 2FA tokens. That noted, there are now implementations of push notifications such as the SAP Intelligent Notification 365 mobile service that overcome these limitations, making push a strong channel for 2FA token delivery. Push notifications work when there is already an enterprise or commerce app that can be leveraged for the purpose of displaying the 2FA tokens. Additionally, this channel is good for markets where most subscribers using the service are also using the mobile app even if they are engaging through the mobile app. These types of situations are perfect gateways to use a different second factor of authentication the something you are. Delivery of 2FA tokens over SMS typically is reliable and quick and uses a medium that virtually every mobile device can support. 7 / 8
8 Incorporating the Inherence Factor INCORPORATING THE INHERENCE FACTOR For in-app authentication, sometimes pushing or generating 2FA codes does not meet the criteria for true two-factor authentication. Instead, we must leverage characteristics about the users themselves the inherence factor, or the something they are. This authentication factor includes fingerprint sensors, retina scans, and other biometrics. For example, some mobile apps with high-value content such as financial information ask for a user ID and password (something you know or have) and then require a fingerprint scan (something you are). This type of authentication is still only limited to smartphones; however, with today s penetration of smartphones in most markets, it may eventually supersede other forms of second-factor authentications. SUMMARY The usage of a second authentication factor should always be considered as a means of protecting the interests of end users when engaging in the digital world over mobile devices. One of the first considerations should always be that the second authentication factor includes a mobile device something virtually everyone today has. For simplicity s sake, nothing really comes close to delivery of 2FA tokens over SMS. Unless you have specific requirements, 2FA over SMS can support many, many use cases. As authentication requirements become more sophisticated, the inclusion of push notifications and even biometrics through mobile devices should also be considered as strong alternatives to stand-alone hardware tokens and, in many cases, dedicated software-token generators. LEARN MORE SAP Mobile Services, a division of SAP, enables enterprises to aggregate messages globally and reliably. The SAP Authentication 365 mobile service is an end-to-end, portable, and configurable two-factor authentication (2FA) solution for multiple channels that include SMS, push notifications (such as the SAP Intelligent Notification 365 mobile service), and more. The SAP Authentication 365 mobile service is an authentication service add-on for SAP SMS 365, enterprise service. The mobile service provides: Integrated connectivity to SAP SMS 365, enterprise service, reaching almost 980 mobile networks through a single, standard interface Accurate and fast message routing, utilizing our advanced number resolution system to correctly identify the destination mobile network operator High-priority messaging delivery solutions that help ensure fast delivery of 2FA and one-time passcode (OTP) messages High-quality, approved routes for reliable delivery of all messaging, including 2FA and OTP messages Multiple configurability options for 2FA tokens, as well as a comprehensive administrative and analytics user interface Simple application programming interfaces for easy integration of 2FA capabilities into existing workflows 8 / (15/10) 2015 SAP SE or an SAP affiliate company. All rights reserved
9 No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. Please see for additional trademark information and notices. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE s or its affiliated companies strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions.
Two-Factor Authentication: Tailor-Made for SMS
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication: Tailor-Made for SMS Exploring Myths, Misconceptions, and Best Practices for SMS-Based 2FA Table of Contents 4 Understanding Two-Factor
Protect Your Customers and Brands with Multichannel Two-Factor Authentication
SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting
R49 Using SAP Payment Engine for payment transactions. Process Diagram
R49 Using SAP Payment Engine for payment transactions Process Diagram Purpose, Benefits, and Key Process Steps Purpose The purpose of this scenario is to show you how to check the result of payment orders
A Review of Mobile Messaging Use Cases
SAP Thought Leadership Paper SAP Mobile Services A Review of Mobile Messaging Use Cases Guidelines for Today s Ever-Changing Messaging Ecosystem Table of Contents 4 Introduction 5 Validation and Two-Factor
GR5 Access Request. Process Diagram
GR5 Access Request Process Diagram Purpose, Benefits, and Key Process Steps Purpose This scenario uses business roles to show a new user access provisioning and also demo using simplified access request
SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015
SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
Price and Revenue Management - Manual Price Changes. SAP Best Practices for Retail
Price and Revenue Management - Manual Price Changes SAP Best Practices for Retail Purpose, Benefits, and Key Process Steps Purpose For the creation of manual price changes via the Price Planning Workbench,
SAP Solution Manager: The IT Solution from SAP for IT Service Management and More
SAP Solution Manager SAP Solution Manager: The IT Solution from SAP for IT Service Management and More Table of Contents 2 SAP Solution Manager A Fully Scalable IT Platform 3 Supporting 15 Certified ITIL
Deliver Secure, User-Friendly Access to Mobile Business Apps
SAP Brief Extensions SAP Mobile App Protection by Mocana Objectives Deliver Secure, User-Friendly Access to Mobile Business Apps Promote app security for enterprise safety Promote app security for enterprise
SAP Document Center. May 2016. Public
SAP Document Center May 2016 Public The Big Picture for a Digital Platform Applications Applications IoT IoT Platform (Micro-) Services Extensions Icon Digital Boardroom Analytical Applications S/4HANA
Simplify and Secure Cloud Access to Critical Business Data
SAP Brief SAP Technology SAP Cloud Identity Objectives Simplify and Secure Cloud Access to Critical Business Data Gain simplicity and security in a single cloud solution Gain simplicity and security in
SAP Mobile Documents. December, 2015
SAP Mobile Documents December, 2015 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your
Partner Certification to Operate SAP Solutions and SAP Software Environments
SAP Information Sheet SAP Partner Innovation Lifecycle Services SAP Certification for Outsourcing Operations Partners Quick Facts Partner Certification to Operate SAP Solutions and SAP Software Environments
Mobile app for Android Version 1.2.x, December 2015
Mobile app for Android Version 1.2.x, December 2015 Introduction This app allows you to access SAP Business One, SAP s enterprise resource planning application for small businesses, anywhere and anytime.
Your Intelligent POS Solution: User-Friendly with Expert Analysis
Overview SAP Customer Checkout with SAP Business One Challenges Your Intelligent POS : User-Friendly with Expert Analysis Central Overview of Sales Data Central Overview of Sales Data Cash and card payments,
Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue
SAP Brief SAP Mobile Services SAP SMS Firewall 365 Objectives Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue Cloud-based managed service helps control messaging abuse Cloud-based
Mobile app for ios Version 1.10.x, August 2014
Mobile app for ios Version 1.10.x, August 2014 Introduction This app allows you to access SAP Business One, SAP s enterprise resource planning application for small businesses, anywhere and anytime. Managers,
K75 SAP Payment Engine for Credit transfer (SWIFT & SEPA) Process Diagram
K75 SAP Payment Engine for Credit transfer (SWIFT & SEPA) Process Diagram Purpose, Benefits, and Key Process Steps Purpose The purpose of this scenario is to describe and / or support testing of the entire
K88 - Additional Business Operations for Loans. Process Diagram
K88 - Additional Business Operations for Loans Process Diagram K88 Additional Business Operations for Loans Payment Plan Change SAP UI/ A Financial Services ->Account Management -> Periodic Tasks -> Communication
SAP Business One mobile app for Android Version 1.0.x November 2013
SAP Business One mobile app for Android Version 1.0.x November 2013 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission
Multi Channel Sales Order Management: Mail Order. SAP Best Practices for Retail
Multi Channel Sales Order Management: Mail Order SAP Best Practices for Retail Purpose, Benefits, and Key Process Steps Purpose Multi Channel Sales Order Management: Mail Order describes a Business-to-Consumer
Mobile app for Android Version 1.0.x, January 2014
Mobile app for Android Version 1.0.x, January 2014 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP. This
Mobile app for ios Version 1.11.x, December 2015
Mobile app for ios Version 1.11.x, December 2015 Introduction This app allows you to access SAP Business One, SAP s enterprise resource planning application for small businesses, anywhere and anytime.
SuccessFactors Global Human Capital Management (HCM) Academy and Admin Training Schedule (Q3 Q4 2014)
SuccessFactors Global Human Capital Management (HCM) Academy and Admin Training Schedule (Q3 Q4 2014) The SuccessFactors Global HCM Training Schedule makes it easier to locate and enroll in the training
Cost-Effective Data Management and a Simplified Data Warehouse
SAP Information Sheet SAP Technology SAP HANA Dynamic Tiering Quick Facts Cost-Effective Data Management and a Simplified Data Warehouse Quick Facts Summary The SAP HANA dynamic tiering option helps application
Integration capabilities of SAP S/4HANA to SAP Cloud Solutions
Document Version: 1.00 2015-08-10 Integration capabilities of SAP S/4HANA to SAP Cloud Solutions What you need to know when it comes to S/4HANA Integration Javit Gellaw (SAP SE) Table of Contents 1 INTRODUCTION
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Streamline End-to-End Payment Processes on a Central Platform
SAP Brief SAP for Banking SAP Payment Engine Objectives Streamline End-to-End Payment Processes on a Central Platform Extend and simplify payment processes Extend and simplify payment processes Financial
SAP Mobile Services Enterprise Knowledgebase Overview and Access Guide
SAP Mobile Services Enterprise Knowledgebase Overview and Access Guide TABLE OF CONTENTS INTRODUCTION... 3 Enterprise Knowledgebase... 3 SAP Mobile Services Community... 3 Feedback... 3 ACCESSING THE ENTERPRIS
Setting up Visual Enterprise Integration (WM6)
SAP Mobile Platform 3.0 June 2015 English Setting up Visual Enterprise Integration (WM6) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2015 SAP SE or
Elevate Your Customer Engagement Strategy with Cloud Services
SAP Brief SAP Services Cloud Services for Customer Relations Objectives Elevate Your Customer Engagement Strategy with Cloud Services Win over today s empowered customers Win over today s empowered customers
Reduce Costs and Improve Materials Management with Mobile Technology
SAP Brief SAP Enterprise Asset Management SAP Inventory Manager for Maximo Objectives Reduce Costs and Improve Materials Management with Mobile Technology Streamline inventory processes for better asset
Drive Retail Sales and Enhance Loyalty by Streamlining Your Contact Center
SAP Brief SAP Customer Relationship Management SAP Contact Center Objectives Drive Retail Sales and Enhance Loyalty by Streamlining Your Contact Center Create a better retail experience across multiple
SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features
SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features Dirk Olderdissen Solution Expert, Regional Presales EMEA SAP Brought to you by the Customer Experience Group 2014 SAP
PSM-PPM Integration SAP Product Structure Management
PSM-PPM Integration SAP Product Structure Management A PLM Consulting Solution PSM PPM Integration The PLM Consulting Solution PSM-PPM Integration integrates the display and management of PPM objects (e.g.:
Citrix Receiver. Configuration and User Guide. For Macintosh Users
Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
Powering Content-Rich Customer Success Centers for Omnichannel Support
SAP Brief SAP Extensions SAP Knowledge Central by MindTouch Objectives Powering Content-Rich Customer Success Centers for Omnichannel Support Deliver knowledge when and where it s needed Deliver knowledge
Effortless Customer Service with SAP Cloud for Service
SAP Brief SAP CRM SAP Cloud for Service Objectives Effortless Customer Service with SAP Cloud for Service Discerning customers require expert service attention Discerning customers require expert service
EMC: Managing Data Growth with SAP HANA and the Near-Line Storage Capabilities of SAP IQ
2015 SAP SE or an SAP affiliate company. All rights reserved. EMC: Managing Data Growth with SAP HANA and the Near-Line Storage Capabilities of SAP IQ Based on years of successfully helping businesses
How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer
How-To Guide Document Version: 1411 2014.12.15 How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer How to configure an example SAP Cloud Applications Studio
Two UX Solutions Now Included with SAP Software
Frequently Asked Questions User Experience Two UX Solutions Now Included with SAP Software SAP offers two solutions that greatly improve the user experience (UX): the SAP Fiori user experience and SAP
Streamline Processes and Gain Business Insights in the Cloud
SAP Brief SAP s for Small Businesses and Midsize Companies SAP Business One Cloud Objectives Streamline Processes and Gain Business Insights in the Cloud Drive profitable growth affordably and without
Use Your Contact Center to Build a Better Customer Experience
SAP Brief SAP Customer Relationship Management SAP Contact Center Objectives Use Your Contact Center to Build a Better Customer Experience Engage your customers across all points of contact Engage your
FA7 - Time Management: Attendances/Absences/Overtime/Hajj Leave. Process Diagram
FA7 - Time Management: Attendances/Absences/Overtime/Hajj Leave Process iagram SAP ERP + RENEWAL Process Non-SAP Employee SAP ERP + RENEWAL (Personnel Administration) Organizational Management FA7 - Time
Help Users Rapidly Adopt New Technology for a Faster Return on Investment
SAP Brief SAP Education SAP Learning Hub Objectives Help Users Rapidly Adopt New Technology for a Faster Return on Investment Encourage rapid adoption through effective user enablement Encourage rapid
Integration Capabilities of SAP S/4HANA to SAP Cloud Solutions
Document Version: 1.00 2016-03-01 Integration Capabilities of SAP S/4HANA to SAP Cloud Solutions What you need to know when it comes to SAP S/4HANA integration Javit Gellaw (SAP SE) Table of Contents 1
Run Better in Weeks to Address Current and Future Business Needs
SAP Brief SAP Rapid Deployment s Objectives Run Better in Weeks to Address Current and Future Business Needs Accelerate your time to value Accelerate your time to value Meeting core business objectives
Streamline HR Tasks with Centralized Document Access
SAP Brief SAP ERP Human Capital Management and SuccessFactors Talent Management Suite SAP Employee File Management by OpenText Objectives Streamline HR Tasks with Centralized Document Access A complete
Find New Customers and Markets by Analyzing Mobile Network Operator Data
SAP Brief SAP Mobile Services SAP Consumer Insight 365 Objectives Find New Customers and Markets by Analyzing Mobile Network Operator Data Mobile data a paradigm shift in connected consumer analytics Mobile
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
TAKISADA-OSAKA: Facilitating Sales, Speeding Delivery, and Improving Service with SAP Mobile Platform
TAKISADA-OSAKA: Facilitating Sales, Speeding Delivery, and Improving Service with SAP Mobile Platform One of Japan s leading textile wholesale distributors, TAKISADA-OSAKA CO., LTD. has been expanding
Securing Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
Sun Communities: Reducing Manual Processes for New Hires by 97% Using SuccessFactors Onboarding
2015 SAP SE or an SAP affiliate company. All rights reserved. Sun Communities: Reducing Manual Processes for New Hires by 97% Using SuccessFactors Onboarding From coast to coast, Sun Communities offers
Automotive Consulting Solution. CHEP - EDI- Container Data
Automotive Consulting Solution CHEP - EDI- Container Data Agenda 1. Benefit for the Customer 2. Description of the Function 3. The Function in the System 4. Technical Information 2 Customer Benefit Solution
Adopt New SAP Software and Technology Early and Win
SAP Brief SAP Service and Support SAP Early Adopter Care Objectives Adopt New SAP Software and Technology Early and Win Get a head start on innovation Get a head start on innovation Success in today s
Reimagining Business with SAP HANA Cloud Platform for the Internet of Things
SAP Brief SAP HANA SAP HANA Cloud Platform for the Internet of Things Objectives Reimagining Business with SAP HANA Cloud Platform for the Internet of Things Connect, transform, and reimagine Connect,
In-Store Merchandise and Inventory Management. SAP Best Practices for Retail
In-Store Merchandise and Inventory Management SAP Best Practices for Retail Purpose, Benefits, and Key Process Steps Purpose These components of the SAPECC Retail System are used in the store. Together
Business-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
SAP-Managed Migration to SAP Business Suite powered by SAP HANA in the Cloud
SAP Services SAP-Managed Migration to SAP Business Suite powered by SAP HANA in the Cloud Table of Contents 6 Introducing the Discovery Package 8 Introducing the Live Migration Packages 10 Realize the
Integrated solution for subsidiaries, suppliers and franchises powered by SAP HANA
Integrated solution for subsidiaries, suppliers and franchises powered by SAP HANA Csaba Balázs Channel Enablement & Solution Expert SAP Business One SAP Global SME Business Unit 21.Oct.2014 Public What
Get Growing with the Starter Package for SAP Business One
SAP Brief SAP s for Small Businesses and Midsize Companies Objectives Get Growing with the Starter Package for Start quickly and maintain momentum as your business grows Start quickly and maintain momentum
Automate Complex Pay Rules While Streamlining Time and Attendance Management
SAP Brief SAP Extensions SAP Time and Attendance Management by WorkForce Software Objectives Automate Complex Pay Rules While Streamlining Time and Attendance Management Gaining real-time insights to help
Integrated Finance, Risk, and Profitability Management for Insurance
SAP Brief SAP for Insurance SAP Cost and Revenue Allocation for Financial Products Objectives Integrated Finance, Risk, and Profitability Management for Insurance Gain deep business insights Gain deep
Empowering Teams and Departments with Agile Visualizations
SAP Brief SAP Lumira, Edge Edition Objectives Empowering Teams and Departments with Agile Visualizations A data visualization solution for teams and departments A data visualization solution for teams
Visualization Starter Pack from SAP Overview Enabling Self-Service Data Exploration and Visualization
Business Intelligence Visualization Starter Pack from SAP Overview Enabling Self-Service Data Exploration and Visualization In today s environment, almost every corporation has to work with enormous data
Engage Customers with Service Excellence
SAP Brief SAP Customer Relationship Management Customer Service s Objectives Engage Customers with Service Excellence It s time to rethink customer service It s time to rethink customer service Today s
Downport to SAP GUI for documents Access Control Management
Access Control Management A PLM Consulting Solution Public The PLM Consulting Solution Downport to SAP GUI for documents streamlines the process of managing project authorizations based on SAP PLM 7 Access
SFSF EC to 3 rd party payroll Integration Software and Delivery Requirements
SAP HCI(PI) August 2015 English SFSF EC to 3 rd party payroll Integration Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 November 2014
Build Better Social Relationships and Realize Better Results
SAP Brief Adobe Marketing s from SAP Adobe Social from SAP Objectives Build Better Social Relationships and Realize Better Results Develop relationships that work for you and your customers Develop relationships
Complementary Demo Guide
Complementary Demo Guide Lockbox Payment Process SAP Business ByDesign SAP Business ByDesign Global August 15, 2014 SAP Cloud Reference Systems Table of Content 1 About this Document... 3 1.1 Purpose...
Learning Without Limits
SAP Brief SAP Education SAP Learning Hub, Professional Edition Objectives Learning Without Limits Maximize the value of SAP software Maximize the value of SAP software The more you or your organization
Protect Your Connected Business Systems by Identifying and Analyzing Threats
SAP Brief SAP Technology SAP Enterprise Threat Detection Objectives Protect Your Connected Business Systems by Identifying and Analyzing Threats Prevent security breaches Prevent security breaches Are
Why Cloud Platforms are the Secret Weapon to Make Your Business More Agile and Competitive
Why Cloud Platforms are the Secret Weapon to Make Your Business More Agile and Competitive Matthias Steiner, SAP SE @steinermatt May, 2015 Use this title slide only with an image Disclaimer This presentation
SRCH2 Solution Brief SRCH2 Solutions for Device Information Management. Powerful Mobile Collaboration and Device Management with SRCH2
SRCH2 Solution Brief SRCH2 Solutions for Device Information Management Objectives Solution Powerful Mobile Collaboration and Device Management with SRCH2 Benefits Quick Facts Turn Mobile into an opportunity,
Keep Enterprise Assets Productive with Effective Master Data Governance
SAP Brief SAP s for Enterprise Information Management SAP Master Data Governance, Enterprise Asset Management Extension by Utopia Objectives Keep Enterprise Assets Productive with Effective Master Data
Accelerate Time to Value and Innovation Through Complete Contract Management
SAP Brief Ariba s Ariba Contract Management Objectives Accelerate Time to Value and Innovation Through Complete Contract Management Objectives Drive spend compliance across all contract types Drive spend
Software and Delivery Requirements
SAP HANA Big Data Intelligence rapiddeployment solution November 2014 English SAP HANA Big Data Intelligence rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190
How to Deliver a Coordinated Customer Experience across Every Channel
E-Book NO. 83 How to Deliver a Coordinated Customer Experience across Every Channel SAP Center for Business Insight Brief Q&A Case Study Inquiry E-Book You Can t Kill Silos Organizational silos are like
ACHIEVE DIGITAL TRANSFORMATION WITH SALES AND SERVICE SOLUTIONS
SAP Hybris Solution Overview: SAP Hybris Cloud for Customer ACHIEVE DIGITAL TRANSFORMATION WITH SALES AND SERVICE SOLUTIONS The Digital customer requires companies to be one step ahead of them, be better
Speed Business and Delight Customers with Signature Management
SAP Brief SAP Extensions SAP Signature Management by DocuSign Objectives Speed Business and Delight Customers with Signature Management Taking transactions to the cloud for speed and transparency Taking
Remote Connectivity Infrastructure
Remote Connectivity Infrastructure SAP Active Global Support & Maintenance Go-to-Market November 2014 Public Remote Connectivity Infrastructure Table of Contents Introduction General Architecture SAProuter
Driving Customer Value leveraging SAP s strategy for the Internet of Things Internet of Things Technology Forum Frankfurt
Driving Customer Value leveraging SAP s strategy for the Internet of Things Internet of Things Technology Forum Frankfurt Sindhu Gangadharan VP & Head of Product Management SAP HCI, PI & FSN Personalized
SAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate
Streamline Accounts Payable Processes with Cloud-Based Electronic Invoicing
SAP Brief Ariba s Cloud-Based Financial s Ariba Invoice Management Objectives Streamline Accounts Payable Processes with Cloud-Based Electronic Invoicing Achieve touchless invoice processing on a global
Simplify Field Service Management with SAP Solutions
SAP Solution in Detail SAP Service and Support Field Service Management Solutions Simplify Field Service Management with SAP Solutions Table of Contents 3 Quick Facts 4 Resolve Service Issues While Developing
Deliver Community-Powered Commerce to Optimize Revenue
SAP Brief SAP Jam SAP Jam Communities Objectives Deliver Community-Powered Commerce to Optimize Revenue Drive revenue with community content optimized for commerce Drive revenue with community content
SAP Learning Hub: Your Competitive Advantage for a Career in SAP Solutions
Frequently Asked Questions SAP Learning Hub, Student Edition SAP Learning Hub: Your Competitive Advantage for a Career in SAP Solutions SAP edition, offers a range of educational content tailored to the
HealthWyse: Meeting the Financial, Clinical, Analytical, and Reporting Needs of Home Care Agencies
HealthWyse: Meeting the Financial, Clinical, Analytical, and Reporting Needs of Home Care Agencies HealthWyse Inc. Industry High tech electronic medical record software Products and Services Integrated
An End-to-End Population Health Management for High Risk Patients
Summary Supporting Facts and Figures SAP HANA Solution Overview A fully integrated mobile in-home health infrastructure and data analytics solution for population health management An End-to-End Population
SAP Audit Management A Preview
SAP Audit Management A Preview SAP AG November 2013 Customer 1 Agenda Business Challenges The Idea The Solution Roadmap Demo 2013 SAP AG. All rights reserved. Customer 2 Disclaimer The information in this
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Software and Delivery Requirements
SuccessFactors Recruiting April 2015 English SuccessFactors Recruiting rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2015 SAP
Improve Field Service Performance with Augmented Reality Software and Smart Glasses
SAP Brief SAP Enterprise Asset Management SAP AR Service Technician Objectives Improve Field Service Performance with Augmented Reality Software and Smart Glasses Reduce workers reliance on cumbersome
Add Location Intelligence and Analytics into Your BI, Dashboard, and Mobile Apps
SAP Brief Extensions SAP BusinessObjects BI Location Intelligence by Galigeo Objectives Add Location Intelligence and Analytics into Your BI, Dashboard, and Mobile Apps Location intelligence for geospatial
