Intelligent driven Security at SAP Good Practice Maximilian Adrian IT Security & Risk Office, SAP AG. July 2013

Similar documents
Empowering Partners to Run Better. Ecosystem and Channels Authorized Reseller Program

SAP NetWeaver Gateway Throughput & Scalability. David Freidlin

SAP NetWeaver Decision Service Management in SAP CRM for Utilities

Getting Started with Scope and Effort Analyzer (SEA) ALM Solution Management, AGS, SAP AG

Update on the SAP GUI Family Q3/2012

An Overview of the SAP Business One Cloud Landscape. SAP Business One Cloud Landscape Workshop

SAP Enterprise Master Data Management - Licensing Agreements and Recommendations

Building a multi-source universe

How To Install The Sap Business Explorer 7.X 2.X (Sap) On A Windows 7.30 Computer (Windows 7)

Upgrading SAP Public Budget Formulation (PBF) PBF Development Team October 2012

SAP CRM on HANA HANA Limited Runtime SAP 360 Customer. December 19 th, 2012

Virtual Causeway Inbound Lead Engine SME (6 Month) Premium Package

Virtual Causeway Try Before You Buy, Inbound/Outbound Canada Premium Package

Mobility in the Mining Industry. Why? How? What? Stefan Soeller, SAP IBU Mill Products & Mining. Mobility. Mining. IS-Mine

ITSCM at SAP Best practices

Backup Strategy for Oracle

Capital Project and Portfolio Management

Sizing and Deployment of the SAP Business One Cloud Landscape. SAP Business One Cloud Landscape Workshop

Innovation Summit Philadelphia, July 12 th 13 th User Experience

SAP's Journey of Implementing SAP Disclosure Management and Notes Management Session 2002

SAP Road Map for SAP NetWeaver Single Sign-On

Demand Planning. SAP Business ByDesign

Building your SAP Business One Cloud Landscape. SAP Business One Cloud Landscape Workshop

Setting up the Environment for Creating or Extending SAP Fiori Apps

SAP BusinessObjects Dashboards Influence Session. Scott Leaver Solution Management François Imberton Product Management

ILM Meets HANA Flexible, Holistic and Fast Reporting. Georg Fischer, Ken Campbell Solution Management - Information Lifecycle Management May 2012

Growing pressures that are here to stay

Overview of integrated business planning with SAP Planning and Consolidation. Isabel Wichmann, Presales Specialist, SAP September 2012

Job Scheduling Management Integration with SAP CPS by Redwood SAP Solution Manager 7.1. SAP AG August, 2011

Supply Chain Summit Transportation Deep Dive. Bill King, SAP Solutions Management Bjorn Bernard, GOPA-IT

SAP Transportation Management

SAP Master Data Governance for Financials: What's New with SAP ERP 6.0 Enhancement Package 4 and 5

SAP BI Visualization Showcase 2013 Edition - External Prepared by Terry Penner

SAP Sourcing / Contract Lifecycle Mgmt Mail Configurations. April 2013 Vikram Shanmugasundaram, SAP Sourcing/CLM Center of Excellence

HCM Core Renovation Overview SAP HCM Renewal 1.0

Settlement in TM 9.0 New functionalities with TM 9.0. Ananth Bhat SAP Development, Transportation & Logistics December 2012

Physical Inventory Management. SAP Business ByDesign

SAP's Supply Chain Execution Strategy & Roadmap. Transportation & Logistics Development, SAP AG January, 2013

Setup Guide for Business Process Operations Dashboards SAP Solution Manager 7.1. SAP AG August, 2011

SAP NetWeaver Identity Management Compliant provisioning using SAP Access Control Architectural overview

The Future of Business Planning: Trends, Möglichkeiten & Ausblick

Customization of SAP Sales Manager 2.5

Auto-Servicio de data discovery con SAP LUMIRA. David Pérez, Senior Solution Specialist SAP Analytics

SAP Fiori. Overview of SSL + SAML 2.0 Configuration

Working in a ubiquitous computing environment

Desktop Intelligence Compatibility Pack. Thomas B Kuruvilla Solution Management Business Intelligence September, 2013

The SME is Shifting Gear to Innovation with SAP

SAP HANA Security Overview Session Andrea Kristen, Holger Mack, SAP ASUG Annual Conference 2013

ILM Meets SAP HANA Ausblick auf flexibles, umfassendes und schnelles Reporting. Axel Herbst, Frank Rust Feb 2012

Desktop Connection for SAP CRM Professional Edition 2.0 SP01. April 2014

SAP Database Administration for Oracle

SAP Enterprise Portal 6.0 KM Platform Delta Features

How To Configure SFTP Adapter in SAP PI

SAP NetWeaver Landscape. Jeff Anders/Solution Management January 2012

Michael Collet 28th January 2005, Frankfurt, GI -Fachgruppe SECMGT

Management and Monitoring of a J2EE Server and Applications Using JMX. Reinhold Kautzleben, Gregor Frey Speaker Title, SAP AG

Road map for Documentation and Implementation in SAP Solution Manager

mysap Supply Chain Management Solution Map Release 2005

SAP Sourcing/CLM Webcast Series SAP SRM Integrated Business Process. November 2013 Ed Dunne, SAP Sourcing/CLM Product Management

Setting an Enterprise Content Management Strategy. John Fiske, SAP ECM Solution Management

Application Map Release 2005

Closed-Loop Engineering Integrated Product Development at a Vehicle Manufacturer

Disaster Recovery for Oracle

Multiple Components in One Database -

Leveraging Utilibill. Tim Vanderheide Bluewater Power V.P. Client Services

Top 10. Top 10 Reasons Small and Midsize Enterprises (SMEs) Choose SAP to Help Transform their Business

Migration to SAP Sales Manager 2.5 from CRM Sales Mobile 2.0.x/2.1.x

SAP NetWeaver Business Warehouse powered by SAP HANA Deep Dive. Rainer Uhle Brian Wood

IT Service Management Configuration Part 1. ALM Solution Management May, 2012

User Experience in Custom Apps

Budget Control by Cost Center

Split Mirror Disk Backup for Oracle

SAP Road Map for Governance, Risk, and Compliance Solutions

BR*Tools to Back Up the Oracle Database

How To Develop In Java (J2Ee) And J2Ee (Sap) Together (Sapp)

SAPFIN. Overview of SAP ERP Financials COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

Application Lifecycle Management

" # Portal Integration SAP AG 2004, 3

SAP Configure, Price, and Quote (SAP CPQ) and hybris B2B Commerce Overview, Roadmap and Future Direction. Duane Moore, SAP March 2014

SAP NetWeaver How-To Guide How-To Transport Gateway services to Newer Trial Version

How can Customer COEs influence SAP Development Introduction Customer Connection Program March 12, 2013

HR400 SAP ERP HCM Payroll Configuration

Run SAP like a Factory

Start Your Journey Into the Cloud with SAP HANA Cloud SAP PartnerEdge program for Application Development July, 2013

Sabine Reich SAP. Test Workbench - Introduction

Enterprise Software - Applications, Technologies and Programming

Introducing the SAP Business One starter package. A Great Start to help you to Streamline Your Small Business

USDL XG WP3 SAP use case. Kay Kadner

Highlights, Holes in and Hopes for the "Multilingual Web" Jan Nelson, Microsoft; Christian Lieske, SAP AG Felix Sasaki, DFKI; Richard Ishida, W3C

Rapid Planning with MRP on HANA SAP Manufacturing. Frank Platt Senior Director SAP LoB Manufacturing April 2014

The Way to New ERP Horizons

SAP Sybase IQ 16 Unstructured Data Analytics Option Technical Overview. Andrew Neugebauer/Analytics Product Management March 08, 2013

EDW Positioning Based on the SAP Real-Time Data Platform. July, 2013

Fixed Asset in SAP Business One 9.0

AC200. Basics of Customizing for Financial Accounting: General Ledger, Accounts Receivable, Accounts Payable COURSE OUTLINE

SAP Business ByDesign Reference Systems. Scenario Outline. SAP ERP Integration Scenarios

HANA Operations for Outsourcing Providers. SAP Ecosystem & Channels, SAP Hosting Certifications November 7, 2013

Intelligent Business Operations Chapter 1: Overview & Strategy

Transcription:

Intelligent driven Security at SAP Good Practice Maximilian Adrian IT Security & Risk Office, SAP AG July 2013

Agenda 1. Introduction 2. SAP IT Security & Risk Office 3. IT Security Approach@SAP 2013 SAP AG. All rights reserved. Customer 2

2. IT Security & Risk Office History/Organization/Relationships

SAP a global company... Our focus area... IT Security for... ONE Global Network > 70 countries, > 220 subsidiaries...connecting 72.267 end-user 95.000 PCs/laptops 8.500 SAP systems >30.000 server mobile devices: 16.000 Blackberries, 19.000 ipads, 20.000 iphones 3.500 Androids 5.000 BYOD a highly centralized segment of core business systems (incl. ERP, HR, CRM, BW) 2013 SAP AG. All rights reserved. Customer 4

SAP Global IT Global Coverage & Site Leads CET -9h -6h -3h -1h 0h +5,5h +7h +8h Vancouver Dublin (Service Desk) Paris Walldorf (HQ & Regional Key Hub) Palo Alto Mexico City (Offshore hub) Newtown Square (Regional Key Hub) Ra anana Bangalore (Offshore hub) Singapore (Regional Key Hub) Shanghai (Service Desk) Headquarters Regional Key Hub Offshore Location Location > 20 FTE Buenos Aires (Service Desk) 19 Global IT Site Leads represent every Global IT location (HC>10) in a Site Lead network to foster team spirit and improve cross-team communication. 2013 SAP AG. All rights reserved. Customer 5

SAP Global IT and IT Security & Risk Office Organization overview CIO CIO Office Business Business Business Information Information Officers Officers Officers Officers IT Application Services IT Infrastructure Services IT Enterprise Architecture IT Management Office IT Security & Risk Office R. Salomon Assistant Business Business IT Information Information Security Officers Officers Officers Representative IT Risk & Quality Management, Audits M. Adrian IT Security Services Business ORG Units Regional ORG Units Regional Security Officer EMEA Regional Security Officer AMER Regional Security Officer APJ 2013 SAP AG. All rights reserved. Customer 6

SAP Global IT Security & Risk Office Where we come from Global IT Security, Quality, Risk & Process Approach 2005 2006 2007 2008 2009 2010 2011 2012 2013 Set-up global unified Security & Quality Mgmt. Realign IT processes Operation Support Project Support Process Definition IT Audits Achievements Develop and Implement an Integrated Information Security Mgmt. System Certificates ISO9001 (Corporate & Americas) ISO27001 (Corporate) New SoA on detailed risk level ISO27001 Certificate (Americas) Improved documentation Process Management added Integrated Risk- Control-Mapping Improved Process Map (AS) Initiate IT Process Efficiency Program Processes improved Internal Control System improved Initiate Process Efficiency Prg. Restructure/ Build Performance Measurement Expand IISMS on functional level State of the art BCM Requirements Establish IT Risk & Security Gov. across SAP Support Product Security Initiative Streamline operational Risk Mgmt. Restructure Team Re-focus IT Sec. Strategy Establish IT Sec. Monitoring Center Establish Digital Rights Mgmt. Service Establish federated Risk Mgmt. Increase Awareness ISO22301 Certificate (Corporate) Launch IT Sec. Strategy 2015 Establish Cross LoB IT Risk Mgmt. IT Security Award 2012 at it-sa Sec. relevant processes across SAP Finalize Network Admission Control Strengthen Vulnerability & Threat Mgmt. Ovum BYOX Strategy Award 2013 Global IT AS Process Landscape IT Security Framework cross SAP IT Security Strategy 2012 and 2013-2015 ISO 9001 certification (Global IT Corporate & Americas) ISO 27001 certification (Global IT Corporate & Americas) ISO 22301 (Global IT Corporate) first company in Germany SOX compliance of Global IT Strategic & Operational Risk Management Effective IT Security Governance Structure & Process Global Security Monitoring Center IT Security Award 2012 for Integrated Management System Ovum BYOX Strategy Award 2013 2013 BYOX Strategy award Achieve KonTraG / SOX compliance of Global IT Achieve adequate Security Implementation for main infrastructure, systems & applications Establish unique IT Security level across SAP IT Governance Tools Quality: ISO9001 Security: BS7799 / ISO27001 IT SCM: ISO22301 Service Management: ITIL / ISO20000 Overall Framework: COBIT, ISACA 2013 SAP AG. All rights reserved. Customer 7

Security House of Services IT Security & Risk Office Global IT SRO Vision - Mission - Goals Services IT Security Management Applications - Infrastructure - Interface Advisories Process Portfolio Management Concepts Project Support Research Vulnerabilities Reporting Process Design Security Monitoring Center CERT / CSIRT IT Security Governance Strategic Tactical Operational Certifications ISO 27001 ISO 9001 Audits SOX Compliance ISO 22301 ISO ISO 27001 ISO ISO 9001 Projects Processes SOX Compliance Supplier Pen.-testing Systems/Apps. IT Service Continuity Management Emergency Communication Service Recovery Plan IT Compliance Management Internal Control System Data Classification & Access Procedures Compliance Monitoring IT Risk Management Strategic Operational Vulnerabilities Quality IT Security Requirements Laws & Regulations Policies & Standards & Good Practices Management Framework [IISMS] 2013 SAP AG. All rights reserved. Customer 8

3. IT Security Approach@SAP

GRC 10.0 ARIS Tool Integrated Information Security Management System Laws & Regulations Standards & Best Practices for Global IT Global IT Integrated Information Security Management System [IISMS] Supporting Best Practice ITIL 3.0 Best Practices Optimize Global IT Process Landscape to support a simplified, efficient, and secure work environment IT Process Management Process Portfolio Management Process Design IT Process Landscape SAP Process Landscape ISO 27001 ISO 22301 Process Governance COBIT Supporting Best Practice SOX-Relevant IT Processes COSO Framework Corporate SOX Processes Central MIC Team PDCA ISO 9001 SOX / KonTraG *) Standards Laws & Regulations Global IT Corporate 2013 SAP AG. All rights reserved. *) Others: ADA (USA/California), ISO 20000, EU Guideline 8 etc. Customer 10

What is The Right Security? - Keep the right balance & Enable risk based decisions Security involves everyone & everything Security is a quality aspect of all of our businesses, not a separate Line of Business Security needs trust, not fear Security has four dimensions: People / Processes / Technology / Organization Design/Strategy Business decisions are about taking risks There is an inherent conflict in secure business 100% Security is not the goal for a software business like ours 100% Security prevents business 100% Security is not affordable End-User role Quality Management Efficiency & Effectiveness Risk Management Advisory role Compliance / IT Security Governance / Business Continuity Our Values e.g. Integrity, Excellence, Trusted Advisor, Innovation Goal: We need to find the right balance Basis is risk transparency! Security implications (costs, embarrassment, control) Awareness, process enforcement, technology enabling Business priorities, speed, innovation 2013 SAP AG. All rights reserved. Customer 11

IT Security & Risk- approach @ SAP For continuous improvement of the IT Security Strategy multi aspects need to be considered Risk oriented Regular risk management enables identification of key priorities. Best Practices Cross checks with international standards ensures completeness of the measures and activity areas. Reviews by IT Security strategy consultants ensure staying focused. Demand driven Synchronization with the business roadmaps and the technology roadmaps enables proactive research and planning. Stay tuned To ensure up-to-date information on the IT Security risk status the risk evolution & technology evolution is reviewed at least two times a year. Consumable IT Security must not be a burden for the end user. Find ways to make IT Security more digestible and usable. 2013 SAP AG. All rights reserved. Customer 12

IT Security & Risk- approach @ SAP Defense against a changing threat environment A Focus on protection of the key assets... Company boundaries vanish. Complete protection of all data is too expensive and difficult to assure. Security teams have to work closely with the business to identify the organization s most critical information and systems ( key assets ) in order to protect them. A hundred percent protection for all systems and information can not be guaranteed anymore! Change to Antivirus Antivirus Alarming System Alarming System 2013 SAP AG. All rights reserved. Customer 13

Data Leakage Prevention Strategy @ SAP Defense against a changing threat environment A Focus on protection of the key assets/information... 2013 SAP AG. All rights reserved. Customer 14

IT Security & Risk- approach @ SAP Defense against a changing threat environment B Holistic, situational IT security concepts 1. Advancement of the IT Security Strategy: Operational: combination of the object to be protected vulnerabilities threat risk situation 2. Establish new monitoring methods 3. Strengthening access controls 4. Increasing employees awareness 5. Raising awareness among the top management 6. Rethinking IT-architecture IT SRO 2013 SAP AG. All rights reserved. Customer 15

IT Security & Risk- approach @ SAP Defense against a changing threat environment leveraging SAP runs SAP D Holistic, situational IT security Top Technology measures Technology Tactical Measures Strategic Measures SAP Security Tools Data/Information Application Infrastructure Network Data Classification Email Encryption (PGP) Service & Tool classification Custom Code Scanning December Patch Implementation and Activation IT Security Governance Client Security (e.g. PGP HD encryption) Mobile Device Security (Afaria) IT Security Governance Denial of Service Defender WLAN Security WAN Encryption Digital Rights Management to protect sensitive Documents DLP for Partner Access (e.g. WTS India) Identity & Access Management (esp. role based access control) Mail Malware defense Strong Authentication Secure VoIP Cloud Computing / Virtualization Identity & Access Management Network Access Control Network Separation Threat & Vulnerability Mgmt. / SMC SAP NetWeaver IdM SAP NetWeaver SSO SAP ID Service SAP GRC 10 Risk Management SAP GRC 10 Process Controls SAP GRC 10 Access Request Management SAP Sybase Afaria SAP Sybase Unwired Platform SAP NetWeaver Gateway SAP Solution Manager 2013 SAP AG. All rights reserved. Customer 16

IT Security Architecture@SAP Firewalls Spam protection email encryption Intrusion Prevention System Social - SAP JAM AV/PFW HDD encryption Web filtering IP Phone / Messenger Mobile Management SAP Afaria Mobile Data SAP Box, Encryption Viewer Firewalls Zone 4 - DMZ Zone 3 Hidden DMZ Zone 2 Office Net SAP SSO / SAP ID / PKI Certification Management Zone 1 High Secure 2-Factor- Authentication IAM SAP NW IDM & SAP GRC 10.0 Document encryption Share Monitoring Printer 2-Factor- Protection Hardening/Patch Management Code Scanner ABAP, APPs AV Hardening/Patch Management Network Admission Control IT Security & Risk Awareness Campaigns SIEM Solution Hardening/Patch Management/Access Management Data Leakage Prevention VPN Access Protection 2013 SAP AG. All rights reserved. Customer 17

IT Security & Risk- approach @ SAP Defense against a changing threat environment D Information Exchange about threat situation and Security trends Information exchange with IT security teams of customers/ DAX companies Federal Criminal Police Office of Germany (BKA) Federal and State Office for the Protection of the Constitution (in German: BfV/LfV) Federal Office for Information Security (BSI) Symantec, McAfee, Security software companies National and international hacking communities Security Information Broker Information Security Forum (ISF) workgroups Information Sourcing via Gartner, CEB and ISACA 2013 SAP AG. All rights reserved. Customer 18

Contact information: Thank you! Maximilian Adrian Director IT Security & Risk Office; CRISC Global IT SAP AG E-mail: maximilian.adrian@sap.com Phone: +49 6227 / 7-48448

2013 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Excel, Outlook, PowerPoint, Silverlight, and Visual Studio are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, z10, z/vm, z/os, OS/390, zenterprise, PowerVM, Power Architecture, Power Systems, POWER7, POWER6+, POWER6, POWER, PowerHA, purescale, PowerPC, BladeCenter, System Storage, Storwize, XIV, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, AIX, Intelligent Miner, WebSphere, Tivoli, Informix, and Smarter Planet are trademarks or registered trademarks of IBM Corporation. Linux is the registered trademark of Linus Torvalds in the United States and other countries. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are trademarks or registered trademarks of Adobe Systems Incorporated in the United States and other countries. Oracle and Java are registered trademarks of Oracle and its affiliates. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems Inc. HTML, XML, XHTML, and W3C are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology. Apple, App Store, ibooks, ipad, iphone, iphoto, ipod, itunes, Multi-Touch, Objective-C, Retina, Safari, Siri, and Xcode are trademarks or registered trademarks of Apple Inc. IOS is a registered trademark of Cisco Systems Inc. RIM, BlackBerry, BBM, BlackBerry Curve, BlackBerry Bold, BlackBerry Pearl, BlackBerry Torch, BlackBerry Storm, BlackBerry Storm2, BlackBerry PlayBook, and BlackBerry App World are trademarks or registered trademarks of Research in Motion Limited. Google App Engine, Google Apps, Google Checkout, Google Data API, Google Maps, Google Mobile Ads, Google Mobile Updater, Google Mobile, Google Store, Google Sync, Google Updater, Google Voice, Google Mail, Gmail, YouTube, Dalvik and Android are trademarks or registered trademarks of Google Inc. INTERMEC is a registered trademark of Intermec Technologies Corporation. Wi-Fi is a registered trademark of Wi-Fi Alliance. Bluetooth is a registered trademark of Bluetooth SIG Inc. Motorola is a registered trademark of Motorola Trademark Holdings LLC. Computop is a registered trademark of Computop Wirtschaftsinformatik GmbH. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, SAP HANA, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company. Sybase and Adaptive Server, ianywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase Inc. Sybase is an SAP company. Crossgate, m@gic EDDY, B2B 360, and B2B 360 Services are registered trademarks of Crossgate AG in Germany and other countries. Crossgate is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. The information in this document is proprietary to SAP. No part of this document may be reproduced, copied, or transmitted in any form or for any purpose without the express prior written permission of SAP AG. 2013 SAP AG. All rights reserved. Customer 20

2013 SAP AG. Alle Rechte vorbehalten. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, ohne die ausdrückliche schriftliche Genehmigung durch SAP AG nicht gestattet. In dieser Publikation enthaltene Informationen können ohne vorherige Ankündigung geändert werden. Die von SAP AG oder deren Vertriebsfirmen angebotenen Softwareprodukte können Softwarekomponenten auch anderer Softwarehersteller enthalten. Microsoft, Windows, Excel, Outlook, PowerPoint, Silverlight und Visual Studio sind eingetragene Marken der Microsoft Corporation. IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, z10, z/vm, z/os, OS/390, zenterprise, PowerVM, Power Architecture, Power Systems, POWER7, POWER6+, POWER6, POWER, PowerHA, purescale, PowerPC, BladeCenter, System Storage, Storwize, XIV, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, AIX, Intelligent Miner, WebSphere, Tivoli, Informix und Smarter Planet sind Marken oder eingetragene Marken der IBM Corporation. Linux ist eine eingetragene Marke von Linus Torvalds in den USA und anderen Ländern. Adobe, das Adobe-Logo, Acrobat, PostScript und Reader sind Marken oder eingetragene Marken von Adobe Systems Incorporated in den USA und/oder anderen Ländern. Oracle und Java sind eingetragene Marken von Oracle und/oder ihrer Tochtergesellschaften. UNIX, X/Open, OSF/1 und Motif sind eingetragene Marken der Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame und MultiWin sind Marken oder eingetragene Marken von Citrix Systems, Inc. HTML, XML, XHTML und W3C sind Marken oder eingetragene Marken des W3C, World Wide Web Consortium, Massachusetts Institute of Technology. Apple, App Store, ibooks, ipad, iphone, iphoto, ipod, itunes, Multi-Touch, Objective-C, Retina, Safari, Siri und Xcode sind Marken oder eingetragene Marken der Apple Inc. IOS ist eine eingetragene Marke von Cisco Systems Inc. RIM, BlackBerry, BBM, BlackBerry Curve, BlackBerry Bold, BlackBerry Pearl, BlackBerry Torch, BlackBerry Storm, BlackBerry Storm2, BlackBerry PlayBook und BlackBerry App World sind Marken oder eingetragene Marken von Research in Motion Limited. Google App Engine, Google Apps, Google Checkout, Google Data API, Google Maps, Google Mobile Ads, Google Mobile Updater, Google Mobile, Google Store, Google Sync, Google Updater, Google Voice, Google Mail, Gmail, YouTube, Dalvik und Android sind Marken oder eingetragene Marken von Google Inc. INTERMEC ist eine eingetragene Marke der Intermec Technologies Corporation. Wi-Fi ist eine eingetragene Marke der Wi-Fi Alliance. Bluetooth ist eine eingetragene Marke von Bluetooth SIG Inc. Motorola ist eine eingetragene Marke von Motorola Trademark Holdings, LLC. Computop ist eine eingetragene Marke der Computop Wirtschaftsinformatik GmbH. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, SAP HANA und weitere im Text erwähnte SAP-Produkte und -Dienst-leistungen sowie die entsprechenden Logos sind Marken oder eingetragene Marken der SAP AG in Deutschland und anderen Ländern. Business Objects und das Business-Objects-Logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius und andere im Text erwähnte Business-Objects-Produkte und Dienstleistungen sowie die entsprechenden Logos sind Marken oder eingetragene Marken der Business Objects Software Ltd. Business Objects ist ein Unternehmen der SAP AG. Sybase und Adaptive Server, ianywhere, Sybase 365, SQL Anywhere und weitere im Text erwähnte Sybase- Produkte und -Dienstleistungen sowie die entsprechenden Logos sind Marken oder eingetragene Marken der Sybase Inc. Sybase ist ein Unternehmen der SAP AG. Crossgate, m@gic EDDY, B2B 360, B2B 360 Services sind eingetragene Marken der Crossgate AG in Deutschland und anderen Ländern. Crossgate ist ein Unternehmen der SAP AG. Alle anderen Namen von Produkten und Dienstleistungen sind Marken der jeweiligen Firmen. Die Angaben im Text sind unverbindlich und dienen lediglich zu Informationszwecken. Produkte können länderspezifische Unterschiede aufweisen. Die in dieser Publikation enthaltene Information ist Eigentum der SAP. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, nur mit ausdrücklicher schriftlicher Genehmigung durch SAP AG gestattet. 2013 SAP AG. All rights reserved. Customer 21