mobilizing our sales force via paperless in-store selling
TRANSCRIPT
Mobilizing our Sales Force via PaperlessIn-Store Selling
iPads in the Business Environment
Security Framework OutlineGeneral Approach to Mobility Security
A 4 point approach to engineering a security architecture:
1. Policy – PVPs, IT Policies, etc2. Control – Device controls,
network security, data security (next slide)
3. Compliance – Internal Audits, Security Reviews, Change Management Protocols
4. Incentive – TCO, Risk Reporting, Policy Compliance
Policy
Control
Compliance
Incentive
Control - 3 Vectors of Security
• VPN data transfer• HTTPS protocols for access
outside P&G network
• Secure Data Storage in P&G Data Centers or P&G Private Cloud
• Access Granted via Centrally Managed Access Groups using P&G Credentials.
Device Security Network Security Database Security
Paperless In-Store SellingWinning In-Store with Technology Transformation
• Inherent iOS Architecture security• Data encryption at rest• Complex passcode • Auto Screen Locks• Mobile Device Management
platform• Virtual Private Network to Access
Data• Data filtered to specific sales rep• Mobile App Scanning (Automated)
Questions