53
Security Considerations for Mobile Security Considerations for Mobile Applications Joshua Savill Product Manager Product Manager August 27 th , 2009

Security Considerations for Mobile - SAP

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security Considerations for Mobile - SAP

Security Considerations for MobileSecurity Considerations for Mobile Applications

Joshua SavillProduct ManagerProduct Manager

August 27th, 2009

Page 2: Security Considerations for Mobile - SAP

AGENDAAGENDA

• Introduction to data securityy

• Consideration for synchronizing data outside the data center

• Steps to implement secure data synchronization environments

2

Page 3: Security Considerations for Mobile - SAP

PRESENTATION GOALSPRESENTATION GOALS

• Provide an understanding of the various types of security g yp yoptions available with SQL Anywhere

• Understanding the considerations for different security options f i d t h i tifor securing data synchronization

• Gain knowledge of the various moving pieces in a MobiLink synchronization environment and how each piece requires y p qdifferent security considerations

3

Page 4: Security Considerations for Mobile - SAP

VALUE OF SECURITYVALUE OF SECURITY

f k b

Is there a need to secure a mobile application?

• Information is a key business commodity

– Lost data = lost productivity = lost revenue

• Risk of data breaches are real• Risk of data breaches are real

• Not securing and protecting data privacy has consequences

– TimeTime

– Legal

– Opportunities

– Credibility

4

Page 5: Security Considerations for Mobile - SAP

VALUE OF SECURITYVALUE OF SECURITY

• Federal privacy laws:

US Government and state regulations regarding data security and privacy• Federal privacy laws:

– HIPAA (health information)– Gramm‐Leach‐Bliley (financial information)– Fair Credit Reporting Act

Children’s Online Privacy Act– Children s Online Privacy Act– FERPA (student records)– FTC regulations regarding consumer information– Additional legislation pending for general protection of private information…

• State privacy laws include protections for• State privacy laws include protections for– Breach notification required: 39 states– Citizen information, e.g., California, New York– Health records– Social Security Numbers– Social Security Numbers– Genetic information; HIV status– Video rentals; library borrowing– Bank records– Cable viewing

5

– Cable viewing– Polygraphs– Employment records

Page 6: Security Considerations for Mobile - SAP

RECENT SECURITY BREACHESRECENT SECURITY BREACHESInsert subhead here as a full sentence at 18 point font, bold

DATE MADE

PUBLICNAME TYPE OF BREACH RECORDS

Ch kF C Electronic bill payment service taken over by 5 million06-Jan-2009 CheckFree Corp Electronic bill payment service taken over by

criminals and redirected to a site in the Ukraine.5 million people

20-Jan-2009Heartland Payment

SystemsMalicious software compromised credit card data that crossed the network (lawsuit pending).

100 million transactions Systems ( p g)per month

9-Feb-2009Federal Aviation Administration

Current and former employee names, Social Security numbers and other personal information were stolen. 43,000 people

11-Apr-2009Peninsula

Orthopaedic Associates

Patient information was stolen while being transported to offsite storage.

100,000 people

6* Privacy Rights Clearinghouse – privacyrights.org

Page 7: Security Considerations for Mobile - SAP

SECURITY AND PERFORMANCESECURITY AND PERFORMANCE

Implementing secure adds overhead to application performance

• Benchmark

– The only true way to determine the affects of security in your environment is to benchmark your application andyour environment is to benchmark your application and synchronization

• Determine the level of security required for your business needs

– Business plan

C l i h i– Consult with security experts

7

Page 8: Security Considerations for Mobile - SAP

SECURITY AND PERFORMANCESECURITY AND PERFORMANCE

Implementing secure adds overhead to application performance

• Database– Time required to encrypt/decrypt data for file I/O– Cost of auditingCost of auditing– Time required to encrypt/decrypt communication data

• Network– Time required to encrypt/decrypt network communication– Processing time on intermediariesNetwork authentication processing time– Network authentication processing time

• Enterprise components– Authentication and validation time

8

Page 9: Security Considerations for Mobile - SAP

BUILDING SECURITYBUILDING SECURITY

E t i d t t it

How are we going to build secure mobile applications?

• Enterprise data center security– Data storage and security– IT policies and procedures

DMZ d i l k i• DMZ and internal network security– Intermediary security– Internal data transfer

• Data transmission from device to middleware– Network security– Data transfer

• Mobile devices and laptops– Security of devices and laptops– Security of data

9

– IT policies and procedures

Page 10: Security Considerations for Mobile - SAP

MOBILE APPLICATION VULNERABILITYMOBILE APPLICATION VULNERABILITY

Where do security risks exist in a MobiLink synchronization environment?

RelayServerExternal InternalServerExternal

FirewallInternalFirewall

HTTP/S M biLi k C lid t dO tb d HTTP/S

WEBWEB

DMZExternal Network

HTTP/S MobiLinkServer

ConsolidatedDatabase Server

Internal Network

Outbound HTTP/SConnection

10

Page 11: Security Considerations for Mobile - SAP

SECURITY RISKSSECURITY RISKS

Enterprise data security risk

• Physical theft of the machine or breach of the data center• Environmental disasters

– Floods fire earth quakes explosionsFloods, fire, earth quakes, explosions• Security circumvention

– External drives, USB keys, DVDs, Tapes– Social engineering, password hacking

• Unauthorized machine and database access via network• Unauthorized and insecure access via:• Unauthorized and insecure access via:

– Insecure Web service calls– Insecure APIs

11

– Default User IDs and passwords

Page 12: Security Considerations for Mobile - SAP

SECURITY RISKSSECURITY RISKS

Enterprise data security risk

• Hacking

– SQL Injections

C it i ti (XSS)– Cross‐site scripting (XSS)

– Cracked passwords

– Internal access/backdoorsInternal access/backdoors• Key loggers

– Malicious software

– Buffer overflows

12

Page 13: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

Physical access to the data center

• Software security is ineffective if access to the physical machine is available

Store data center machines in a physically secure location– Store data center machines in a physically secure location• Require specific entry credentials to data center

• Audit entry to environment

• Surveillance and security

• Prohibit food and drinks in the data center

• Protect against environmental conditionsProtect against environmental conditions

– Fire detection and suppression systems

– Geographical data centers

13

• Redundancy systems and data transfer

Page 14: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

Securing the data center machines

• Leverage IT policies and procedures

– Educate administrators on policies and expectations

– Provide consequences for failing to abide by policies and proceduresq g y p p

• Ensure all machines in the data center run the latest security patches and software

• Ensure all physical upgrades to data center machines are done based on ITEnsure all physical upgrades to data center machines are done based on IT policies and procedures

• Avoid running unnecessary services or daemons on machines in the data centercenter

– Shutdown ftp, telnet, remote desktop, etc…

• Monitor and control all access and user accounts with access to the data center

14

center

Page 15: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

P d li iSecuring access to database and data center machines

• Password policies– Change the default DBA password– No passwords in ODBC Data Source Name– Implement password creation policy

• Minimum password length– Controllable via database option min_password_length

• Password expiration– Use the verify_password_function to facilitate

• Password generation rulesdi i d– No dictionary words

– Mix of numbers, digits, special characters, etc…– Use the verify_password_function to facilitate

E f d li i hi i th d t t

15

• Enforce password policies on machines in the data center

Page 16: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

h

Securing the MobiLink server

• Authentication– Built‐in user authentication

• User name exists in ml_user table• Do not use –zu+ in production

– Custom authentication• authenticate_user script to build custom authentication

– Authenticate user with external enterprise server• User ID and password (not the same as database)

– Ensure each user has a unique MobiLink user ID and password

• No verbose logging– Keep logging to a minimal and only when debugging issues

16

p gg g y gg g

Page 17: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

b

Securing the consolidated database

• Database permissions to prevent:– Unauthorized user access– Accessing system during inactivityg y g y– Hacking of users and passwords– Access to non‐authorized objects– Viewing of non‐encrypted data– Viewing of non‐encrypted data

• User account and permissions– Enforce password policiesC l i li i (if d)– Create login policies (if supported)

• E.g. maximum failed login attempts, password life time/expiry– Integrated login (if supported)

17

Page 18: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

Securing the consolidated database

• User accounts– Use groups to consolidate and control permissions– Use unique user IDs to control specific user permissionsq p p– Restrict DBA authority– Require permissions to start/stop databases on the server– Prevent creation of new databases on a server– Prevent creation of new databases on a server– Limit access to bulk data unload statements– Use specific user permissions for specific operations –BACKUP VALIDATEBACKUP, VALIDATE

– Make use of the REVOKE statement– Disable unnecessary users

18

Page 19: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

Securing the consolidated database

• Disable unused database features

– Some features require access to the network and file systemsystem

• Notifications

• Data import

• cmdshell activities

– Features to be leery of if not required• Server‐side and client‐side backupsServer side and client side backups

• External stored procedures

• Remote data access

b

19

• Web services

Page 20: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

f d b l

Securing the consolidated database

• Secure users for accessing database utilities– Many utilities require elevated permissions to run– Make use of user authority when creating users for utilitiesy g

• E.g. VALIDATE authority, BACKUP authority• Debugging can reveal information

– Connection IDs, request information may be logged inConnection IDs, request information may be logged in plain text

– Logging requires admin permissions, but users may be able to start a server with logging enabledgg g

– Delete request logs when debugging is finished– Limit the size of the request log

20

Page 21: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

Securing the consolidated database

• Monitor database and server access

– Auditing tracks• All login attempts (failed and successful)• All login attempts (failed and successful)

• Timestamps for all events

• All permissions checks (successful and failed) and associated bj i f iobject information

• All actions that require DBA authority

– Audit information for SQL Anywhere is stored in the Q ytransaction log

• Encrypt the database

21

Page 22: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

Securing the consolidated database

• Secure all Web services

– Use HTTPS• Authentication is required• Authentication is required

• All http requests are sent in the clear

• Only provide access to required web service resources

– Strongly type parameters• Validate parameters before being used in SQL statements

22

Page 23: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

Securing the consolidated database

• SQL Injection attack prevention

– Detect and reject escape characters• E g Quotes wildcards• E.g. Quotes, wildcards,

– Use parameterized queriesE.g. "SELECT * FROM Customers WHERE Country = @CountryName";SqlCommandcmd = new SqlCommand( commandText, conn );cmd.Parameters.Add( "@CountryName",countryName );

– Use stored procedures• Enforce type checking

• Disguise functionality

23

Disguise functionality

Page 24: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

E i d b

Database file encryption and backup

• Encrypt entire database• Encrypt specific tables

– Only encrypt tables containing sensitive data– Minimize any performance implicationsy p p

• Encrypt specific values– Using built in ENCRYPT() and DECRYPT() type functions

• Embed the key in the applicationOnly prevents average user from finding– Only prevents average user from finding

• Use an algorithm to derive the key at runtime– Based on characteristics specific to each install– Protect the algorithm

• Hide the key in the registry– Relatively simple to snoop, but deters average users

• Each user has knowledge of the keyEvery user is responsible for security

24

– Every user is responsible for security

Page 25: Security Considerations for Mobile - SAP

SECURING THE DATA CENTERSECURING THE DATA CENTER

Database file encryption and backup

• Protecting backups is crucial

– Same considerations for data center need to be made for physically protecting backups onsite and offsitephysically protecting backups, onsite and offsite

– Use secure transportation

• Network backup p– Use encrypted communications

25

Page 26: Security Considerations for Mobile - SAP

BUILDING SECURITYBUILDING SECURITY

E t i d t t itE t i d t t itE t i d t t it

How are we going to build secure mobile applications?

••• Enterprise data center securityEnterprise data center securityEnterprise data center security––– Data storage and securityData storage and securityData storage and security––– IT policies and proceduresIT policies and proceduresIT policies and procedures

DMZ d i l k i• DMZ and internal network security– Intermediary security– Internal data transfer

• Data transmission from device to middleware– Network security– Data transfer

• Mobile devices and laptops– Security of devices and laptops– Security of data

26

– IT policies and procedures

Page 27: Security Considerations for Mobile - SAP

MOBILE APPLICATION VULNERABILITYMOBILE APPLICATION VULNERABILITY

Where do security risks exist in a MobiLink synchronization environment?

RelayServerExternal InternalServerExternal

FirewallInternalFirewall

HTTP/S M biLi k C lid t dO tb d HTTP/S

WEBWEB

DMZExternal Network

HTTP/S MobiLinkServer

ConsolidatedDatabase Server

Internal Network

Outbound HTTP/SConnection

27

Page 28: Security Considerations for Mobile - SAP

SECURITY RISKSSECURITY RISKS

Intermediary security and internal data transfer

• Database and enterprise application exposure to the Internet

• Unauthorized connections to the internal network

I t l k t iffi d i t ti• Internal packet sniffing and interception

28

Page 29: Security Considerations for Mobile - SAP

SECURING THE DMZSECURING THE DMZ

DMZ security considerations

• Incoming connections should be subject to authentication and validation

– Any inbound connection should be verified before being y gallowed to synchronize

• Database server and enterprise applications should not be directly exposed to the Internetdirectly exposed to the Internet

– Use middleware to force all requests to go through a validation layer

ili i d ( )• Demilitarized zone (DMZ)

• All internal network communications should be secured– Internal packet sniffing and interception

29

p g p• Transport layer security

Page 30: Security Considerations for Mobile - SAP

SECURING THE DMZSECURING THE DMZ

DMZ security considerations

• Securing the DMZ machines is the same as data center machines

Latest security patches– Latest security patches

– Do not run unnecessary services or daemons

– Monitor and control all access and user accounts

– Upgrades based on IT policies

– Enforce password policies

30

Page 31: Security Considerations for Mobile - SAP

SECURING THE DMZSECURING THE DMZ

DMZ security considerations

• Web server authentication

– Client‐side certificates• Use 3rd party management software to ensure all certificates are• Use 3rd party management software to ensure all certificates are secure

– Server‐side certificates• Use commercial Certificate Authority to issue certificates 

31

Page 32: Security Considerations for Mobile - SAP

SECURING INTERNAL DATA TRANSFERSECURING INTERNAL DATA TRANSFER

Internal data transfer security

• Transport layer security

– RSA, RSA_FIPS 140‐2 certified

ECC– ECC

32

Page 33: Security Considerations for Mobile - SAP

BUILDING SECURITYBUILDING SECURITY

E t i d t t itE t i d t t itE t i d t t it

How are we going to build secure mobile applications?

••• Enterprise data center securityEnterprise data center securityEnterprise data center security––– Data storage and securityData storage and securityData storage and security––– IT policies and proceduresIT policies and proceduresIT policies and procedures

DMZ d i l k iDMZ d i l k iDMZ d i l k i••• DMZ and internal network securityDMZ and internal network securityDMZ and internal network security––– Intermediary securityIntermediary securityIntermediary security––– Internal data transferInternal data transferInternal data transfer

• Data transmission from device to middleware– Network security– Data transfer

• Mobile devices and laptops– Security of devices and laptops– Security of data

33

– IT policies and procedures

Page 34: Security Considerations for Mobile - SAP

MOBILE APPLICATION VULNERABILITYMOBILE APPLICATION VULNERABILITY

Where do security risks exist in a MobiLink synchronization environment?

RelayServerExternal InternalServerExternal

FirewallInternalFirewall

HTTP/S M biLi k C lid t dO tb d HTTP/S

WEBWEB

DMZExternal Network

HTTP/S MobiLinkServer

ConsolidatedDatabase Server

Internal Network

Outbound HTTP/SConnection

34

Page 35: Security Considerations for Mobile - SAP

SECURITY RISKSSECURITY RISKS

Data transmission from device to middleware

• Packet sniffing and interception

• Packet and data manipulation

35

Page 36: Security Considerations for Mobile - SAP

SECURE DATA TRANSFERSECURE DATA TRANSFER

T t l itData transfer security available with MobiLink

• Transport layer security– RSA, RSA_FIPS 140‐2 certified– ECC

• Protocol layer security (end‐to‐end encryption)– RSA, RSA_FIPS 140‐2 certified– ECCECC

• Virtual private network– Tunneled through the transport layerR i 3rd t ft h Ci VPN li t– Requires 3rd party software such as Cisco VPN client, Juniper VPN

– Recommend transport layer and/or protocol layer security with VPN

36

with VPN

Page 37: Security Considerations for Mobile - SAP

SECURE DATA TRANSFERSECURE DATA TRANSFER

No encryption

MobiLink data flow with no encryption

WAP Gap

MobiLink ServerMobiLink ClientNo encrypted

data

Web Server or Intermediary

37

Page 38: Security Considerations for Mobile - SAP

SECURE DATA TRANSFERSECURE DATA TRANSFER

Transport Layer Encryption

MobiLink data flow with transport-layer security

WAP GapTLS session 1 TLS session 2

MobiLink ServerMobiLink ClientData is

unencrypted

Web Server or Intermediary

38

Page 39: Security Considerations for Mobile - SAP

SECURE DATA TRANSFERSECURE DATA TRANSFER

Protocol Layer Encryption

MobiLink data flow with end-to-end encryption

WAP GapEnd-to-end Encryption

Data staysencrypted MobiLink ServerMobiLink Client

Web Server or Intermediary

39

Page 40: Security Considerations for Mobile - SAP

SECURE DATA TRANSFERSECURE DATA TRANSFER

Transport Layer and Protocol Layer Encryption

MobiLink data flow with end-to-end encryption and transport-layer security

WAP GapEnd-to-end Encryption

TLS session 1 TLS session 2

Data staysencrypted MobiLink ServerMobiLink Client

Web Server or Intermediary

40

Page 41: Security Considerations for Mobile - SAP

BUILDING SECURITYBUILDING SECURITY

E t i d t t itE t i d t t itE t i d t t it

How are we going to build secure mobile applications?

••• Enterprise data center securityEnterprise data center securityEnterprise data center security––– Data storage and securityData storage and securityData storage and security––– IT policies and proceduresIT policies and proceduresIT policies and procedures

DMZ d i l k iDMZ d i l k iDMZ d i l k i••• DMZ and internal network securityDMZ and internal network securityDMZ and internal network security––– Intermediary securityIntermediary securityIntermediary security––– Internal data transferInternal data transferInternal data transfer

••• Data transmission from device to middlewareData transmission from device to middlewareData transmission from device to middleware––– Network securityNetwork securityNetwork security––– Data transferData transferData transfer

• Mobile devices and laptops– Security of devices and laptops– Security of data

41

– IT policies and procedures

Page 42: Security Considerations for Mobile - SAP

MOBILE APPLICATION VULNERABILITYMOBILE APPLICATION VULNERABILITY

Where do security risks exist in a MobiLink synchronization environment?

RelayServerExternal InternalServerExternal

FirewallInternalFirewall

HTTP/S M biLi k C lid t dO tb d HTTP/S

WEBWEB

DMZExternal Network

HTTP/S MobiLinkServer

ConsolidatedDatabase Server

Internal Network

Outbound HTTP/SConnection

42

Page 43: Security Considerations for Mobile - SAP

SECURITY RISKSSECURITY RISKS

Device and laptop vulnerabilities

• Theft and lost devices

– Given enough time and resources all security can be brokenbroken

• Attacks against the device

– Operating system and file system attacksp g y y

– Unapproved and malicious software

• Access security workarounds

– Via social engineering, password hacking or use of removable media to take data to an uncontrolled environment

43

environment

Page 44: Security Considerations for Mobile - SAP

SECURITY RISKSSECURITY RISKS

D bApplication and database vulnerabilities on device and laptop 

• Database– Unauthorized user access– Hacking users and passwordsHacking users and passwords– Unencrypted database file

• Application– Unauthorized user access– Hacking users and passwords– Unencrypted temporary file storage– Unencrypted temporary file storage– Insecure code 

44

Page 45: Security Considerations for Mobile - SAP

SECURING PHYSICAL ENTITIESSECURING PHYSICAL ENTITIES

Securing physical devices and laptops running the mobile application

• Software security can be ineffective if physical access to the device is available

Device loss theft or inappropriate decommissioning– Device loss, theft or inappropriate decommissioning• Store device in a protected environment

• Remove all data from a device before discarding

– Data Erasure

– Require specific entry credentials

• Encrypt the storage card in the device• Encrypt the storage card in the device

• Access security on device

– Afaria provides comprehensive management and security

45

Afaria provides comprehensive management and security capabilities for mobile data and devices

Page 46: Security Considerations for Mobile - SAP

SECURING PHYSICAL ENTITIESSECURING PHYSICAL ENTITIES

Securing physical devices and laptops running the mobile application

• Leverage IT policies and procedures– Educate end users on policies and expectations– Provide consequences for failing to abide by policies and procedures

• Manage deployed hardware– Maintain inventory of all hardware

• Afaria Inventory Manager

– Implement remote patching mechanisms to ensure consistency• Afaria Software and Patch Manager

– Establish procedures for disabling/erasing sensitive remote data in f l /th ftcase of loss/theft

• Afaria Remote Control and Security Manager

– Device reclamation procedure• Erasing all data when device is returned to inventory or changes

46

• Erasing all data when device is returned to inventory or changes ownership

Page 47: Security Considerations for Mobile - SAP

SECURING SOFTWARESECURING SOFTWARE

A li i d d b id iSecuring application and database vulnerabilities

• Application and database considerations– User password policies

• Forced password changes, password guidelines, and validationp g p g

– Custom login procedures– Restrict DBA authority

C t DBA f th li ti h• Create a non‐DBA user for the application or each user

– Disable an account after a set number of invalid login attempts

• Encrypt database stored on the device (same as data center)• Enforce password policies (same as data center)

47

Page 48: Security Considerations for Mobile - SAP

SECURING SOFTWARESECURING SOFTWARE

A li ti di

Securing application and database vulnerabilities

• Application coding– Program defensively with security in mind– Trusted code should not call untrustworthy code– Compartmentalize code to minimize damage possible from a single– Compartmentalize code to minimize damage possible from a single 

module– Use standard tested components– Keep routines simple– Hiding information in binaries can be discovered

• Internal hacking can occur– Remove all information from application code when no longer 

requiredrequired• Zero out variable information and temporary space

– Consult security experts and use security auditing software– Use trusted methodology that has proven success

48

gy p

Page 49: Security Considerations for Mobile - SAP

INEVITABLE CASEINEVITABLE CASE

Prepare for the inevitable

• Create a security plan to deal with breaches

– Expire keys and code

Remove unnecessary data from the device when not– Remove unnecessary data from the device when not necessary or before discarding

• Data Erasure

– Afaria Remote Control and Security Manager

49

Page 50: Security Considerations for Mobile - SAP

RECAP ON BUILDING SECURITYRECAP ON BUILDING SECURITY

h f ll

How are we going to build secure mobile applications?

• Need to consider security in the following components:

1. Enterprise data center security

2 DMZ and internal network security2. DMZ and internal network security

3. Data transmission from device to middleware 

4. Mobile devices and laptops4. Mobile devices and laptops

• Need to consider the level of security requirements to meet your business needs

50

Page 51: Security Considerations for Mobile - SAP

RESOURCESRESOURCES

• Where to go from here…

Insert subhead here as a full sentence at 18 point font, bold

– SQL Anywhere website• http://www.sybase.com/sqlanywhere

– Download the developer edition• http://www.sybase.com/detail?id=1055872http://www.sybase.com/detail?id 1055872

– Try out the samples! ( %SQLANYSAMP11% )– Look at the documentation

• http://dcx.sybase.comN– Newsgroups

• http://www.sybase.com/detail_list?id=10891– White Papers

• http://www.sybase.com/detail?id=1062460– SQL Anywhere Tech Corner

• http://www.sybase.com/developer/library/sql‐anywhere‐techcorner

51

Page 52: Security Considerations for Mobile - SAP

Sybase Professional ServicesSybase Professional Services

• Our Professional Services Organi ation can help youwww.sybase.com/professional‐services/consulting/products The technology and the

assistance we’ve received from • Our Professional Services Organization can help you…– Upgrade from previous versions– Install and configure SQL Anywhere 11 with high 

availability options

iAnywhere’s Professional Services team have enabled us to do things that would otherwise have been much more difficult and expensive given our business requirements.

– Build a rapid proof of concept using tried‐and‐tested application templates, toolkits, and frameworks  

• Includes BlackBerry development

Khaled El EmamCTOTrialStat

Includes BlackBerry development (www.sybase.com/blackberry)

– Learn more about SQL Anywhere through customized training and mentoring 

– Plan your architecture distributed systems

Pearson benefited from the expert knowledge of iAnywhere Solutions Professional Services, helping their developers quickly – Plan your architecture, distributed systems 

design, or application design– Tune and enhance performance– Test synchronization scalability

helping their developers quickly gain knowledge in order to accelerate the development of SuccessMaker.

Kelli Anne Hodges

52

Kelli Anne HodgesCurriculum SpecialistPearson Digital Learning

Page 53: Security Considerations for Mobile - SAP

SECURITY CONSIDERATIONS FOR MOBILE APPLICATIONS

53