SAP Private Cloud

“Security is not simply a subset of IT”

Reading time: 4 mins

Meet the Authors

Key Takeaways

⇨ As companies continue to adopt container-based architectures, container security, and Kuberne- tes-based security in the cloud are also emerging as important topics on the cybersecurity agenda.

⇨ One growing concern in the cybersecurity land- scape is supply chain attacks, which have been on the rise in recent years.

⇨ The top five priorities for 2023 include defensive architecture, privileged identity and access management, zero trust, risk-based vulnerability management, and cyber resilience.

Cybersecurity encompasses a wide range of areas, including endpoint and network security, and application layer security. A comprehensive understanding of these aspects is essential for organizations to protect themselves. SAP holds a unique advantage in this realm, as it possesses deep understanding of its own applications and business frameworks across various industries. SAP has created numerous security solutions, including SAP GRC and identity and access management, specifically for its own applications. One of its key assets, the Enterprise Threat Detection (ETD) tool, has undergone significant development and empowers our customers to detect and understand any abnormal activity within their SAP applications and workflows. As the developers of these tools, SAP has a deep understanding of their capabilities, giving them a competitive advantage over other players in the market.
In Part 2 of the interview with SAPinsider, Roland Costea, CISO Enterprise Cloud Services (ECS) at SAP, discusses an overlooked topic in the cybersecurity field that deserves more attention, the top priorities for the year, and the top-line thing organizations must keep in mind if moving to the cloud.

Membership Required

You must be a member to access this content.

View Membership Levels

Explore related questions

Already a member? Log in here

More Resources

See All Related Content