"Security is not simply a subset of IT"

811 results

  1. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Reading time: 28 mins

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…
  2. application security - image

    Application Security Imperiled by Attackers

    Reading time: 6 mins

    Application security is being threatened by cyberattacks on the application layer, such as SAP S/4HANA systems, which target valuable resources organizations store there. Despite the increase in attacks, companies are not allocating resources to combat these threats. SAP customers understand the severe problem of application security and are looking for a solution to stop cyberattacks.…
  3. Secure Your Enterprise Application with Authentication in SAP NetWeaver Web AS Java

    Reading time: 21 mins

    One of a company’s worst nightmares is the theft of customer or other confidential data. To avoid having unauthorized parties view this data, you should secure your enterprise applications. Find out how you can carry this out by using the Java Authentication and Authorization Service in SAP NetWeaver Application Server Java. Key Concept In SAP…...…
  4. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    Reading time: 19 mins

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…
  5. Best Practices for Secure Programming in SAP NetWeaver

    Reading time: 16 mins

    Review best practices that you should employ in application development with particular emphasis on the functionalities available in SAP NetWeaver that guarantee secure programming. Key Concept Secure programming aims at enforcing security and control in the life cycle of applications by circumventing the perpetration of malicious acts on programs. You can accomplish this via the…...…
  6. The Missing Link: Compliance at the Code Level

    Reading time: 16 mins

    Establishing security processes, developer training, and tools right from day one of development projects leads to initially higher investments. However, the savings resulting from lower cost for corrections and lower risk for cyber attacks in the final product are going to outweigh the initial investments substantially. See some examples of insecure code issues and some…...…
  7. Part 2: Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Reading time: 23 mins

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also learn how to assign the created profiles to specific users or groups of users. Finally, watch the accompanying demo video to learn how to use the security editor to create different security profiles. Key Concept The security editor…...…
  8. Technical Considerations for Executing an SAPUI5 Project

    Reading time: 22 mins

    Follow these best practices and tips outlined by Ameya Pimpalgaonkar if you are planning to execute an SAPUI5 project. See how an SAPUI5 project differs from a traditional project and why the design process is essential if you want to avoid technical errors. Key Concept It is essential that all SAPUI5 projects begin with a…...…
  9. Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Reading time: 16 mins

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also, learn how to assign the created profiles to specific users or groups of users.  This content is available to (General or Premium) members. Sign in or Join for free! Sign In Become a Member
  10. Securing the Cloud with SAP Cloud Platform

    Reading time: 9 mins

    Security is a major concern for anyone considering a move to the cloud ― along with the benefits of digitizing come increased risks due to code vulnerabilities, missing implementation of security patches, and misconfigurations, among others. So how do you make a successful transition to the digital economy without compromising your business? Learn how SAP…