Improved Cyber Risk Management with Markgraf Consulting
Filter By
Browse By
- SAP Analytics and AI
- SAP Application Development and Integration
- All SAP Application Development and Integration
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP API Management
- SAP BAPI
- SAP Basis
- SAP BRF
- SAP Business Application Studio
- SAP CMS
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP EAI
- SAP EDI
- SAP Extension Suite
- SAP Fiori
- SAP Fiori Elements
- SAP Integration Suite
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Netweaver
- SAP Release Management
- SAP UI5
- SAP Web Application Server
- SAP Web IDE
- SAP Business Process Management
- SAP Center of Excellence
- SAP CIO
- SAP Customer Experience
- SAP Data and Data Management
- All SAP Data and Data Management
- SAP BW
- SAP BW/4HANA
- SAP Crystal Reports
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP DMS
- SAP Document Control
- SAP EIM
- SAP ETL
- SAP ETL Tools
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Studio
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP Enterprise Architect
- SAP Enterprise Asset Management
- SAP ERP
- SAP Finance
- All SAP Finance
- SAP Accounting
- SAP AR AP
- SAP Asset Accounting
- SAP Billing Systems
- SAP BPC
- SAP BRIM
- SAP Cash Management
- SAP Central Finance
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP e-invoicing
- SAP FICO
- SAP Finance Automation
- SAP Financial Closing Cockpit
- SAP Financial Consolidation
- SAP Financial Planning
- SAP FX Risk
- SAP General Ledger
- SAP Global Tax Management
- SAP Hyperion
- SAP Order to Cash
- SAP Payment Processing
- SAP Profitability Analysis
- SAP Rebate Management
- SAP S/4HANA Finance
- SAP Universal Journal
- SAP Governance Risk and Compliance
- SAP Human Capital Management
- SAP Intelligent Technologies
- SAP Platform and Technology
- All SAP Platform and Technology
- SAP Business Technology Platform
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP Container Platform
- SAP Digital Asset Management
- SAP Digital Integration Hub
- SAP Digital Signature
- SAP HANA Enterprise Cloud
- SAP HEC
- SAP Hyperscalers
- SAP Infrastructure
- SAP Messaging
- SAP Smart Forms
- SAP Quality and Testing
- SAP Security
- SAP Spend Management
- SAP Supply Chain Management
- All SAP Supply Chain Management
- SAP APO
- SAP Asset Management
- SAP Business Network
- SAP Digital Manufacturing Cloud
- SAP Digital Twin
- SAP EWM
- SAP IBP
- SAP Inventory Management
- SAP Label Printing
- SAP Logistics
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP MES
- SAP MII
- SAP MM
- SAP MRO
- SAP MRP
- SAP Order Management
- SAP Plant Maintenance
- SAP PLM
- SAP Production Planning
- SAP S&OP
- SAP SD
- SAP SPM
- SAP Supply Chain Planning
- SAP Track and Trace
- SAP Transportation Management
- SAP System Administration
319 results
-
Securing SAP Systems
Panelists: Frederik Weidemann and Stephen Lamy Sponsor: Virtual Forge Your SAP systems and the data within are an integral part of your business. You need to ensure your SAP applications are secure and stable, but there are a wide array of cybersecurity threats to worry about. Find out how to secure your SAP landscape from...…
-
Deception Technology for SAP System Security
Protecting business-critical data is becoming increasingly complex—and by extension, increasingly relevant for today’s organizations. One critical element of this evolution is their increasing reliance on, and hyperconnectivity across foundational technologies such as data centers, cloud platforms, SaaS applications, and broadly adopted software vendors like Microsoft and SAP.
-
Foundational SAP Security
Security breaches are discussed in the media multiple times a week and the targets are not only major corporations. Smaller enterprises can be just as vulnerable. There is also a knowledge gap when it comes to securing SAP systems not just from a network perspective but in terms of the cloud as well. No matter…
-
-
The Missing Link: Compliance at the Code Level
Establishing security processes, developer training, and tools right from day one of development projects leads to initially higher investments. However, the savings resulting from lower cost for corrections and lower risk for cyber attacks in the final product are going to outweigh the initial investments substantially. See some examples of insecure code issues and some...…
-
Strategies to Thwart Ransomware and Supply Chain Attacks
Today, enterprises are confronting a myriad of cyberthreats. Two of the most destructive are ransomware and software supply chain attacks. Ransomware attacks have soared over the last couple of years, and that trend has only accelerated. In fact, ransomware attacks have increased 57% since the beginning of this year, and the average number of companies…
-
Best Practices for Secure Programming in SAP NetWeaver
Review best practices that you should employ in application development with particular emphasis on the functionalities available in SAP NetWeaver that guarantee secure programming. Key Concept Secure programming aims at enforcing security and control in the life cycle of applications by circumventing the perpetration of malicious acts on programs. You can accomplish this via the...…
-
Requirements for Securing Cloud-Based Systems
As organizations accelerate the move of enterprise applications and data into cloud-based and cloud-resident systems, it’s extremely important to ensure that security is in place early to avoid having to backtrack and address these issues. Whether systems are running in Software-as-a-Service, Platform-as-a-Service, or Infrastructure-as-a-Service environments, each deployment offers unique security challenges. This track will help…
-
-
The Security and Compliance Landscape for SAP Systems
The rapid shift to remote working has made every employee their own security perimeter, something that has been already a challenge for organizations dealing with a workforce increasingly using mobile solutions. Those running SAP solutions need to enhance security to secure this more distributed work force, as well as addressing rapidly changing employee responsibilities which…
-
The simulated cyber-attacks helping businesses stay secure
ImpactQA's CEO speaks to SAPInsider on the simulated cyber attack methodology readying businesses’ operations against potential hackers. Membership Required You must be a member to access this content.View Membership LevelsAlready a member? Log in here
-
Improved Cyber Risk Management with Markgraf Consulting
Reading time: 2 mins
Recent SAPinsider research highlights unpatched systems, ransomware, and credential compromise as significant cybersecurity threats, emphasizing the necessity for organizations to adopt proactive measures and tailored solutions from consulting firms like Markgraf Consulting to safeguard their SAP systems against evolving risks.
Become a Member
Unlimited access to thousands of resources for SAP-specific expertise that can only be found here.
Become a Partner
Access exclusive SAP insights, expert marketing strategies, and high-value services including research reports, webinars, and buyers' guides, all designed to boost your campaign ROI by up to 50% within the SAP ecosystem.
Upcoming Events
Related Vendors
Your request has been successfully sent