cyber security
Filter By
Browse By
- SAP Analytics and AI
- SAP Application Development and Integration
- All SAP Application Development and Integration
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP API Management
- SAP BAPI
- SAP Basis
- SAP BRF
- SAP Business Application Studio
- SAP CMS
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP EAI
- SAP EDI
- SAP Extension Suite
- SAP Fiori
- SAP Fiori Elements
- SAP Integration Suite
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Netweaver
- SAP Release Management
- SAP UI5
- SAP Web Application Server
- SAP Web IDE
- SAP Business Process Management
- SAP Center of Excellence
- SAP CIO
- SAP Customer Experience
- SAP Data and Data Management
- All SAP Data and Data Management
- SAP BW
- SAP BW/4HANA
- SAP Crystal Reports
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP DMS
- SAP Document Control
- SAP EIM
- SAP ETL
- SAP ETL Tools
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Studio
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP Enterprise Architect
- SAP Enterprise Asset Management
- SAP ERP
- SAP Finance
- All SAP Finance
- SAP Accounting
- SAP AR AP
- SAP Asset Accounting
- SAP Billing Systems
- SAP BPC
- SAP BRIM
- SAP Cash Management
- SAP Central Finance
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP Currency Risk
- SAP e-invoicing
- SAP FICO
- SAP Finance Automation
- SAP Advanced Financial Closing
- SAP Financial Consolidation
- SAP Financial Planning
- SAP FX Risk
- SAP General Ledger
- SAP Global Tax Management
- SAP Hyperion
- SAP Order to Cash
- SAP Payment Processing
- SAP Profitability Analysis
- SAP Rebate Management
- SAP S/4HANA Finance
- SAP SWIFT Compliance
- SAP Treasury Management
- SAP Universal Journal
- SAP Governance Risk and Compliance
- SAP Human Capital Management
- SAP Intelligent Technologies
- SAP Platform and Technology
- All SAP Platform and Technology
- SAP Business Technology Platform
- SAP Cloud
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP Digital Signature
- SAP Container Platform
- SAP HANA Enterprise Cloud
- SAP Digital Asset Management
- SAP Smart Forms
- SAP HEC
- SAP Digital Integration Hub
- SAP Hyperscalers
- SAP Infrastructure
- SAP Messaging
- SAP Quality and Testing
- SAP Security
- SAP Spend Management
- SAP Supply Chain Management
- All SAP Supply Chain Management
- SAP APO
- SAP Asset Management
- SAP Business Network
- SAP Digital Manufacturing Cloud
- SAP Digital Twin
- SAP EWM
- SAP IBP
- SAP Inventory Management
- SAP Label Printing
- SAP Logistics
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP MES
- SAP MII
- SAP MM
- SAP MRO
- SAP MRP
- SAP Order Management
- SAP Plant Maintenance
- SAP PLM
- SAP Production Planning
- SAP S&OP
- SAP SD
- SAP SPM
- SAP Supply Chain Planning
- SAP Track and Trace
- SAP Transportation Management
- SAP System Administration
13 results
-
Fortinet Expands Workspace Security to Safeguard SAP and Hybrid Enterprises
Reading time: 3 mins
Fortinet has significantly expanded its cybersecurity platform with the AI-driven FortiMail Workspace Security Suite, enhancing protection for enterprise email and collaboration tools, particularly for SAP customers.
-
Bridging the Security Gap: SecurityBridge Launches SIEM and ITSM for SAP
Reading time: 4 mins
SecurityBridge has introduced SIEM and ITSM for SAP, enhancing integration between SAP security and enterprise IT security operations to improve threat detection, streamline incident response, and bolster compliance management.
-
apexanalytix Debuts Cyber Risk Solution to Prevent Supplier Data Loss and Operational Disruption
Reading time: 4 mins
In mid-2024, apexanalytix launched its Cyber Risk solution, designed to enhance supplier risk management by automatically assessing supplier cybersecurity, monitoring dark web threats, and providing real-time incident responses, addressing the rising complexities and financial impacts of cyberattacks on supply chains.
-
-
Improved Cyber Risk Management with Markgraf Consulting
Reading time: 2 mins
Recent SAPinsider research highlights unpatched systems, ransomware, and credential compromise as significant cybersecurity threats, emphasizing the necessity for organizations to adopt proactive measures and tailored solutions from consulting firms like Markgraf Consulting to safeguard their SAP systems against evolving risks.
-
Securing SAP Systems in the Age of Artificial Intelligence
Reading time: 2 mins
Historically, SAP has employed conventional methods to secure its systems. However, the most critical areas in SAP cybersecurity now require professionals to leverage AI. The widespread adoption of artificial intelligence (AI) technology has introduced challenges in ensuring the security of SAP systems. To address the evolving cyber threats in the SAP ecosystem, cybersecurity experts specializing…
-
- SAP SuccessFactors
Premium
Maintaining Business Objectives and Lifting Maturity – Are You Doing It?
In this presentation, James Mouat and Naomi Benjamin delve into the critical aspects of maintaining business objectives and elevating maturity in the context of deploying business solutions, particularly those involving People data. They examine the need for organizations to adapt and evolve their solutions in response to changing internal business requirements, evolving regulatory landscapes, and…
-
SAP Security and the Provisioning of SAP Access
Reading time: 1 mins
This article highlights the evolution of SAP security, access control (GRC), and IAM solutions, and discusses how organizations can choose the right solution for their needs, including a hybrid model. The article emphasizes the importance of collaboration between SAP security and cyber teams and encourages readers to consider their organization’s needs, business objectives, SAP footprint,…
-
-
Protect Your SAP Data from Bad Accidents and Bad Actors- Webinar
August 13, 2021
When systems that house sensitive data and serve as the operational backbone for organizations get disrupted, it can cause detrimental and costly problems for your organization. These days, companies must deal with a plethora of bad actors looking to disrupt and disable operations for profit or malice. In addition to traditional data protection, it is…
-
Protecting SAP Systems from Ransomware Attacks
June 25, 2021
Ransomware is headline news, and recent attacks have demonstrated the devastating impact of attacks that target critical infrastructure. According to the Department of Homeland Security ransomware attacks have increased by 300% over the past year, impacting all industries and sectors. The average downtime from an attack is 21 days, but full recovery takes an average…
-
Protecting SAP Systems from Ransomware Attacks
June 24, 2021
Ransomware is headline news, and recent attacks have demonstrated the devastating impact of attacks that target critical infrastructure. According to the Department of Homeland Security ransomware attacks have increased by 300% over the past year, impacting all industries and sectors. The average downtime from an attack is 21 days, but full recovery takes an average…
Become a Member
Unlimited access to thousands of resources for SAP-specific expertise that can only be found here.
Become a Partner
Access exclusive SAP insights, expert marketing strategies, and high-value services including research reports, webinars, and buyers' guides, all designed to boost your campaign ROI by up to 50% within the SAP ecosystem.
Upcoming Events
Related Vendors
Your request has been successfully sent