SAP Security and the Provisioning of SAP Access

608 results

  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

    Reading time: 2 mins

    On May 4, SAP announced that, while performing regular internal reviews of the company’s cybersecurity infrastructure, they discovered several of the company’s cloud products “do not meet one or several contractually agreed or statutory IT security standards.” Learn what this means for the SAPinsider Community.
  2. Proven Techniques and Strategies to Fortify Your SAP Landscape from Cybersecurity Threats

    Reading time: 19 mins

    Modern cybersecurity threats are growing in complexity, scale, and speed. In this live Q&A, SAPinsider GRC 2017 speaker Peter Hobson dove into cybersecurity as it relates to your SAP landscape. Read the transcript to get expert answers to your questions on topics like role design, controls, vulnerability scans, supporting tools, and more. What type of…...…
  3. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Reading time: 28 mins

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…
  4. Using SAP UI Logging & the SAP Security Audit Log to monitor events to mitigate Cyber Security Risks

    Protecting an organization’s data has never been more challenging. The cost of a data leak goes far beyond fines – impacting both investor and consumer confidence, causing potentially catastrophic harm to brand and reputation. Proactively addressing risk through logging user interaction, coupled with masking sensitive confidential data provides much needed tracking, auditability and safeguarding. SAP…
  5. security

    Why Supplementing SAP Cybersecurity Is Vital

    Reading time: 9 mins

    Everything that makes SAP systems so useful for business operations also makes them crucial to protect. All of the critical data stored within must be safeguarded with the highest priority. In this article, you can learn about the best ways to find third-party solutions to security issues and dissolve the silos that can hamper your…
  6. Combat Chaos with a Lock-Down Security Policy in 12 Key Areas of Your SAP Environment

    Reading time: 19 mins

    Security policies and procedures should be a central concern of all employees of an organization. Review important areas of the SAP ERP system that has to be driven by effective security policies. Key Concept A security policy is a formal statement of principles, rules, goals, and objectives of an organization aimed at securing the assets…...…
  7. Part 2: Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Reading time: 23 mins

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also learn how to assign the created profiles to specific users or groups of users. Finally, watch the accompanying demo video to learn how to use the security editor to create different security profiles. Key Concept The security editor…...…
  8. 5 Pillars for Addressing Cybersecurity and Data Protection: SAP Highlights Key Areas for Organizations to Focus on to Build Digital Trust with Employees and Customers

    Reading time: 11 mins

    by Bruce Romney, Senior Director of Product Marketing, GRC and Security Solutions, SAP and Erin Hughes, SAP S/4HANA Finance and Governance, Risk, and Compliance (GRC) Center of Excellence, SAP North America and Thomas Frénéhard, Global Finance and Risk Center of Excellence, SAP What are today’s business leaders most focused on and what are their top…...…
  9. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    Reading time: 19 mins

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…
  10. Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Reading time: 16 mins

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also, learn how to assign the created profiles to specific users or groups of users.  This content is available to (General or Premium) members. Sign in or Join for free! Sign In Become a Member