Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

60 results

  1. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…
  2. Plan for Risks and Recovery in Sybase Mobile Sales for SAP CRM

    /MobileFind out how to identify assets, assess risks, mitigate residual risks, and implement backup and recovery options for Sybase Mobile Sales for SAP CRM. Key Concept Sybase Mobile Sales for SAP CRM offers a range of features for a mobile sales, service, or marketing professional. Sybase uses SAP NetWeaver technology for integration with mobile applications…....…
  3. Best Practices for Secure Programming in SAP NetWeaver

    Review best practices that you should employ in application development with particular emphasis on the functionalities available in SAP NetWeaver that guarantee secure programming. Key Concept Secure programming aims at enforcing security and control in the life cycle of applications by circumventing the perpetration of malicious acts on programs. You can accomplish this via the…...…
  4. Explore Cloud Services for Application Testing While Controlling Risks through Governance

    Service rentals, faster service, low operational costs, and lower energy costs are some of the reasons for the increasing popularity of cloud services for application testing. Testing procedures, economies of scale, service governance, and jurisdictional issues are the criteria in selecting a cloud service. To protect test plans and tools against unauthorized access, risks are…...…
  5. Defend Mobile SAP CRM Systems with Defense in Depth

    /MobileLearn how to defend SAP CRM applications on a smartphone or a handheld device (with BlackBerry Sales Client as a specific example), and see why multiple layers of defense are more effective than a single layer when you use the defense-in-depth model. Key Concept Defense in depth is a strategy for creating multiple layers of…...…
  6. Securing and Governing Data at Rest

    Data at rest is a high-value target for hackers. It is a source of people, banking, product, and intellectual property information that is highly valuable for resale or creating counterfeit products. It includes quality assurance systems, development environments, client copies, disaster recovery sites, archives, and online backups. In this article, SAPinsider cybersecurity expert Julie Hallet…
  7. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

    Reading time: 5 mins

    Read this blog written by an SAP security and compliance lead for advice on how companies can best ensure their networks are secure. Learn the steps necessary to evaluate, identify, and craft effective cybersecurity umbrellas for SAP systems.
  8. A Dose of AI Could Be the Cure for Hospital Data Center Cyberattacks

    Machine learning can help protect electronic health records from hackers. This content is for Basic Access, SAPinsider Monthly Subscription, SAPinsider Annual Subscription, and SAPinsider Premium Annual Subscription members only.Log In Join Now
  9. Why Supplementing SAP Cybersecurity Is Vital

    Everything that makes SAP systems so useful for business operations also makes them crucial to protect. All of the critical data stored within must be safeguarded with the highest priority. In this article, you can learn about the best ways to find third-party solutions to security issues and dissolve the silos that can hamper your…
  10. Do I Really Need an SAP SECOPS Program?

    Companies may not believe that an SAP SECOPS program is necessary, but there may be more factors at play than they considered. In this article, SAPinsider Bill Oliver will walk you through some of the key considerations that SAP users must make when setting up their overall security plan. Some organizations that simply having their…