Transforming Data-Centric Security with NextLabs

54 results

  1. The Impact of PCI-Validated P2PE

    Join Delego and Bluefin for an upcoming webinar ‘Securing SAP with PCI-Validated P2PE’ on June 15, 11:00 a.m. ET. The State of Data Security In the past few years, the rate of merchant data breaches has grown dramatically. In many cases—from high-profile merchant breaches such as Target and Home Depot to much smaller ones—forensic investigations…

  2. How PCI Security Compliance Requirements Affect Your SAP System

    Card issuers are requiring merchants, banks, service providers, and card processors to take stringent measures to protect stored data. Establishing user security roles and minimizing end-user access to non-encrypted card data within your SAP system is essential for compliance. Key Concept The Payment Card Industry Data Security Standard (PCI DSS) represents a common set of…...…

  3. The Missing Link: Compliance at the Code Level

    Establishing security processes, developer training, and tools right from day one of development projects leads to initially higher investments. However, the savings resulting from lower cost for corrections and lower risk for cyber attacks in the final product are going to outweigh the initial investments substantially. See some examples of insecure code issues and some…...…

  4. What to Consider When Integrating PP-PI in APO SNP and PP/DS

    Reading time: 17 mins

    Watch out for surprises when you integrate Production Planning for Process Industries with Advanced Planning and Optimization. Learn how to best set up recipes and capacity consumption in this environment to avoid errors. Key Concept Production Planning for Process Industries (PP- PI) is a planning tool in R/3 and SAP ERP Central Component used in…...…

  5. Cybersecurity sessions

    Transforming Data-Centric Security with NextLabs

    Reading time: 4 mins

    As organizations face complex and evolving cyber threats, many are adopting the Zero Trust security model, which counters the inadequacies of traditional perimeter-based defenses by adopting a default-deny approach that treats all access requests, including internal ones, with suspicion. This paradigm shift strengthens data security through rigorous access controls and continuous monitoring to mitigate data…

  6. Cloud Computing for SAP CRM

    Learn background information on cloud computing deployment models and see how to select a cloud service to meet your on-demand service requirements. Key Concept Cloud computing is a technology that enables the delivery of on-demand services over the Web on or off premise. Cloud computing can improve your SAP CRM operations at three service levels…...…

  7. Designing SAP Fiori and SAP HANA Applications with Security in Mind

    Panelist: Frederik Weidemann, Virtual Forge Date: Tuesday, September 25 Sponsor: Cybersecurity for SAP Customers Virtual Forge’s Frederik Weidemann, a speaker at the upcoming SAPinsider Cybersecurity for SAP Customers conference, answered user questions on building secure SAP Fiori and SAP HANA applications. SAPUI5 applications are responsive across browsers and devices and the UI controls automatically adapt…...…

  8. Avoid Losing Valuable Sales and Customer Data by Using Backup and Recovery in Depth

    Find out why multiple, in-depth layers of recovery parameters are more effective than a single layer when backing up and recovering SAP CRM data, business processes, and event logs. Key Concept Backup and recovery in depth refers to the strategy of creating multiple layers of recovery parameters (rather than a single layer) to better back…...…

  9. Spotlight: An SAP Security Architect Comments on Methods to Keep SAP HANA Secure

    SAP Professional JournalIn this question-and-answer article, you’ll learn what measures to take to secure SAP HANA-based applications. SAP HANA environments typically have far more users directly accessing back-end systems than conventional environments. Therefore, it is critical to configure effective audit policies to monitor actions that include SELECT, INSERT, UPDATE, DELETE, EXECUTE, and other SQL statements…...…

  10. 5 Tips to Improve Your mySAP CRM Reports and Analytics

    These five data modeling tips help you create a comprehensive mySAP CRM data warehouse using SAP Business Information Warehouse functionality to bring together data from the necessary disparate sources. Key Concept Modeling CRM data differs from modeling other data in SAP Business Information Warehouse (BW) in several aspects. For example, mySAP CRM uses a closer…...…