SAP cybersecurity
Filter By
Browse By
- SAP Analytics and AI
- SAP Application Development and Integration
- All SAP Application Development and Integration
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP API Management
- SAP BAPI
- SAP Basis
- SAP BRF
- SAP Business Application Studio
- SAP CMS
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP EAI
- SAP EDI
- SAP Extension Suite
- SAP Fiori
- SAP Fiori Elements
- SAP Integration Suite
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Netweaver
- SAP Release Management
- SAP UI5
- SAP Web Application Server
- SAP Web IDE
- SAP Business Process Management
- SAP Center of Excellence
- SAP CIO
- SAP Customer Experience
- SAP Data and Data Management
- All SAP Data and Data Management
- SAP BW
- SAP BW/4HANA
- SAP Crystal Reports
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP DMS
- SAP Document Control
- SAP EIM
- SAP ETL
- SAP ETL Tools
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Studio
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP Enterprise Architect
- SAP Enterprise Asset Management
- SAP ERP
- SAP Finance
- All SAP Finance
- SAP Accounting
- SAP AR AP
- SAP Asset Accounting
- SAP Billing Systems
- SAP BPC
- SAP BRIM
- SAP Cash Management
- SAP Central Finance
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP Currency Risk
- SAP e-invoicing
- SAP FICO
- SAP Finance Automation
- SAP Advanced Financial Closing
- SAP Financial Consolidation
- SAP Financial Planning
- SAP FX Risk
- SAP General Ledger
- SAP Global Tax Management
- SAP Hyperion
- SAP Order to Cash
- SAP Payment Processing
- SAP Profitability Analysis
- SAP Rebate Management
- SAP S/4HANA Finance
- SAP SWIFT Compliance
- SAP Treasury Management
- SAP Universal Journal
- SAP Governance Risk and Compliance
- SAP Human Capital Management
- SAP Intelligent Technologies
- SAP Platform and Technology
- All SAP Platform and Technology
- SAP Business Technology Platform
- SAP Cloud
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP Digital Signature
- SAP Container Platform
- SAP HANA Enterprise Cloud
- SAP Digital Asset Management
- SAP Smart Forms
- SAP HEC
- SAP Digital Integration Hub
- SAP Hyperscalers
- SAP Infrastructure
- SAP Messaging
- SAP Quality and Testing
- SAP Security
- SAP Spend Management
- SAP Supply Chain Management
- All SAP Supply Chain Management
- SAP APO
- SAP Asset Management
- SAP Business Network
- SAP Digital Manufacturing Cloud
- SAP Digital Twin
- SAP EWM
- SAP IBP
- SAP Inventory Management
- SAP Label Printing
- SAP Logistics
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP MES
- SAP MII
- SAP MM
- SAP MRO
- SAP MRP
- SAP Order Management
- SAP Plant Maintenance
- SAP PLM
- SAP Production Planning
- SAP S&OP
- SAP SD
- SAP SPM
- SAP Supply Chain Planning
- SAP Track and Trace
- SAP Transportation Management
- SAP System Administration
13 results
-
Pathlock Unveils All-in-One Cybersecurity Suite to Lock Down SAP Landscapes
Reading time: 3 mins
Pathlock has launched its Cybersecurity Application Controls suite, a comprehensive platform designed to enhance SAP security through automated detection and dynamic access controls, providing affordable solutions including a free tier to empower all SAP customers against evolving cyber threats.
-
Rev-Trac Release Management Workbench
Reading time: 1 min
Rev-Trac’s Release Management Workbench enhances SAP change control by organizing transports into releases, offering real-time visibility, automated sequencing, and safety checks to improve efficiency and minimize deployment risks.
-
Cognizant & CrowdStrike Partner to Strengthen Enterprise Security and Simplify Threat Defense
Reading time: 3 mins
As businesses increasingly adopt various cloud service models, they must enhance their cybersecurity measures with AI-driven, unified approaches to protect against sophisticated threats that target complex cloud environments.
-
-
NIS2 Compliance for SAP Solutions
Reading time: 2 mins
The NIS2 Directive, effective October 17, imposes stringent cybersecurity and incident reporting requirements on EU-based organizations, particularly those managing critical infrastructure and essential SAP solutions, while Layer Seven Security’s whitepaper offers guidance for compliance.
-
- SAP CyberSecurity
Premium
CrowdStrike Outage: Lessons Learned for SAP Solutions
Reading time: 3 mins
The recent Microsoft operating systems outage has highlighted significant concerns for global cybersecurity systems. This incident underscores the challenges in development and release management procedures, as it's impractical to test updates against every possible scenario. Historical issues, like CrowdStrike updates causing crashes in SAP BusinessObjects, illustrate these challenges. The outage raises questions about software design…
-
- SAP CyberSecurity
Premium
Protecting SAP Solutions from Cyber Threats with Onapsis
Reading time: 1 mins
Recent SAPinsider research highlights that protecting sensitive data in SAP systems is a major concern for SAP customers. Traditional security efforts focused on managing access, but new research by Onapsis and Flashpoint reveals an increase in cyber threats targeting SAP systems. Ransomware incidents have surged by 400%, and discussions about SAP vulnerabilities on various web…
-
Reviewing 20 years of Biometric Granular Controls in SAP with bioLock
Reading time: 7 mins
With fraud and other malfeasance increasing, companies now need to look for more solutions to keep their secure information safe. As fraud has gotten more advanced, companies have realized that they also need to add advanced levels of protection. Unfortunately, more and more enterprises have realized too late that their security standards were not high…
-
-
Addressing Cybersecurity by Utilizing a Reactive Approach to SAP Landscapes
Reading time: 2 mins
SAP users know it is crucial to establish a system that would help navigate cybersecurity risks. However, what strategy should they turn to?
-
Securing SAP Systems in the Age of Artificial Intelligence
Reading time: 2 mins
Historically, SAP has employed conventional methods to secure its systems. However, the most critical areas in SAP cybersecurity now require professionals to leverage AI. The widespread adoption of artificial intelligence (AI) technology has introduced challenges in ensuring the security of SAP systems. To address the evolving cyber threats in the SAP ecosystem, cybersecurity experts specializing…
-
- SAP CyberSecurity
Premium
Research Webinar: Cybersecurity Threats to SAP Systems 2023
July 13, 2023
In 2023, the focus of cybersecurity strategies for SAP systems shifted away from ransomware and malware attacks to addressing unpatched systems, concentrating on addressing system vulnerabilities over attack vectors. Exploring the details behind these changes, SAPinsider revealed some interesting in year-over-year trends during its third year of research on cybersecurity threats. Increasing regulatory compliance requirements,…
Become a Member
Unlimited access to thousands of resources for SAP-specific expertise that can only be found here.
Become a Partner
Access exclusive SAP insights, expert marketing strategies, and high-value services including research reports, webinars, and buyers' guides, all designed to boost your campaign ROI by up to 50% within the SAP ecosystem.
Upcoming Events
Related Vendors
Your request has been successfully sent