"Security is not simply a subset of IT"

824 results

  1. How to Configure SAP Enterprise Threat Detection for Increased Surveillance and Real-Time Analysis of Security Threats

    Reading time: 29 mins

    Mining of important security-related logs has always been a challenge for most enterprises in terms of how to gain appropriate security intelligence from collected data sets in order to forestall malicious attacks from within and outside an enterprise. Kehinde Eseyin shows how to set up the SAP Enterprise Threat Detection system landscape to facilitate log…...…
  2. An Integrated Approach to Identifying Security Risks

    Reading time: 12 mins

    As technology becomes more sophisticated, so do the cyberattacks that aim to steal and even manipulate data. In response to this new rise in cybercrime, SAP released SAP Enterprise Threat Detection, a native SAP HANA application that quickly identifies suspicious patterns in log data and generates alerts to notify the appropriate personnel to take action.…
  3. Case study | Threat detection in SAP applications & implementation of SAP Enterprise Threat Detection

    An important component of a comprehensive security strategy is control over activities performed within the SAP environment to ensure landscape security . This includes monitoring applications behavior with respect to policies and regulatory requirements. This session will discuss three customer scenarios both before and after implementing SAP Enterprise Threat Detection. Scenario 1 Before implementing SAP…
  4. Protect Your SAP Systems from Cyberattacks

    Protect Your SAP Systems from Cyberattacks

    Reading time: 9 mins

    This article looks at how SAP Enterprise Threat Detection addresses organizations’ pressing needs for protecting modern SAP landscapes.
  5. The business benefits of SAP Enterprise Threat Detection

    Nowadays, not a day goes by without a new data breach being reported in the news. Cyber-attacks often target our IT infrastructure using phishing, smishing, ransomware or malware. The goal is often to disrupt a company's operations, encrypt databases or block access to carry out extortion. The average time to contain a security breach is…
  6. Cybersecurity: Case study: How McKesson uses SAP Enterprise Threat Detection to identify and mitigate risks

    Reading time: 1 mins

    Learn how McKesson, the largest U.S. pharmaceutical distributor, implemented SAP Enterprise Threat Detection to strengthen its cybersecurity position. Click this link to view the slides from this session — Cyber_2017_Kuo_Wienand_Casestudyhowmckessonusessap.     Benjamin Wienand If you have comments about this article or publication, or would like to submit an article idea, please contact the editor…....…
  7. Cybersecurity sessions

    Securing the Intelligent Enterprise with SAP’s Enterprise Threat Detection

    Reading time: 2 mins

    The heightened global prevalence of cyber threats has amplified the urgency for organizations to move beyond the traditional preventive measures. Organizations now need to adopt more stringent protocols for real-time monitoring, threat detection, and swift response in order to effectively protect their businesses. This article discusses SAP’s Enterprise Threat Detection, a comprehensive offering that enables…
  8. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Reading time: 28 mins

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…
  9. Detect and Prevent Malicious Business Transactions with SAP Fraud Management

    Reading time: 23 mins

    Learn how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents. Key Concept The Serious Fraud Office (SFO), which is a department in the office of the US Attorney General, defines fraud as an act of deception intended for personal gain or…...…
  10. Security in the Digital Era: How SAP Runs Secure

    Reading time: 6 mins

    There’s no arguing against the benefits of digital technologies and the innovations that come with cloud computing, mobility, and the Internet of Things (IoT). But there’s also no arguing against the fact that a new generation of digital technologies also means a new generation of cyberthreats. As you adopt new IT strategies, how will your…