High Profile Vulnerabilities in SAP Applications and How to Be Prepared

902 results

  1. The Power of Prevention

    Reading time: 11 mins

    The onset of COVID-19 in 2020 ushered a new workforce paradigm in which normal security patching operations were left vulnerable to cyberattacks. Today’s remote, cloud-based environment requires a level of security awareness and prevention that brings together SAP, customers and external security researchers. Aditi Kulkarni, Product Security Senior Specialist for SAP Labs India, provides a…
  2. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Reading time: 28 mins

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…
  3. Part 2: Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Reading time: 23 mins

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also learn how to assign the created profiles to specific users or groups of users. Finally, watch the accompanying demo video to learn how to use the security editor to create different security profiles. Key Concept The security editor…...…
  4. Cybersecurity Considerations for SAP Mobile Applications

    Reading time: 15 mins

    Panelist: Juan Perez-Etchegoyen, Onapsis Date: Thursday, October 12 Kendall Hatch Hello, and welcome to today’s live Q&A on security considerations for SAP mobile applications. I’m Kendall Hatch, Conference Producer for SAPinsider, and I’m excited to introduce today’s panelist, Juan Perez-Etchegoyen, CTO at Onapsis. Juan is also a speaker at the upcoming SAPinsider Cybersecurity for SAP Customers conference…...…
  5. Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Reading time: 16 mins

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also, learn how to assign the created profiles to specific users or groups of users.  This content is available to (General or Premium) members. Sign in or Join for free! Sign In Become a Member
  6. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    Reading time: 19 mins

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…
  7. Part 3: Implementing Security in BusinessObjects Universes with Security Tables

    Reading time: 16 mins

    Learn how to implement security in SAP BusinessObjects Universes using database security tables. Learn how to establish and create database security tables, store security information in those tables, import the tables into your Universe, and join the tables with your current Universe model by joining them with the corresponding tables in the Universe. Finally, find…...…
  8. Protect Your SAP HANA Environment: Live Q&A on Security Best Practices

    Reading time: 23 mins

    Rapid data center and infrastructure advancements have created endless new opportunities – especially for those who are now live on SAP HANA or SAP S/4HANA. However, now that you’re live, how do you protect your investment? Are you automating OS patch deployment and compliance across your SAP landscape? Are you looking to decrease total cost…...…
  9. Part 1: An Introduction to Security Implementations in the SAP BusinessObjects BI Platform

    Reading time: 20 mins

    Gain an overview of the enterprise security model in the SAP BusinessObjects BI platform. Learn the main differences between the three different types of security-access levels (e.g., object-level, application-level, and data-level) and discover the right case or business scenario in which to use each security-access level. Finally, learn how to create and use a security…...…
  10. How to Use Structural Authorizations for Effective HR Strategy and Security

    Reading time: 20 mins

    Proper SAP ERP HCM security involves more than just assigning traditional security roles to user IDs. Learn the importance of creating an effective SAP HR security strategy and how structural authorizations and position-based security play a role in this strategy. Get recommendations for proper HR security strategy design and the steps for implementing structural authorizations…...…