SAP security

15 results

  1. cybersecurity

    Bridging the SAP Security Gap: How Fortinet and SecurityBridge Deliver Comprehensive Protection

    Reading time: 3 mins

    As SAP systems face heightened cyber threats due to digital transformation and fragmented security approaches, Fortinet and SecurityBridge’s partnership offers an integrated solution that enhances visibility and threat response by correlating network and SAP application activities.

  2. SAP’s Integration Solution Advisory Methodology (ISA-M) for the Intelligent Enterprise

    Streamlining SAP Patch Management in an Evolving Digital Landscape

    Reading time: 2 mins

    As cybersecurity threats increasingly target SAP systems, effective management of SAP patches through services like those offered by Markgraf Consulting is essential for organizations to navigate the complexities of patching while ensuring security and operational stability.

  3. Safeguarding SAP Landscapes Amidst Evolving Cyber Threats

    Reading time: 1 mins

    SAP security monitoring uses automated tools to manage vulnerabilities in access control and application security, yet ongoing threats like ransomware and insider risks necessitate comprehensive strategies and third-party services, such as those from Markgraf Consulting, to enhance defenses and ensure system integrity.

  4. NIS2 Compliance for SAP Solutions

    Reading time: 2 mins

    The NIS2 Directive, effective October 17, imposes stringent cybersecurity and incident reporting requirements on EU-based organizations, particularly those managing critical infrastructure and essential SAP solutions, while Layer Seven Security’s whitepaper offers guidance for compliance.

  5. cybersecurity

    ERP Security for Utility Companies – Onapsis Partners with SNOPUD to Secure Critical SAP Applications

    Reading time: 2 mins

    Cyberattacks on utility companies are increasingly targeting vulnerabilities in SAP applications, posing significant financial and operational risks, with the average cost of a data breach reaching $4.72 million. The energy sector, with its sensitive enterprise resource planning (ERP) systems like SAP, is particularly attractive to cybercriminals. Despite this, many utility companies struggle to allocate adequate…

  6. What the SOC?! Clarifying the Audit Certificate Chain and Shared Responsibility

    With the move to the cloud, managing multiple layers of responsibilities and trust relationships becomes crucial. This presentation explores how SAP handles these responsibilities through central controls, compliance tracking, and collaboration with cloud providers, ensuring security controls are in place and adhered to. Membership Required You must be a member to access this content.View Membership…

  7. Becoming Cyber Resilient: Why Transforming SAP Security as part of your SAP S/4HANA Upgrade is Vital

    Discover how Device Technologies transformed their SAP ECC 6.0 Security Model during their migration to SAP S/4HANA. By implementing an improved security design and governance framework, they effectively addressed risks such as excessive system access, misalignment with business processes, and segregation of duty concerns. Membership Required You must be a member to access this content.View…

  8. Tackling SAP Security Audits – Tips to Avoid the SAP Security Mop and Bucket

    In this presentation, Tina, an experienced Compliance Consultant, shares valuable insights on navigating SAP audits and ensuring compliance with regulatory and audit requirements. Learn how to audit IT controls effectively, assess the alignment of your organization with SAP audit requirements, and establish policies and procedures to handle SAP audits. Tina's expertise, gained from over 20…

  9. SAP Security and the Provisioning of SAP Access

    Reading time: 1 mins

    This article highlights the evolution of SAP security, access control (GRC), and IAM solutions, and discusses how organizations can choose the right solution for their needs, including a hybrid model. The article emphasizes the importance of collaboration between SAP security and cyber teams and encourages readers to consider their organization’s needs, business objectives, SAP footprint,…

  10. save

    IT Operation Transformations Do Not Have to Be Complicated, and They Will Save You Money

    Reading time: 10 mins

    Learn how SAP customers can minimize the manual effort involved in running and maintaining SAP environments by using intelligent technologies to automate repetitive tasks, eliminate human error, and improve the quality and availability of systems and business outcomes. CEO of Avantra, John Appleby, shares his insights on the paradigm shift that has occurred in much…