SAP security
Filter By
Browse By
- SAP Analytics and AI
- SAP Application Development and Integration
- All SAP Application Development and Integration
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP API Management
- SAP BAPI
- SAP Basis
- SAP BRF
- SAP Business Application Studio
- SAP CMS
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP EAI
- SAP EDI
- SAP Extension Suite
- SAP Fiori
- SAP Fiori Elements
- SAP Integration Suite
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Netweaver
- SAP Release Management
- SAP UI5
- SAP Web Application Server
- SAP Web IDE
- SAP Business Process Management
- SAP Center of Excellence
- SAP CIO
- SAP Customer Experience
- SAP Data and Data Management
- All SAP Data and Data Management
- SAP BW
- SAP BW/4HANA
- SAP Crystal Reports
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP DMS
- SAP Document Control
- SAP EIM
- SAP ETL
- SAP ETL Tools
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Studio
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP Enterprise Architect
- SAP Enterprise Asset Management
- SAP ERP
- SAP Finance
- All SAP Finance
- SAP Accounting
- SAP AR AP
- SAP Asset Accounting
- SAP Billing Systems
- SAP BPC
- SAP BRIM
- SAP Cash Management
- SAP Central Finance
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP Currency Risk
- SAP e-invoicing
- SAP FICO
- SAP Finance Automation
- SAP Advanced Financial Closing
- SAP Financial Consolidation
- SAP Financial Planning
- SAP FX Risk
- SAP General Ledger
- SAP Global Tax Management
- SAP Hyperion
- SAP Order to Cash
- SAP Payment Processing
- SAP Profitability Analysis
- SAP Rebate Management
- SAP S/4HANA Finance
- SAP SWIFT Compliance
- SAP Treasury Management
- SAP Universal Journal
- SAP Governance Risk and Compliance
- SAP Human Capital Management
- SAP Intelligent Technologies
- SAP Platform and Technology
- All SAP Platform and Technology
- SAP Business Technology Platform
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP Digital Signature
- SAP Container Platform
- SAP HANA Enterprise Cloud
- SAP Digital Asset Management
- SAP HEC
- SAP Digital Integration Hub
- SAP Hyperscalers
- SAP Infrastructure
- SAP Messaging
- SAP Smart Forms
- SAP Quality and Testing
- SAP Security
- SAP Spend Management
- SAP Supply Chain Management
- All SAP Supply Chain Management
- SAP APO
- SAP Asset Management
- SAP Business Network
- SAP Digital Manufacturing Cloud
- SAP Digital Twin
- SAP EWM
- SAP IBP
- SAP Inventory Management
- SAP Label Printing
- SAP Logistics
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP MES
- SAP MII
- SAP MM
- SAP MRO
- SAP MRP
- SAP Order Management
- SAP Plant Maintenance
- SAP PLM
- SAP Production Planning
- SAP S&OP
- SAP SD
- SAP SPM
- SAP Supply Chain Planning
- SAP Track and Trace
- SAP Transportation Management
- SAP System Administration
15 results
-
Bridging the SAP Security Gap: How Fortinet and SecurityBridge Deliver Comprehensive Protection
Reading time: 3 mins
As SAP systems face heightened cyber threats due to digital transformation and fragmented security approaches, Fortinet and SecurityBridge’s partnership offers an integrated solution that enhances visibility and threat response by correlating network and SAP application activities.
-
Streamlining SAP Patch Management in an Evolving Digital Landscape
Reading time: 2 mins
As cybersecurity threats increasingly target SAP systems, effective management of SAP patches through services like those offered by Markgraf Consulting is essential for organizations to navigate the complexities of patching while ensuring security and operational stability.
-
Safeguarding SAP Landscapes Amidst Evolving Cyber Threats
Reading time: 1 mins
SAP security monitoring uses automated tools to manage vulnerabilities in access control and application security, yet ongoing threats like ransomware and insider risks necessitate comprehensive strategies and third-party services, such as those from Markgraf Consulting, to enhance defenses and ensure system integrity.
-
-
NIS2 Compliance for SAP Solutions
Reading time: 2 mins
The NIS2 Directive, effective October 17, imposes stringent cybersecurity and incident reporting requirements on EU-based organizations, particularly those managing critical infrastructure and essential SAP solutions, while Layer Seven Security’s whitepaper offers guidance for compliance.
-
ERP Security for Utility Companies – Onapsis Partners with SNOPUD to Secure Critical SAP Applications
Reading time: 2 mins
Cyberattacks on utility companies are increasingly targeting vulnerabilities in SAP applications, posing significant financial and operational risks, with the average cost of a data breach reaching $4.72 million. The energy sector, with its sensitive enterprise resource planning (ERP) systems like SAP, is particularly attractive to cybercriminals. Despite this, many utility companies struggle to allocate adequate…
-
- SAP Security
Premium
What the SOC?! Clarifying the Audit Certificate Chain and Shared Responsibility
With the move to the cloud, managing multiple layers of responsibilities and trust relationships becomes crucial. This presentation explores how SAP handles these responsibilities through central controls, compliance tracking, and collaboration with cloud providers, ensuring security controls are in place and adhered to. Membership Required You must be a member to access this content.View Membership…
-
Premium
Becoming Cyber Resilient: Why Transforming SAP Security as part of your SAP S/4HANA Upgrade is Vital
Discover how Device Technologies transformed their SAP ECC 6.0 Security Model during their migration to SAP S/4HANA. By implementing an improved security design and governance framework, they effectively addressed risks such as excessive system access, misalignment with business processes, and segregation of duty concerns. Membership Required You must be a member to access this content.View…
-
-
- SAP Security
Premium
Tackling SAP Security Audits – Tips to Avoid the SAP Security Mop and Bucket
In this presentation, Tina, an experienced Compliance Consultant, shares valuable insights on navigating SAP audits and ensuring compliance with regulatory and audit requirements. Learn how to audit IT controls effectively, assess the alignment of your organization with SAP audit requirements, and establish policies and procedures to handle SAP audits. Tina's expertise, gained from over 20…
-
SAP Security and the Provisioning of SAP Access
Reading time: 1 mins
This article highlights the evolution of SAP security, access control (GRC), and IAM solutions, and discusses how organizations can choose the right solution for their needs, including a hybrid model. The article emphasizes the importance of collaboration between SAP security and cyber teams and encourages readers to consider their organization’s needs, business objectives, SAP footprint,…
-
IT Operation Transformations Do Not Have to Be Complicated, and They Will Save You Money
Reading time: 10 mins
Learn how SAP customers can minimize the manual effort involved in running and maintaining SAP environments by using intelligent technologies to automate repetitive tasks, eliminate human error, and improve the quality and availability of systems and business outcomes. CEO of Avantra, John Appleby, shares his insights on the paradigm shift that has occurred in much…
Become a Member
Unlimited access to thousands of resources for SAP-specific expertise that can only be found here.
Become a Partner
Access exclusive SAP insights, expert marketing strategies, and high-value services including research reports, webinars, and buyers' guides, all designed to boost your campaign ROI by up to 50% within the SAP ecosystem.
Upcoming Events
Related Vendors
Your request has been successfully sent