What the SOC?! Clarifying the Audit Certificate Chain and Shared Responsibility

467 results

  1. Foundational SAP Security

    Security breaches are discussed in the media multiple times a week and the targets are not only major corporations. Smaller enterprises can be just as vulnerable. There is also a knowledge gap when it comes to securing SAP systems not just from a network perspective but in terms of the cloud as well. No matter…

  2. How Global Pharmaceutical Company Sanofi Overhauled Its SAP Security

    Facing a marked increase in cyberattacks and a complex IT and regulatory environment, multinational drug company Sanofi resolved to revamp its SAP cybersecurity infrastructure. The goal was to better detect attacks, protect mission-critical applications, streamline software deployment, and monitor security in real-time. This was no easy task as Sanofi has many different SAP platforms and…

  3. Spotlight: An SAP Security Architect Comments on Methods to Keep SAP HANA Secure

    SAP Professional JournalIn this question-and-answer article, you’ll learn what measures to take to secure SAP HANA-based applications. SAP HANA environments typically have far more users directly accessing back-end systems than conventional environments. Therefore, it is critical to configure effective audit policies to monitor actions that include SELECT, INSERT, UPDATE, DELETE, EXECUTE, and other SQL statements…...…

  4. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…

  5. Spotlight: A Walk Through 3 Stages of an SAP Security Audit

    /Project Management/MobileTracy Levine, an SAP application consultant at itelligence, fields some questions about various stages of preparing for an SAP security audit. In her blog post, “How to Survive an SAP Security Audit,” Tracy Levine, an SAP application consultant at itelligence, writes about three stages of an SAP security audit and uses political terms to…...…

  6. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    Reading time: 19 mins

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…

  7. Time to get serious about SAP Security Patch Management

    As the pandemic pushed businesses to adopt remote working, cybercriminals saw an opportunity to exploit the security vulnerabilities of millions of workers logging on to access sensitive business information from home. Phishing and ransomware attacks surged, and even hospitals dealing with the first wave of Covid patients were not safe from hackers. ERP systems became…

  8. Insights for Your Emerging SAP Security Strategy

    Security is at the forefront for many IT leaders and their technical teams. Between regulations such as GDPR and mounting cyberattacks, most enterprise businesses want to know that they are doing the right things on a daily basis to protect their critical assets. SAPinsider had the pleasure of sitting down with key leadership from SAP…

  9. The Power of Prevention

    The onset of COVID-19 in 2020 ushered a new workforce paradigm in which normal security patching operations were left vulnerable to cyberattacks. Today’s remote, cloud-based environment requires a level of security awareness and prevention that brings together SAP, customers and external security researchers. Aditi Kulkarni, Product Security Senior Specialist for SAP Labs India, provides a…

  10. Companies Combine their SAP Security Redesigns

    A poorly executed SAP security redesign can have significant effects on an organization: unauthorized access, increased potential for fraud, inefficient access provisioning for end-users, and audit issues. To avoid this scenario and improve security, more companies are combining their SAP security redesigns with updates to their SAP GRC solutions, observes Adam Fattorini, Senior Manager, PwC…