Featured Content
Topics

Explore critical topics shaping today’s SAP landscape—from digital transformation and cloud migration to cybersecurity and business intelligence. Each topic is curated to provide in-depth insights, best practices, and the latest trends that help SAP professionals lead with confidence.

Regions

Discover how SAP strategies and implementations vary across global markets. Our regional content brings localized insights, regulations, and case studies to help you navigate the unique demands of your geography.

Industries

Get industry-specific insights into how SAP is transforming sectors like manufacturing, retail, energy, and healthcare. From supply chain optimization to real-time analytics, discover what’s working in your vertical.

Hot Topics

Dive into the most talked-about themes shaping the SAP ecosystem right now. From cross-industry innovations to region-spanning initiatives, explore curated collections that spotlight what’s trending and driving transformation across the SAP community.

Featured Content
Topics

Explore critical topics shaping today’s SAP landscape—from digital transformation and cloud migration to cybersecurity and business intelligence. Each topic is curated to provide in-depth insights, best practices, and the latest trends that help SAP professionals lead with confidence.

Regions

Discover how SAP strategies and implementations vary across global markets. Our regional content brings localized insights, regulations, and case studies to help you navigate the unique demands of your geography.

Hot Topics

Dive into the most talked-about themes shaping the SAP ecosystem right now. From cross-industry innovations to region-spanning initiatives, explore curated collections that spotlight what’s trending and driving transformation across the SAP community.

SAP Security

Upcoming Events

SAPinsider Las Vegas 2026
Mar 16-19, 2026Las Vegas, Nevada, NV

Related Vendors

What Is Security?

Security is a broad term that can apply to many fields. In the area of IT, security refers to tools and strategies that prevent unauthorized access to organizational assets such as computers, networks, and data. Security is designed to maintain the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers and malicious insiders.

What Is Security?

Security is a broad term that can apply to many fields. In the area of IT, security refers to tools and strategies that prevent unauthorized access to organizational assets such as computers, networks, and data. Security is designed to maintain the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers and malicious insiders.

What Is SAP Security?

SAP security products and services help organizations to develop and administer solutions securely across on-premise, cloud, and hybrid environments. The SAP Trust Center includes links to various SAP security tools and services under five categories:

  • Hybrid identity and access management: SAP Single Sign-On, SAP Identity Management, and SAP Access Control.
  • Cloud identity services: SAP Cloud Identity Services – Identity Authentication, SAP Cloud Identity Services – Identity Provisioning.
  • Secure development services: SAP Authorization and Trust Management service, SAP Credential Store, Cloud Connectors, and SAP Cloud Programming Model.
  • Risk and compliance: SAP Cloud Identity Access Governance, SAP Data Retention Manager, SAP Customer Data Cloud, and SAP Data Privacy Integration.
  • Security support services: SAP Security Optimization, SAP MaxAttention, and Security Service and Support Offerings.

Further Resources for SAPinsiders

Trust Matters! The SAP Security Strategy and Roadmap. This presentation by Anne Marie Colombo, Cybersecurity Solution Advisor at SAP, provides an overview of SAP’s security strategy as well as its related solutions and products. The presentation explains how the latest solutions and services, such as SAP Cloud Platform Identity Authentication, SAP Cloud Platform Identity Provisioning, SAP Enterprise Threat Detection, SAP Single Sign-On, and SAP Identity Management, can bring value to your enterprise security platform.

Insights for Your Emerging SAP Security Strategy. In this blog post, SAPinsider discusses security with key leadership from SAP security company Onapsis. The discussion ranges across many topics, from the state of SAP software and enterprise security to Onapsis’s acquisition of Virtual Forge and its impact on the SAP customer base.

Application Security Imperiled by Attackers. Application security is being threatened by cyberattacks on the application layer, such as SAP S/4HANA systems, which target valuable resources organizations store there, observe SAP’s Arndt Lingscheid, Global Solution Owner Cybersecurity and Data Protection, and Martin Mueller, Presales and Program Manager, SAP Security Suite. Companies need to deploy real-time detection and response to deal with the rise in attacks against the SAP application layer level, they argue.

Vendors that can help SAP customers with security include: Appsian Security, Fastpath, Fortinet, Layer Seven Security, Lookout, Onapsis, Security Weaver, Xiting, and Xpandion.

152 results
Answering Your Critical Questions about RISE with SAP
Answering Your Critical Questions about RISE with SAPApr 4, 2022  —  RISE with SAP is one of the most talked about solutions in the SAP market, but it is very little understood. Join this webinar to answer your most important questions and delve into one of the key offerings, RISE with SAP S/4HANA on Azure. Understand what differentiates RISE with SAP and how this can potentially […]
1 minute read
Securing Custom SAP CodeMar 17, 2022  —  Secure Software Development Lifecycle Following a secure software development lifecycle (SDL) is a fundamental requirement for all product teams at SAP. Security is integrated into the development and maintenance of all SAP-delivered code. This is supported by the use of a proprietary code scanning solution by SAP to detect and remove security vulnerabilities in developments […]
2 minute read
RISE with SAP, Demystifying the Future of Business Transformation
Webinar On-Demand: RISE with SAP – The Real Transformation Catalyst?Mar 17, 2022  —  RISE with SAP is SAP’s innovative “transformation as a service” offering to facilitate your move to SAP S/4HANA and the Cloud. But how should you how should you evaluate and integrate it as part of your 2022 strategy? Attend this interactive webinar to dive into some of the core concepts of RISE with SAP and […]
1 minute read
RISE with SAP, Demystifying the Future of Business Transformation
RISE with SAP – The Real Transformation Catalyst?Mar 16, 2022  —  RISE with SAP is SAP’s innovative “transformation as a service” offering to facilitate your move to SAP S/4HANA and the Cloud. But how should you how should you evaluate and integrate it as part of your 2022 strategy? Attend this interactive webinar to dive into some of the core concepts of RISE with SAP and […]
1 minute read
Image of Cloud with Padlock
Zero Trust in SAP SystemsJan 31, 2022  —  What’s driving more SAP customers to adopt cloud security solutions? The number one driver for organizations was the “Need to protect access to sensitive and confidential data.,” according to SAPinsider’s Securing the SAP Landscape Against Cyber Threats Benchmark Report. Tracking and securing data as it moves across an organization’s SAP landscape is a common challenge for SAP customers, particularly organizations undergoing digital transformation. As data transfers between different systems - both SAP and non-SAP systems - some devices may be compliant while others are not. Additionally, each device may be running different types of data protection tools, creating a patchwork of complexity that can make security difficult to manage. In an environment where every organization has a different approach to security with varying degrees of risk tolerance, the idea of creating a security program with a zero-trust mindset has been gaining wide-ranging adoption. In this Technology Insight, SAPinsider’s Vice President of Research, Robert Holland, and Hank Schless, Senior Manager, Security Solutions at Lookout, discuss the core values and principles of the zero trust philosophy and framework and explore SAP cloud security strategies. Read it to learn about: - The importance of protecting the bridge between SAP systems and non-SAP systems to address worries about unpatched systems and credentials compromised and defend weak points. - Building the business case to help CISOs and VPs InfoSec or Infrastructure see how a zero trust approach can help enhance data quality, reduce incidents, increase visibility, and lower the number of compromised accounts. - Ensuring consistent zero trust policies across platforms to improve visibility into user actions and access control from various locations and devices. - How a unified platform approach can help an organization ensure full coverage for every device and user across an organization’s infrastructure.
6 minute read
Designing SAP Fiori and SAP HANA Applications with Security in MindSep 1, 2018  —  Panelist: Frederik Weidemann, Virtual Forge Date: Tuesday, September 25 Sponsor: Cybersecurity for SAP Customers Virtual Forge’s Frederik Weidemann, a speaker at the upcoming SAPinsider Cybersecurity for SAP Customers conference, answered user questions on building secure SAP Fiori and SAP HANA applications. SAPUI5 applications are responsive across browsers and devices and the UI controls automatically adapt […]
9 minute read
SAP HANA Security Part 2: Classical Analytic Privileges Versus SQL Analytic PrivilegesNov 4, 2015  —  Learn about the differences between the various types of analytic privileges, and which ones to use to secure row-level data in an SAP HANA information view. Key Concept The privileges needed to control access to row-level data in SAP HANA are called analytic privileges. These allow some users to see data X and others to […]
16 minute read
How to Secure and Monitor Your SAP Systems from Cyber Threats without Third-Party SoftwareAug 12, 2014  —  Aman Dhillon explains how to secure your SAP systems from cyber attacks using SAP Configuration Validation. Key Concept Configuration Validation (CV) is a standard diagnostics tool available in SAP Solution Manager 7.0 and up. It enables companies to perform vulnerability checks to detect and remove security weaknesses in SAP systems. This includes vulnerabilities in areas […]
6 minute read
Effortless master data maintenance of your SAP G/L AccountsJul 24, 2011  —  Paul Ovigele, Ovigele Consulting A very neat way of maintaining G/L account master data is by using the “Hierarchy Display” functionality. This enables you to see all the existing accounts and easily decide which new number to insert or which similar account can be copied. This view has the feel of one of SAP’s “Enjoy” […]
3 minute read
7 Tips for Conducting User Access Reviews (UARs)Jul 6, 2011  —  Tip Doctor, Insider Learning Network. Whether you’re charged with protecting employee data, securing financial information, or safeguarding customer data, taking steps to regularly review the users who have access to this data is key. The following tip is from “Lessons for conducting user access reviews of your SAP system” given by James Roeske at Savera […]
1 minute read