What Is Security?

Security is a broad term that can apply to many fields. In the area of IT, security refers to tools and strategies that prevent unauthorized access to organizational assets such as computers, networks, and data. Security is designed to maintain the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers and malicious insiders.

What Is Security?

Security is a broad term that can apply to many fields. In the area of IT, security refers to tools and strategies that prevent unauthorized access to organizational assets such as computers, networks, and data. Security is designed to maintain the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers and malicious insiders.

What Is SAP Security?

SAP security products and services help organizations to develop and administer solutions securely across on-premise, cloud, and hybrid environments. The SAP Trust Center includes links to various SAP security tools and services under five categories:

  • Hybrid identity and access management: SAP Single Sign-On, SAP Identity Management, and SAP Access Control.
  • Cloud identity services: SAP Cloud Identity Services – Identity Authentication, SAP Cloud Identity Services – Identity Provisioning.
  • Secure development services: SAP Authorization and Trust Management service, SAP Credential Store, Cloud Connectors, and SAP Cloud Programming Model.
  • Risk and compliance: SAP Cloud Identity Access Governance, SAP Data Retention Manager, SAP Customer Data Cloud, and SAP Data Privacy Integration.
  • Security support services: SAP Security Optimization, SAP MaxAttention, and Security Service and Support Offerings.

Further Resources for SAPinsiders

Trust Matters! The SAP Security Strategy and Roadmap. This presentation by Anne Marie Colombo, Cybersecurity Solution Advisor at SAP, provides an overview of SAP’s security strategy as well as its related solutions and products. The presentation explains how the latest solutions and services, such as SAP Cloud Platform Identity Authentication, SAP Cloud Platform Identity Provisioning, SAP Enterprise Threat Detection, SAP Single Sign-On, and SAP Identity Management, can bring value to your enterprise security platform.

Insights for Your Emerging SAP Security Strategy. In this blog post, SAPinsider discusses security with key leadership from SAP security company Onapsis. The discussion ranges across many topics, from the state of SAP software and enterprise security to Onapsis’s acquisition of Virtual Forge and its impact on the SAP customer base.

Application Security Imperiled by Attackers. Application security is being threatened by cyberattacks on the application layer, such as SAP S/4HANA systems, which target valuable resources organizations store there, observe SAP’s Arndt Lingscheid, Global Solution Owner Cybersecurity and Data Protection, and Martin Mueller, Presales and Program Manager, SAP Security Suite. Companies need to deploy real-time detection and response to deal with the rise in attacks against the SAP application layer level, they argue.

Vendors that can help SAP customers with security include: Appsian Security, Fastpath, Fortinet, Layer Seven Security, Lookout, Onapsis, Security Weaver, Xiting, and Xpandion.

27 results

  1. Designing SAP Fiori and SAP HANA Applications with Security in Mind

    Reading time: 9 mins

    Panelist: Frederik Weidemann, Virtual Forge Date: Tuesday, September 25 Sponsor: Cybersecurity for SAP Customers Virtual Forge’s Frederik Weidemann, a speaker at the upcoming SAPinsider Cybersecurity for SAP Customers conference, answered user questions on building secure SAP Fiori and SAP HANA applications. SAPUI5 applications are responsive across browsers and devices and the UI controls automatically adapt…...…

  2. SAP HANA Security Part 2: Classical Analytic Privileges Versus SQL Analytic Privileges

    Reading time: 16 mins

    Learn about the differences between the various types of analytic privileges, and which ones to use to secure row-level data in an SAP HANA information view. Key Concept The privileges needed to control access to row-level data in SAP HANA are called analytic privileges. These allow some users to see data X and others to…...…

  3. How to Secure and Monitor Your SAP Systems from Cyber Threats without Third-Party Software

    Reading time: 6 mins

    Aman Dhillon explains how to secure your SAP systems from cyber attacks using SAP Configuration Validation. Key Concept Configuration Validation (CV) is a standard diagnostics tool available in SAP Solution Manager 7.0 and up. It enables companies to perform vulnerability checks to detect and remove security weaknesses in SAP systems. This includes vulnerabilities in areas…...…

  4. Effortless master data maintenance of your SAP G/L Accounts

    Reading time: 3 mins

    Paul Ovigele, Ovigele Consulting A very neat way of maintaining G/L account master data is by using the “Hierarchy Display” functionality. This enables you to see all the existing accounts and easily decide which new number to insert or which similar account can be copied. This view has the feel of one of SAP’s “Enjoy”…...…

  5. 7 Tips for Conducting User Access Reviews (UARs)

    Reading time: 1 mins

    Tip Doctor, Insider Learning Network. Whether you’re charged with protecting employee data, securing financial information, or safeguarding customer data, taking steps to regularly review the users who have access to this data is key. The following tip is from “Lessons for conducting user access reviews of your SAP system” given by James Roeske at Savera…...…

  6. Control the Registration of External Programs in the Gateway

    Reading time: 3 mins

    Tip Doctor, Insider Learning Network. This tip was taken from “5 Tips for Securing Communication Between SAP Systems and External Programs” by Kehinde Eseyin, which was posted to the GRC Expert knowledgebase in July 2010. You can protect external programs from registration in the gateway by appropriately configuring the reginfo file. The reginfo file is…...…

  7. Customizing your SoD rule set, what’s the big deal?

    Reading time: 2 mins

    As I’m finishing up my research for the upcoming GRC 2010 Europe event in Barcelona this November, and just about to kick off the research for our GRC 2011 event next March, I’m noticing there seems to be a lot of buzz surrounding the importance in customizing your SoD rule set and questions on how…...…