SAP CyberSecurity


-

What Is Cybersecurity?

Cybersecurity is the practice of protecting systems and information from digital attacks. Cybersecurity measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization.

Businesses with a comprehensive cybersecurity strategy, governed by best practices and automated using advanced analytics, artificial intelligence, and machine learning, can fight cyber threats more effectively and reduce the impact of breaches when they occur.

What Is Cybersecurity?

Cybersecurity is the practice of protecting systems and information from digital attacks. Cybersecurity measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization.

Businesses with a comprehensive cybersecurity strategy, governed by best practices and automated using advanced analytics, artificial intelligence, and machine learning, can fight cyber threats more effectively and reduce the impact of breaches when they occur.

What Is SAP Cybersecurity?

SAP cybersecurity solutions include:

UI Data Protection Masking and UI Data Protection Logging

  • Protect sensitive information in the user interface layer
  • Block or log data access
  • Secure and refine access

SAP Code Vulnerability Analyzer

  • Identify and remedy security vulnerabilities in ABAP custom code

SAP Focused Run

  • Security configuration management for SAP S/4HANA, SAP HANA, SAP NetWeaver, and Java 2 Platform, Enterprise Edition
  • Patch management

SAP Enterprise Threat Detection and SAP Enterprise Threat Detection Cloud Edition

  • Security information and event management solution tailored to the needs of SAP applications
  • Identify and analyze threats in SAP applications

SAP Data Custodian and SAP Data Custodian Key Management Service

  • Manage security keys
  • Monitor and report on data access, storage, movement, processing, and location
  • Create and enforce data access, location, movement, and processing policies

SAP Privacy Governance

  • Identify security and privacy risks
  • Deploy and manage maturity assessments with configurable templates
  • Manage security and privacy control evaluations and monitor ongoing compliance

Further Resources for SAPinsiders

SAP Cybersecurity in an Age of Uncertainty. In this article, Jhansi R Bandaru, PMP-Certified IT SAP Security/Compliance Lead, explains that organizations should regularly audit SAP systems to check their security and data integrity and identify vulnerabilities before attackers do. Knowing the weaknesses and gaps in a system is the first step in empowering management to deal with those vulnerabilities proactively, concisely, and effectively.

Expert Q&A: The Importance of Integrating Cybersecurity and Enterprise Risk Management. In this video interview, Gabriele Fiata, Head of Enterprise Risk Management and Innovation at SAP, shares his thoughts on enterprises’ common mistakes when managing cybersecurity risk and the need to integrate cybersecurity into an enterprise’s risk management framework.

A Holistic Approach to Managing Cybersecurity & Protecting Your Data. According to SAP Cybersecurity Solution Advisor Anne Marie Colombo, organizations should minimize user access to data by segregating and protecting it. This article presents best practices to ensure a holistic approach to cybersecurity and data protection for your enterprise.

Vendors that can assist SAP customers with cybersecurity include: Capgemini, Fastpath, Fortinet, Layer Seven Security, Lookout, Onapsis, RSM, and Saviynt.

 

72 results

  1. SAPinsider Market Insight Featured Image

    Industries Prioritize Cyber Threats Differently

    Reading time: 1 min

    Between January and March 2022, SAPinsider surveyed 346 members of our community about the cybersecurity threats to their SAP systems. 31% of those respondents said their organization was in the Software & Technology sector, 20% were from the Manufacturing & Agriculture sector, and 11% were from the Healthcare & Life Sciences sector. The full findings…
  2. Cybersecurity Image

    Cybersecurity Challenges Vary By Region

    Reading time: 1 min

    Between January and March 2022, SAPinsider surveyed 346 members of our community about the cybersecurity threats to their SAP systems. 41% of those respondents were from North America, 29% from EMEA, and 25% were from APJ. The full findings from that research were published in our Cybersecurity Threats to SAP Systems benchmark report. This market…
  3. Cybersecurity Threats to SAP Systems Report Cover

    Cybersecurity Threats to SAP Systems Research Webinar

    Tuesday, May 10, 11:00 AM ET Cybersecurity has become an increasingly important topic over the past year, particularly as SAP systems become a central point of business and financial truth within the organization and are more desirable as targets. With growing numbers of businesses being hit by ransomware or supply chain attacks, or a combination…
  4. Cybersecurity Threats to SAP Systems Report Cover

    Cybersecurity Threats to SAP Systems Benchmark Report

    Reading time: 1 min

    In This Report: The cybersecurity landscape is constantly changing for SAPinsiders. Over the last five years organizations have gone from being able to rely on any system on a specific network being trusted, to a complex and hybrid ecosystem of solutions where completely new approaches to cybersecurity must be followed. Ransomware and malware attacks are…
  5. cloud and security - image

    Balancing Innovation and Security in Cloud Deployments

    Most organization are adopting some form of cloud as part of their digital transformation initiatives. But moving to the cloud has governance and security risks that IT teams need to consider. To discuss these issues, SAPinsider recently sat down with Protiviti’s John Livingood, Managing Director, and Bill Belding, Director, to discuss the need to balance…
  6. Application Access Risk – Hitting SAP’s Moving Target

    Application Access Risk – Hitting SAP’s Moving Target

    As one of the world’s leaders in enterprise software, SAP is no stranger to change. This stems from decades of innovation often setting the industry standard. SAP’s portfolio of applications has customers flocking to implement the latest offerings taking advantage of new functionality and features for the core business.  In parallel, external factors such as…
  7. Strengthen Security & Risk Management in Your Journey to SAP S/4HANA

    Migrating to S/4HANA represents one of the largest opportunities for business transformation an organization can undergo. As with most large-scale implementation projects, the audit of existing business processes must play a vital role in managing risk. In addition, optimizing and putting additional controls in place must be considered, as business processes have likely grown in…
  8. How to secure applications image

    How to Secure Your Business-Critical SAP Applications Against Modern Ransomware

    Over the past year, it seems that everywhere you turn, there’s another story about a debilitating ransomware attack on the business-critical systems that power our global economy. From fuel and energy companies to food processing corporations, no industry is immune. As threat actors target essential and larger organizations for increasing ransom values, it’s clear that…
  9. application security - image

    Application Security Imperiled by Attackers

    Reading time: 6 mins

    Application security is being threatened by cyberattacks on the application layer, such as SAP S/4HANA systems, which target valuable resources organizations store there. Despite the increase in attacks, companies are not allocating resources to combat these threats. SAP customers understand the severe problem of application security and are looking for a solution to stop cyberattacks.…
  10. Panel Discussion: Top Cybersecurity threats for 2021

    Although cybersecurity threats are not new, the level of concern for organizations is growing as is the priority of protecting against them. With organizations seeking to create new digital customer experiences, applying data analytics, and investing in technology innovations, this makes the challenge even more urgent. The goal is to become knowledgeable to protect your…
  11. The roadmap to Cybersecurity

    Are you eager to deepen your knowledge about SAP Security, SAP Data Protection products and services? Securing an SAP S/4HANA business application environment involves more than perimeter security and roles & authorizations. The loss of sensitive data can result in severe penalties, damage reputation and endanger a company's entire business within minutes. In this session…
  12. Panel Discussion: Best practices for building your SAP security strategy

    Companies face a rapidly challenging environment as they seek to protect their SAP systems, without losing their ability to maximize the value of their technology investments. This session will provide you with insight into where you should start to ensure that your SAP systems are protected. SAPinsider’s industry experts will share with you how to…
  13. Panel Discussion: Customer Experiences with Cybersecurity

    All SAP customers have solutions in place that they can use for securing their SAP systems. This typically involves SAP Solution Manager as that is used by most organizations for maintenance and patch deployment but may also include other SAP and non-SAP tools that have different roles and capabilities. This panel will allow attendees to…
  14. Protecting SAP with an Adaptive Security Model

    Agility is the name of the game in today’s SAP security landscape. Being able to detect threats as they happen, quickly address vulnerabilities, and continuously improve your security posture is crucial to protecting your SAP data and your business as a whole. However, getting here is a challenge in itself. One strategy that is helping…
  15. Keynote: Trends and decisions for securing your SAP systems

    SAPinsider recently surveyed 263 members of our community to understand the most important factors for securing their SAP systems. “By far the greatest need for survey respondents (56%) was that of protecting access to sensitive and confidential data”. This session will present findings from that research including what strategies SAPinsiders are taking and the requirements…
  16. Protecting the mission-critical applications that run your business

    Over the last few months, everywhere you turn, there’s another story about debilitating ransomware attacks on mission-critical or business-critical systems. From fuel and energy companies to food processing companies, no industry is safe or immune. The traditional ways in which we respond to ransomware attacks no longer are as effective. What’s needed is a new…
  17. Securing the SAP Landscape Against Cyber Threats Benchmark Report

    Reading time: 1 min

    In This Report: Over the past several years SAP systems have increasingly been targeted for cybersecurity attacks as they contain some of the most critical data within the organization. Part of the reason for this is the fact that those SAP systems are increasingly becoming more connected with each other, with applications like SAP SuccessFactors…...…
  18. Event Blog- Securing your SAP Landscape

    Reading time: 1 min

    These resources are brought to you by SAPinsider’s Securing your SAP Landscape virtual summit. Join us for live sessions, discussions, and interactive roundtables on August 11th, beginning at 10 AM EST. Click here for more details
  19. Protecting SAP Systems from Ransomware Attacks

    Ransomware is headline news, and recent attacks have demonstrated the devastating impact of attacks that target critical infrastructure. According to the Department of Homeland Security ransomware attacks have increased by 300% over the past year, impacting all industries and sectors. The average downtime from an attack is 21 days, but full recovery takes an average…
  20. How Global Pharmaceutical Company Sanofi Overhauled Its SAP Security

    Reading time: 3 mins

    Facing a marked increase in cyberattacks and a complex IT and regulatory environment, multinational drug company Sanofi resolved to revamp its SAP cybersecurity infrastructure. The goal was to better detect attacks, protect mission-critical applications, streamline software deployment, and monitor security in real-time. This was no easy task as Sanofi has many different SAP platforms and…
  21. How Microsoft utilizes Azure & Zero Trust Security for SAP

    In this session we will be covering how Microsoft has adopted a Zero Trust security architecture for SAP deployments, enabling Azure networking, identity access management and monitoring. This content is available to Premium Members. Sign In Learn more about Premium Access
  22. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and respond to…
  23. Securing the SAP Landscape Against Cyber Threats Benchmark Report

    Reading time: 1 min

    Over the past several years SAP systems have increasingly been targeted for cybersecurity attacks as they contain some of the most critical data within the organization. Part of the reason for this is the fact that those SAP systems are increasingly becoming more connected with each other, with applications like SAP SuccessFactors and SAP Ariba…...…
  24. Cloudy with a chance of security & compliance

    Security and compliance continue to be the top concerns for migrating to SAP S/4HANA in the cloud, even above performance, flexibility, and cost. That’s because, ultimately, it’s still your responsibility to ensure the security of your data and applications – even if they reside in someone else’s datacenter. Fortunately, a strong cloud provider and the…
  25. Why and how to minimize your Attack Surface in SAP

    Cyber attacks are growing exponentially as remote work becomes the norm and new exploits capture the attention of hackers. A key theme is that these threats increasingly focus on the application layer – more specifically, the user layer – leveraging privileged accounts to get the keys to your kingdom. While perimeter security and IAM best…
  26. Securing the SAP Landscape Against Cyber Threats Benchmark Webinar

    Over the past several years SAP systems have increasingly been targeted for cybersecurity attacks as they contain some of the most critical data within the organization. Part of the reason for this is the fact that those SAP systems are increasingly becoming more connected with each other, with applications like SAP SuccessFactors and SAP Ariba…...…
  27. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and…
  28. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and respond to…
  29. Using SAP UI Logging & the SAP Security Audit Log to monitor events to mitigate Cyber Security Risks

    Protecting an organization’s data has never been more challenging. The cost of a data leak goes far beyond fines – impacting both investor and consumer confidence, causing potentially catastrophic harm to brand and reputation. Proactively addressing risk through logging user interaction, coupled with masking sensitive confidential data provides much needed tracking, auditability and safeguarding. SAP…
  30. cybersecurity

    A Holistic Approach to Managing Cybersecurity & Protecting Your Data

    Reading time: 8 mins

    The COVID-19 pandemic has ushered in a new paradigm in which legacy security tools and practices have left gaping holes in corporate data protection. To plug these gaps and counter increasing threats, organizations should employ a holistic approach to cybersecurity, privacy, and data protection. Scott Margolis, Managing Director for the Data Privacy and Protection Practice…
  31. Securing the SAP Landscape Against Cyber Threats Benchmark Report

    Reading time: 1 min

    In This Report: Over the past several years SAP systems have increasingly been targeted for cybersecurity attacks as they contain some of the most critical data within the organization. Part of the reason for this is the fact that those SAP systems are increasingly becoming more connected with each other, with applications like SAP SuccessFactors…...…
  32. A Cyber Risk Framework for the S4 Journey

    Organizations are heading into an unknown territory where both the technology platform they secure and threats to those platforms are getting more complex. Operational, Technology, and Compliance drivers introduce complexity even as customers expect companies to protect their data better. The cyber risk for the SAP solutions is a journey and should follow a maturity…
  33. Case Study: How Orkla Made Cybersecurity an Integral Part of Its SAP S/4HANA Implementation

    Prioritizing cybersecurity is a must for businesses investing in SAP solutions. Many organizations fall short of appropriate levels of security and direct involvement of their equivalent of a Chief Information Security Officer (CISO). How can companies migrating to SAP S/4HANA make SAP cybersecurity a priority? Where do they start, and what do they protect? Orkla…
  34. Requirements for Securing Cloud-Based Systems

    Reading time: 6 mins

    As organizations accelerate the move of enterprise applications and data into cloud-based and cloud-resident systems, it’s extremely important to ensure that security is in place early to avoid having to backtrack and address these issues. Whether systems are running in Software-as-a-Service, Platform-as-a-Service, or Infrastructure-as-a-Service environments, each deployment offers unique security challenges. This track will help…
  35. The Security and Compliance Landscape for SAP Systems

    Reading time: 6 mins

    The rapid shift to remote working has made every employee their own security perimeter, something that has been already a challenge for organizations dealing with a workforce increasingly using mobile solutions. Those running SAP solutions need to enhance security to secure this more distributed work force, as well as addressing rapidly changing employee responsibilities which…
  36. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    Reading time: 20 mins

    While most successful cyberattacks are carried out on a company’s application layer. many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…
  37. SAP Hacking – Let Google hack your SAP System 2.0

    Attend this session to learn about critical vulnerabilities in SAP systems that are often not properly addressed, as well as, the impact a bad security design has on your SAP system landscape. Gain a firm understanding of the importance proper roles and authorizations have and what you need to consider in your security design. You…
  38. How MARS, Inc. is Achieving Unrivaled Visibility into SAP Data Access & Usage

    The SAP team at MARS knows that deep visibility into application activity is no longer a “nice to have” option. With newly discovered vulnerabilities (RECON) and growing data privacy mandates (GDPR, CCPA), understanding SAP data access and usage is as critical as maintaining a secure network. In this session, join Matt Pecorelli, Director of Cyber…
  39. Reinforcing SAP Security Controls in a Landscape of Vulnerabilities

    Advanced persistent threats, bugs like RECON, and even your insiders pose a growing challenge in securing SAP. Are your existing roles and controls enough to stop these threats? Likely not. While sufficient from a governance perspective, organizations must do more to combat threats that are circumventing existing measures. In this session, learn how you can…
  40. Security is the New Business Enabler to Accelerate Enterprise Digital Transformation

    Reading time: 0 min

    As digital technology dramatically improves the economics and capabilities of every business, Digital Transformation or DX, is a quest for high-performance companies to gain further efficiencies/improve operational metrics and pull ahead of their competition. Recent studies found using hardware, software, algorithms and the internet DX is 10xs cheaper and faster to engage customers, create offerings,…
  41. Converged Security Solutions for the Prevention of Insider Threat and Bioterrorism

    Reading time: 0 min

    Securing our most important critical resource—the food supply chain—means correlating threats across underlying HR, IT, Physical Security and Operational Technology used in production and processing. AlertEnterprise links to specialized plant applications like MES, plant historians and demand management from ERP that can deliver information directly to production. Monitoring insider and contractor access to modifying batch…
  42. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

    Reading time: 2 mins

    On May 4, SAP announced that, while performing regular internal reviews of the company’s cybersecurity infrastructure, they discovered several of the company’s cloud products “do not meet one or several contractually agreed or statutory IT security standards.” Learn what this means for the SAPinsider Community.
  43. Enterprise security abstract concept

    5 Things SAPinsiders Are Saying About Their Enterprise Security Strategy

    Reading time: 2 mins

    SAP’s transition to an enterprise cloud company has changed the way SAP customers consider and implement their enterprise security strategy. The inclusion of SAP HANA-based systems adds further complexity to these considerations, particularly when these systems are running in hybrid or cloud-based environments. Organizations now need to find a way forward that doesn’t rely on…
  44. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

    Reading time: 1 min

    SAP's transition to an enterprise cloud company has changed the way SAP customers consider and implement their enterprise security strategy. The inclusion of SAP HANA-based systems adds further complexity to these considerations, particularly when these systems are running in hybrid or cloud-based environments. Organizations now need to find a way forward that doesn't rely on…
  45. Protect Your SAP Systems from Cyberattacks

    Protect Your SAP Systems from Cyberattacks

    Reading time: 9 mins

    This article looks at how SAP Enterprise Threat Detection addresses organizations’ pressing needs for protecting modern SAP landscapes.
  46. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

    Reading time: 5 mins

    Read this blog written by an SAP security and compliance lead for advice on how companies can best ensure their networks are secure. Learn the steps necessary to evaluate, identify, and craft effective cybersecurity umbrellas for SAP systems.
  47. A Low-cost Solution to Help Prevent Cyber Security Breaches in Your SAP System

    Reading time: 2 mins

    According to multiple sources, the average hacker spends about 200 days in your system before you’ve even realized they’re there. “The amount of data mining that they can capture in that time is incredible,” says Bill Oliver, Head of Technology for Winterhawk. He says these days, it’s more likely a matter of when you’ll be…
  48. 5 Pillars for Addressing Cybersecurity and Data Protection: SAP Highlights Key Areas for Organizations to Focus on to Build Digital Trust with Employees and Customers

    Reading time: 11 mins

    by Bruce Romney, Senior Director of Product Marketing, GRC and Security Solutions, SAP and Erin Hughes, SAP S/4HANA Finance and Governance, Risk, and Compliance (GRC) Center of Excellence, SAP North America and Thomas Frénéhard, Global Finance and Risk Center of Excellence, SAP What are today’s business leaders most focused on and what are their top…...…
  49. SAP Cybersecurity in an Age of Uncertainty

    Reading time: 5 mins

    by Jhansi R Bandaru, PMP-Certified IT SAP Security/Compliance Lead According to Risk Based Security’s 2019 MidYear QuickView Data Breach Report, the first six months of 2019 saw more than 3,800 publicly disclosed cyber attacks exposing more than 4 billion compromised records, with 3.2 billion of those records exposed by just eight breaches. Making matters worse,…
  50. Cybersecurity Collection

    Reading time: 0 min

    The top 8 articles to help you better drive accounting, controlling and planning. This content is available to Premium Members. Sign In Learn more about Premium Access
  51. Cybersecurity: Case study: How Merck KGaA closed the gap between its enterprise SAP landscape and cybersecurity monitoring and incident response teams

    Reading time: 1 min

    Learn how the Merck Group (Merck KGaA, Darmstadt, Germany) integrated its global SAP landscape into its existing 24/7 Security Operations Center (SOC) monitoring and incident response processes. Click this link to view the slides from this session — Cyber_2017_Newman_Casestudyhowmerckkgaaclosedthegap.   Branden Newman If you have comments about this article or publication, or would like to…...…
  52. Cybersecurity: Case study: How Schlumberger leverages security for digital transformation

    Reading time: 1 min

    Learn how Schlumberger reduced costs and risks while operationalizing a cybersecurity strategy for SAP applications and implementing security validation and monitoring processes. here Mahesh Ravinutula If you have comments about this article or publication, or would like to submit an article idea, please contact the editor. Troy Siewert If you have comments about this article…...…
  53. Insights for Your Emerging SAP Security Strategy

    Reading time: 3 mins

    Audio pioneer Dolby Laboratories, which has been delivering audiophiles a superior sound and sight experience since the 1970s, decided in 2016 that it wanted an equally stringent level of quality assurance for its business process testing. The business sought a risk-based automated testing solution to reduce or eliminate regression test coverage gaps and lengthy testing…
  54. Watch Out for Cyber Attackers Targeting Your SAP Applications

    Reading time: 2 mins

    Business-critical ERP applications run the economy by managing the sensitive and all-important data and processes of large global organizations. Because of the processes these applications support, SAP customers store their “crown jewels” here. The massive attack surface of these applications leaves them exposed to insider and outsider threats – such as information theft, loss of…
  55. Cisco 2018: Annual Cybersecurity Report

    Reading time: 0 min

    What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are o This content is available to (General…
  56. Securing SAP S/4HANA

    Securing SAP S/4HANA

    Reading time: 15 mins

    When you are planning a conversion from SAP Business Suite to SAP S/4HANA, many questions about changing security needs can arise. This is due in large part to the architectural and technological changes that come with SAP S/4HANA. Read this article to understand the five critical areas security administrators need to consider when securing an…
  57. Cybersecurity Collection 2018

    Reading time: 0 min

    10 resources to help you reinforce your organisation's SAP® landscape and fortify against continually evolving cyber threats This content is available to (General or Premium) members. Sign in or Join for free! Sign In Become a Member
  58. Column Level Security in SAP HANA

    Reading time: 17 mins

    Big data technologies offer a huge opportunity to organizations to consolidate data from a variety of data sources and derive meaningful insights from it that can help in achieving business growth. With this opportunity, there are also challenges with respect to information security. Database technologies offer a variety of ways to implement information security. SAP…
  59. Why You Should Care About SAP Cybersecurity: Evolution of the Threat Landscape

    Reading time: 1 min

    We hear about cybersecurity in the news, and we read about it and see it in our daily work, but why should we care about cybersecurity with regard to SAP applications? SAP applications host the most sensitive and critical information for the biggest organizations in the world; therefore, these applications have become a key target…
  60. How to Respond to an Attack on Your SAP Applications

    Reading time: 1 min

    Audio pioneer Dolby Laboratories, which has been delivering audiophiles a superior sound and sight experience since the 1970s, decided in 2016 that it wanted an equally stringent level of quality assurance for its business process testing. The business sought a risk-based automated testing solution to reduce or eliminate regression test coverage gaps and lengthy testing…
  61. Attacks to an SAP System: Bypassing Detection and How to Prevent It

    Reading time: 1 min

    Detecting attacks to SAP applications has become more and more important as we see companies making the headlines after being breached. Equifax is one example of how important it is to apply security patches and maintain the security of your applications. Security patches not only prevent your SAP application from being exploited but also ensure…
  62. False Sense of Security: Why Your Antivirus Doesn’t Protect Your SAP System

    Reading time: 2 mins

    SAP systems are high-value targets for sophisticated cyberattacks — they contain treasure troves of sensitive data. While many companies have robust antivirus programs in place to defend against such attacks, most have certain limitations that can prevent them from fully protecting SAP systems. Learn where the security gaps exist with traditional antivirus software, and how…
  63. Secure Your SAP Landscape with SAP Solution Manager 7.2

    Reading time: 2 mins

    Firewalls, intrusion detection systems, and antivirus solutions may not fully protect SAP systems against advanced cyberattacks. However, the answer to SAP customers’ security questions may be closer than they realize. SAP Solution Manager 7.2 includes safety measures that organizations can immediately leverage. Learn how these five integrated applications — Service Level Reporting (SLR), Dashboard Builder,…
  64. Securing SAP Systems

    Reading time: 22 mins

    Q&A with Dolphin Experts on Crafting a Successful Information Management Strategy This content is available to (General or Premium) members. Sign in or Join for free! Sign In Become a Member
  65. Cybersecurity Considerations for SAP Mobile Applications

    Reading time: 15 mins

    Panelist: Juan Perez-Etchegoyen, Onapsis Date: Thursday, October 12 Kendall Hatch Hello, and welcome to today’s live Q&A on security considerations for SAP mobile applications. I’m Kendall Hatch, Conference Producer for SAPinsider, and I’m excited to introduce today’s panelist, Juan Perez-Etchegoyen, CTO at Onapsis. Juan is also a speaker at the upcoming SAPinsider Cybersecurity for SAP Customers conference…...…
  66. Innovate with Confidence

    Reading time: 4 mins

    Cybercrime is not some theoretical threat — it is a real and growing issue for companies of all shapes and sizes. With trends such as cloud computing, the Internet of Things, a growing number of connected devices, and the use of personally identifiable information for analytics, data in the digital economy is valuable, plentiful, and…
  67. Live from SAPinsider Studio: Why Cybersecurity Is Not Just an Issue for IT

    Thomas Frenehard, Director of GRC Solution Management at SAP, describes the dangers for organizations that assume cybersecurity is merely an IT issue . Topics covered include: The latest cybersecurity trends, methods, and breaches to watch out for The steps SAP customers can take to achieve cyber excellence The benefits of moving to a unified view of risk management… This content...…
  68. Proven Techniques and Strategies to Fortify Your SAP Landscape from Cybersecurity Threats

    Reading time: 19 mins

    Modern cybersecurity threats are growing in complexity, scale, and speed. In this live Q&A, SAPinsider GRC 2017 speaker Peter Hobson dove into cybersecurity as it relates to your SAP landscape. Read the transcript to get expert answers to your questions on topics like role design, controls, vulnerability scans, supporting tools, and more. What type of…...…
  69. What You Need to Know About Cloud Security for SAP Solutions

    Reading time: 20 mins

    Live Blog What You Need to Know About Cloud Security for SAP Solutions   SAPinsiderMatt: Welcome to today’s Q&A on cloud security for SAP solutions. I am pleased to be joined by cloud security experts from IBM. Please give Madhuri Chawla, Tony Petta, Mark McNair, and Michael P Daniels a warm welcome! There are already…...…
  70. Cybersecurity and Digital Business

    Reading time: 2 mins

    Amid all the talk of empathy and running live, there was another, subtler theme that occasionally popped up in Bill McDermott’s keynote speech for SAPPHIRE 2016: cybersecurity. While it was far from a main focus of the presentation, cybersecurity reared its head on more than one occasion. McDermott stated early on in the speech that…
  71. Security in the Digital Era: How SAP Runs Secure

    Reading time: 6 mins

    There’s no arguing against the benefits of digital technologies and the innovations that come with cloud computing, mobility, and the Internet of Things (IoT). But there’s also no arguing against the fact that a new generation of digital technologies also means a new generation of cyberthreats. As you adopt new IT strategies, how will your…
  72. Defeating the Insider Threat

    Reading time: 4 mins

    Every day, organizations produce innumerable amounts of valuable data and much of this data is tempting for cybercriminals, promising them riches in return for your organization’s data, financial assets, or intellectual property. Unfortunately, it’s not just external hackers looking to steal your company’s data. Many cyberattacks come from within — and these hidden internal attacks…