Application Security

Ensuring that applications are secure is a key topic for the SAPinsider Community and is one that extends beyond managing and monitoring user access to the application itself to include finding, fixing, and enhancing the security of applications. Lean what tools and methods are available to protect applications once they are deployed, and how to protect applications from increasingly targeted attacks. Understand common software vulnerabilities including topics like cross-site scripting, improper input validation, out-of-bounds read and write, and how they are impacting SAP applications. Explore security tools and methods that can be used to help protect systems and what steps organizations can take to head off application security challenges.

Results

  1. Intel

    Reading time: 6 mins

    For nearly 50 years, Intel and SAP have made a profound impact on people, business and society on a global scale. Together they are turbocharging the next wave of breakthrough innovations with the power of in-memory computing and persistent memory technologies that help unleash the potential of data. Co-innovations are helping enterprises face – and…
  2. application security - image

    Application Security Imperiled by Attackers

    Reading time: 6 mins

    Application security is being threatened by cyberattacks on the application layer, such as SAP S/4HANA systems, which target valuable resources organizations store there. Despite the increase in attacks, companies are not allocating resources to combat these threats. SAP customers understand the severe problem of application security and are looking for a solution to stop cyberattacks.…
  3. Vegas event image

    SAPinsider 2022 Conference

    Save the dates for the annual SAPinsider conference taking place March 15-17 at the Bellagio Hotel & Casino in Las Vegas. Join an immersive experience designed to provide you with best practices and expert recommendations for maximizing on your SAP investments and preparing for new opportunities. The conference will bring the entire SAP ecosystem together to…
  4. The roadmap to Cybersecurity

    Are you eager to deepen your knowledge about SAP Security, SAP Data Protection products and services? Securing an SAP S/4HANA business application environment involves more than perimeter security and roles & authorizations. The loss of sensitive data can result in severe penalties, damage reputation and endanger a company's entire business within minutes. In this session…
  5. Panel Discussion: Customer Experiences with Cybersecurity

    All SAP customers have solutions in place that they can use for securing their SAP systems. This typically involves SAP Solution Manager as that is used by most organizations for maintenance and patch deployment but may also include other SAP and non-SAP tools that have different roles and capabilities. This panel will allow attendees to…
  6. Securing SAP Systems from Cyber Attack with SAP Solution Manager

    Protecting SAP systems against advanced cyber threats using standard tools available to all SAP support customers is vital. This includes System Recommendations for patch management, Configuration Validation for vulnerability management, System Monitoring for threat detection, and Guided Procedures for incident response. Some important questions are: - How can I manage cyber threats with tools that…
  7. Protecting SAP with an Adaptive Security Model

    Agility is the name of the game in today’s SAP security landscape. Being able to detect threats as they happen, quickly address vulnerabilities, and continuously improve your security posture is crucial to protecting your SAP data and your business as a whole. However, getting here is a challenge in itself. One strategy that is helping…
  8. AWS

    AWS is the platform of choice and innovation for 5000+ SAP customers and hundreds of partners. Whether you want to lift and shift ECC to reduce costs, migrate to SAP S/4HANA, or innovate with 200+ AWS services, you can count on AWS’s unmatched experience, infrastructure, and platform breadth to get more value out of your SAP investments.

  9. Why Masking is a Must-Have for Test Data Management

    Cybersecurity demands are becoming more relevant and complex, especially since the introduction of GDPR. Organizations now find themselves asking questions about: Standardizing, automating, and accelerating a vital tasks like data masking How to protect sensitive data for non-productive systems? How to get anonymized data which are GDPR-compliant? Join experts Bernd Baier, Sr. Solution Architect, and…
  10. Virtustream

    Virtustream, a Dell Technologies business, is the enterprise-class cloud service provider trusted by enterprises worldwide to migrate and run their mission-critical SAP applications in the cloud. For enterprises, service providers and government agencies, Virtustream’s xStreamCare Services expertise provides a personalized, high-touch approach to application and system modernization. Virtustream’s SAP-certified experts are backed by 10+ years of migration and management experience, featuring the completion of over 2,500 SAP migrations to date with 0 production rollbacks. As a result, organizations are assured to achieve the highest levels of availability, performance, security, agility and efficiency in the cloud.