Application Security

Ensuring that applications are secure is a key topic for the SAPinsider Community and is one that extends beyond managing and monitoring user access to the application itself to include finding, fixing, and enhancing the security of applications. Lean what tools and methods are available to protect applications once they are deployed, and how to protect applications from increasingly targeted attacks. Understand common software vulnerabilities including topics like cross-site scripting, improper input validation, out-of-bounds read and write, and how they are impacting SAP applications. Explore security tools and methods that can be used to help protect systems and what steps organizations can take to head off application security challenges.

Results

  1. NetApp

    Reading time: 1 mins

    An SAP implementation is always about balance. Up and running and stable today? Tomorrow, you’re asked to do even more. Handling more transactions, more users, more partners, more modules. How do you handle the data behind it all? You need a solid, agile, scalable backbone. SAP on NetApp is that backbone. NetApp’s storage provisioning and performance capabilities are fast, and they add value to your data. Stay on-premises, or move to the cloud whenever, wherever you want with the hyperscalers: Azure, AWS and Google. It’s your SAP data. Use it.

  2. Why and how to minimize your Attack Surface in SAP

    Cyber attacks are growing exponentially as remote work becomes the norm and new exploits capture the attention of hackers. A key theme is that these threats increasingly focus on the application layer – more specifically, the user layer – leveraging privileged accounts to get the keys to your kingdom. While perimeter security and IAM best…
  3. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and…
  4. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and respond to…
  5. NetApp

    An SAP implementation is always about balance. Up and running and stable today? Tomorrow, you’re asked to do even more. Handling more transactions, more users, more partners, more modules. How do you handle the data behind it all? You need a solid, agile, scalable backbone. SAP on NetApp is that backbone. NetApp’s storage provisioning and performance capabilities are fast, and they add value to your data. Stay on-premises, or move to the cloud whenever, wherever you want with the hyperscalers: Azure, AWS and Google. It’s your SAP data. Use it.

  6. The Power of Prevention

    Reading time: 11 mins

    The onset of COVID-19 in 2020 ushered a new workforce paradigm in which normal security patching operations were left vulnerable to cyberattacks. Today’s remote, cloud-based environment requires a level of security awareness and prevention that brings together SAP, customers and external security researchers. Aditi Kulkarni, Product Security Senior Specialist for SAP Labs India, provides a…
  7. Layer Seven Security

    Layer Seven Security is a leading provider of cybersecurity solutions and services for SAP. Headquartered in Toronto, Canada, Layer Seven Security serve customers worldwide to secure SAP systems from cyber threats. The company is recognized as one of the Top Ten SAP Solution Providers of 2018, Top 25 Cybersecurity Companies of 2020, and Top Ten Vulnerability Management Solution Providers 2021.

  8. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and…
  9. Xiting

    Xiting is a highly specialized SAP solution provider for Compliant Identity & Role Management. Xiting offers high-quality services in the area of SAP security and provides, as a consulting partner for companies of various sizes and in very different industries, a comprehensive service portfolio. With the specially-developed software solution Xiting Authorizations Management Suite (XAMS), the company has an unrivalled technology lead for SAP authorizations management according to SAP best practice.

  10. A Cyber Risk Framework for the S4 Journey

    Organizations are heading into an unknown territory where both the technology platform they secure and threats to those platforms are getting more complex. Operational, Technology, and Compliance drivers introduce complexity even as customers expect companies to protect their data better. The cyber risk for the SAP solutions is a journey and should follow a maturity…