Security

Security has always been important for SAP applications, but this has historically been primarily focused on access and process control for applications. With the focus on moving enterprise applications into the cloud space, overall security is becoming more and more critical, as is compliance to various government regulations and standards. Content in this topic area will focus on ensuring that SAP systems are secure from both internal and external security threats, as well as what organizations need to do to prepare systems for potential cybersecurity attacks. It will additionally cover compliance topics, the impact of different compliance regulations, and what steps SAPinsiders need to take to ensure that their applications and data meet these requirements.

Featured

  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

    Reading time: 2 mins

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

    Reading time: 1 mins

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

    Reading time: 5 mins

Results

  1. Xpandion

    Reading time: 5 mins

    Xpandion, an Appsian Security Company, focuses on the areas of SAP security, GRC and license optimization. Our solution is a user-friendly, easily deployed, automated management solution for companies of all sizes. It delivers unprecedented visibility of actual, real-time authorization usage, significantly improving security while reducing fraud and leakage of sensitive data. Xpandion partners with Connor Consulting, a global professional services firm focused on delivering high-value Revenue Assurance, License Advisory and Governance, Risk and Compliance (GRC) services to customers around the globe.

  2. Secure the RFC Connections in Your SAP System Landscape

    Reading time: 12 mins

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  3. How SAP Protects Your Web Applications from Security Vulnerabilities

    Reading time: 21 mins

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  4. Use Authorization Objects to Provide Flexible BW Security

    Reading time: 22 mins

    BW security is different and often more difficult to implement than R/3. The author explains how to secure the data in your BW system, focusing on several key points. He discusses authorization objects, transaction code components, and the relationship between them. Examples show you how to provide your users with a flexible and safe system…....…
  5. Conquer Context Problems in HR Security

    Reading time: 13 mins

    When the same HR user is in charge of multiple tasks, conflict problems can occur on the subject of how much authorization to grant the user. The author compares the technical differences between general and structural authorization and how to optimize their usage. He also describes SAP’s context-sensitive authorization functionality in R/3 Enterprise Release 4.70…....…
  6. Implement Field-Level Security in HR Infotype Screens

    Reading time: 32 mins

    Because SAP’s HR module is fully integrated with other SAP modules, they share data. Therefore, it is important to ensure that sensitive HR data is invisible to unauthorized users. The author explains how to create and configure several infotype screens to block data to some users and allow access to others. The article uses Release…...…
  7. Achieving Network Security and Secure Load Balancing with the SAP Web Dispatcher

    Reading time: 21 mins

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  8. Is User ‘Sally Smith’ Really Who She Claims to Be?! Lessons for Establishing Rock-Solid Authentication and Single Sign-On (SSO) Practices

    Reading time: 2 mins

    Authentication forms the foundation of your security infrastructure, and access privileges granted to users (or systems) are predicated on the notion that users are who they claim to be. There are a number of options available to help you do this with SAP systems, including password parameters, secure network communications (SNC), X.509 digital certificates, and…...…
  9. Single Sign-On with SAP Systems

    Reading time: 11 mins

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  10. Is It Time to Revisit Your SAP Security Infrastructure?

    Reading time: 2 mins

    All too often SAP implementation projects don’t take security beyond the application level, where security and authorization are often regarded as one and the same. To ensure adequate protection, security measures must be factored into all layers of the SAP infrastructure. With their client/server architecture, SAP systems include many components that exchange information, each of…...…