Security has always been important for SAP applications with a primary focus on access and process control. As organizations focus on moving enterprise applications to cloud space, the overall security and compliance with government regulations and standards have become critical. Content in this topic area will focus on ensuring that SAP systems are secure from internal and external security threats and discuss precautions that organizations can take to prepare their systems for potential cybersecurity attacks. Additionally, it will address the impact of different compliance regulations and possible actions that SAPinsiders need to take to ensure that their applications and data meet the requirements.


  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

    Reading time: 2 mins

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

    Reading time: 1 mins

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

    Reading time: 5 mins


  1. Deloitte Corporate logo image


    Reading time: 5 mins

    How can you navigate relentless disruption and the uncertainties that tomorrow will bring? By becoming a more kinetic enterprise, an intelligent enterprise that is built to evolve—adapting fast and moving with impact no matter what the future throws at you. Deloitte understands what it takes—and how you can deliver results with SAP solutions enabled by the cloud. Each day across the globe, our team of more than 23,000 professionals works with industry leaders to reimagine everything, realize the kinetic enterprise, and unleash cloud-enabled innovation to make an impact that matters.  Contact us to get the conversation started.

  2. Is User ‘Sally Smith’ Really Who She Claims to Be?! Lessons for Establishing Rock-Solid Authentication and Single Sign-On (SSO) Practices

    Reading time: 2 mins

    Authentication forms the foundation of your security infrastructure, and access privileges granted to users (or systems) are predicated on the notion that users are who they claim to be. There are a number of options available to help you do this with SAP systems, including password parameters, secure network communications (SNC), X.509 digital certificates, and…...…
  3. Single Sign-On with SAP Systems

    Reading time: 11 mins

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  4. Is It Time to Revisit Your SAP Security Infrastructure?

    Reading time: 2 mins

    All too often SAP implementation projects don’t take security beyond the application level, where security and authorization are often regarded as one and the same. To ensure adequate protection, security measures must be factored into all layers of the SAP infrastructure. With their client/server architecture, SAP systems include many components that exchange information, each of…...…