Security

Security has always been important for SAP applications, but this has historically been primarily focused on access and process control for applications. With the focus on moving enterprise applications into the cloud space, overall security is becoming more and more critical, as is compliance to various government regulations and standards. Content in this topic area will focus on ensuring that SAP systems are secure from both internal and external security threats, as well as what organizations need to do to prepare systems for potential cybersecurity attacks. It will additionally cover compliance topics, the impact of different compliance regulations, and what steps SAPinsiders need to take to ensure that their applications and data meet these requirements.

Featured

  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

    Reading time: 2 mins

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

    Reading time: 1 mins

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

    Reading time: 5 mins

Results

  1. okta

    Reading time: 5 mins

    Accelerate a world where everyone can safely use any technology. We bring simple and secure access to people and organizations everywhere. We promise to not only protect the identities of our customers’ workforce and users, but to ask, “what more can we make possible?”
  2. Jabil UI Masking Image

    Jabil Turns to UI Masking for Stronger Data Protection

    The proliferation of data privacy regulations and laws has prompted organizations to beef up their data privacy and protection. One way to protect data without the inconvenience of encryption is data masking or user interface (UI) masking. One company taking full advantage of SAP’s UI masking feature is Jabil, a St. Petersburg, Fla.-based global manufacturing…
  3. Wilder Latino image

    Jabil Deploys UI Masking

    Reading time: 4 mins

    The proliferation of data privacy regulations and laws, such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), has prompted organizations to beef up their data privacy and protection. One way to protect data without the inconvenience of encryption is data masking or user interface (UI) masking. One…
  4. Panel Discussion: Top Cybersecurity threats for 2021

    Although cybersecurity threats are not new, the level of concern for organizations is growing as is the priority of protecting against them. With organizations seeking to create new digital customer experiences, applying data analytics, and investing in technology innovations, this makes the challenge even more urgent. The goal is to become knowledgeable to protect your…
  5. The roadmap to Cybersecurity

    Are you eager to deepen your knowledge about SAP Security, SAP Data Protection products and services? Securing an SAP S/4HANA business application environment involves more than perimeter security and roles & authorizations. The loss of sensitive data can result in severe penalties, damage reputation and endanger a company's entire business within minutes. In this session…
  6. Panel Discussion: Best practices for building your SAP security strategy

    Companies face a rapidly challenging environment as they seek to protect their SAP systems, without losing their ability to maximize the value of their technology investments. This session will provide you with insight into where you should start to ensure that your SAP systems are protected. SAPinsider’s industry experts will share with you how to…
  7. Panel Discussion: Customer Experiences with Cybersecurity

    All SAP customers have solutions in place that they can use for securing their SAP systems. This typically involves SAP Solution Manager as that is used by most organizations for maintenance and patch deployment but may also include other SAP and non-SAP tools that have different roles and capabilities. This panel will allow attendees to…
  8. How to prioritize security measures to avoid an SAP data breach

    With the increasing number of Cyberattacks in different forms, organizations need to avoid the high cost and significant business impact of a potential SAP data breach. Traditional network security does not provide adequate protection of the data in your SAP systems against insider and outsider attacks. In this session, John Mortimer, Security Consultant at CyberSafe,…
  9. Securing SAP Systems from Cyber Attack with SAP Solution Manager

    Protecting SAP systems against advanced cyber threats using standard tools available to all SAP support customers is vital. This includes System Recommendations for patch management, Configuration Validation for vulnerability management, System Monitoring for threat detection, and Guided Procedures for incident response. Some important questions are: - How can I manage cyber threats with tools that…
  10. Protecting SAP with an Adaptive Security Model

    Agility is the name of the game in today’s SAP security landscape. Being able to detect threats as they happen, quickly address vulnerabilities, and continuously improve your security posture is crucial to protecting your SAP data and your business as a whole. However, getting here is a challenge in itself. One strategy that is helping…