Security has always been important for SAP applications, but this has historically been primarily focused on access and process control for applications. With the focus on moving enterprise applications into the cloud space, overall security is becoming more and more critical, as is compliance to various government regulations and standards. Content in this topic area will focus on ensuring that SAP systems are secure from both internal and external security threats, as well as what organizations need to do to prepare systems for potential cybersecurity attacks. It will additionally cover compliance topics, the impact of different compliance regulations, and what steps SAPinsiders need to take to ensure that their applications and data meet these requirements.


  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

    Reading time: 2 mins

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

    Reading time: 1 mins

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

    Reading time: 5 mins


  1. SecureWorks

    Reading time: 5 mins

    Secureworks is 100% focused on cyberSecurity
  2. Keynote: Trends and decisions for securing your SAP systems

    SAPinsider recently surveyed 263 members of our community to understand the most important factors for securing their SAP systems. “By far the greatest need for survey respondents (56%) was that of protecting access to sensitive and confidential data”. This session will present findings from that research including what strategies SAPinsiders are taking and the requirements…
  3. Protecting the mission-critical applications that run your business

    Over the last few months, everywhere you turn, there’s another story about debilitating ransomware attacks on mission-critical or business-critical systems. From fuel and energy companies to food processing companies, no industry is safe or immune. The traditional ways in which we respond to ransomware attacks no longer are as effective. What’s needed is a new…
  4. SAP Security Redesigns image

    Companies Combine their SAP Security Redesigns

    Reading time: 4 mins

    A poorly executed SAP security redesign can have significant effects on an organization: unauthorized access, increased potential for fraud, inefficient access provisioning for end-users, and audit issues. To avoid this scenario and improve security, more companies are combining their SAP security redesigns with updates to their SAP GRC solutions, observes Adam Fattorini, Senior Manager, PwC…
  5. Centralizing User Access Management image

    Centralizing User Access Management

    Reading time: 4 mins

    A global tools and storage company that generates $14.5B in annual revenue and employs more than 10,000 workers worldwide had more than 100 enterprise resources planning (ERP) systems to handle. To get a grip on this sprawl, the company decided to optimize its IT environment with a plan that included a migration of its financial…
  6. Video: Sanofi Streamlines Thousands of New Business Roles in User Access Management Update

    Reading time: 1 mins

    At the same time that Sanofi was working on COVID-19 vaccines, it was also migrating from SAP ERP Central Component System to SAP S/4HANA. This was an ambitious undertaking considering the unique economic environment, the firm’s multinational reach, and the heavily regulated nature of the pharmaceutical industry. As part of this effort, the company updated…
  7. Sanofi Leverages SAP Access Control to Help Secure SAP S/4HANA Migration During COVID-19 Vaccine Response

    Reading time: 4 mins

    At the same time that Sanofi was working on COVID-19 vaccines, it was also working with Accenture and KPMG to migrate from SAP ERP Central Component System to SAP S/4HANA and consolidate and optimize its IT environment. This was an ambitious undertaking considering the unique economic environment, the firm’s multinational reach, and the heavily regulated…
  8. User Access and Identity Management for SAP S/4HANA Benchmark Report

    Reading time: 1 mins

    In This Report: Access management often comes about through necessity rather than planning. Organizations today use a portfolio of systems that not all employees are authorized to use, so proper access management is critical. With cloud systems and remote work on the rise and increasing threats that seek to steal employee access, a more comprehensive…
  9. Business transform graphic

    RISE with SAP and Its Impact on Security and Compliance

    Reading time: 8 mins

    RISE with SAP focuses on bringing core business systems (SAP S/4HANA Cloud, private edition) into a customer environment that is cloud based, process driven, easy to scale, and easy to use. When embarking on a RISE with SAP journey, the authors of this article — Uemit Oezdurmus, SAP Global Head of Managed Security Services, and…
  10. Securing the SAP Landscape Against Cyber Threats Benchmark Report

    Reading time: 1 mins

    In This Report: Over the past several years SAP systems have increasingly been targeted for cybersecurity attacks as they contain some of the most critical data within the organization. Part of the reason for this is the fact that those SAP systems are increasingly becoming more connected with each other, with applications like SAP SuccessFactors…