Security

Security has always been important for SAP applications, but this has historically been primarily focused on access and process control for applications. With the focus on moving enterprise applications into the cloud space, overall security is becoming more and more critical, as is compliance to various government regulations and standards. Content in this topic area will focus on ensuring that SAP systems are secure from both internal and external security threats, as well as what organizations need to do to prepare systems for potential cybersecurity attacks. It will additionally cover compliance topics, the impact of different compliance regulations, and what steps SAPinsiders need to take to ensure that their applications and data meet these requirements.

Featured

  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

    Reading time: 2 mins

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

    Reading time: 1 mins

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

    Reading time: 5 mins

Results

  1. Rackspace Technology

    Reading time: 5 mins

    Rackspace Technology is a leading end-to-end multi-cloud technology services company. We can design, build and operate our customers’ cloud environments across all major technology platforms, irrespective of technology stack or deployment model. We partner with our customers at every stage of their cloud journey, enabling them to modernize applications, build new products and adopt innovative technologies.

  2. How Global Pharmaceutical Company Sanofi Overhauled Its SAP Security

    Reading time: 3 mins

    Facing a marked increase in cyberattacks and a complex IT and regulatory environment, multinational drug company Sanofi resolved to revamp its SAP cybersecurity infrastructure. The goal was to better detect attacks, protect mission-critical applications, streamline software deployment, and monitor security in real-time. This was no easy task as Sanofi has many different SAP platforms and…
  3. How Microsoft utilizes Azure & Zero Trust Security for SAP

    In this session we will be covering how Microsoft has adopted a Zero Trust security architecture for SAP deployments, enabling Azure networking, identity access management and monitoring. This content is available to Premium Members. Sign In Become a Member
  4. Expert Q&A: The Importance of Integrating Cybersecurity and Enterprise Risk Management

    As security professionals are all too aware, cyber threats have become dramatically more visible to many organizations in the last couple of years. And risks have proliferated across the enterprise. Gabriele Fiata, head of enterprise risk management and innovation at SAP, recently sat down with SAPinsider to share his thoughts on the common mistakes that…
  5. Why SAP customers need DevSecOps now more than ever

    Setting DevSecOps goals are a key component for aligning mission-critical application functionality with business needs. However, these goals create challenges for teams supporting SAP mission-critical applications. With multiple technologies, architectures, and a lack of unified development sets, SAP application developers handle changes through manual coding and change processes. Errors in custom code can create quality,…
  6. Least Privilege 2.0: Controlling Risk in a Dynamic Environment

    A growing landscape of laptops and smartphones, widespread internet access, and remote workforces throughout the world have increased the need for risk and identity management and has changed how security models should operate. Continuing to focus on only two dimensions, the “Who” (users and user groups) and the “What” (roles and authorizations), leaves organizations vulnerable…
  7. How to prioritize security measures to avoid an SAP data breach

    With the increasing number of Cyberattacks in different forms, organizations need to avoid the high cost and significant business impact of a potential SAP data breach. Traditional network security does not provide adequate protection of the data in your SAP systems against insider and outsider attacks. In this session, John Mortimer, Security Consultant at CyberSafe,…