Blogs

Stay up-to-date on the latest SAP news, SAPinsider events, and timely conversations around how customers are using SAP technology to get ahead. Learn what these updates mean for the SAPinsider Community and how they can be applied in the business world.

950 results

  1. Why You Should Care About SAP Cybersecurity: Evolution of the Threat Landscape

    Reading time: 1 mins

    We hear about cybersecurity in the news, and we read about it and see it in our daily work, but why should we care about cybersecurity with regard to SAP applications? SAP applications host the most sensitive and critical information for the biggest organizations in the world; therefore, these applications have become a key target…

  2. How to Respond to an Attack on Your SAP Applications

    Reading time: 1 mins

    You don’t want to be caught off guard in a breach to your SAP applications, but how do you best prepare to respond to a breach? The answer relies on defining a clear incident response process that aligns the organizational resources that are required to address a potential breach to your most critical SAP applications.…

  3. Tips on How to Maximize Security and Productivity with SAP Single Sign-On

    Reading time: 1 mins

    In his session at the Cybersecurity for SAP Customers 2018 conference titled “Secure Authentication and Access Management with SAP Single Sign-On,” Kristian Lehment, senior product manager at SAP SE, provides an overview of the role of SAP Single Sign-On in secure authentication. He discusses the basics of the key technologies involved: Kerberos, X.509 certificates, and…

  4. Securing SAP Fiori Applications: 3 Quick Wins

    Reading time: 2 mins

      Securing the SAP Internet Communication Manager (ICM) Services SAP Fiori applications are implemented on top of the SAP NetWeaver ABAP Application Server, leveraging Open Data Protocol (OData) technology and the ICM among other things (Figure 1). Regardless of whether you use the SAP front-end server or SAP NetWeaver Gateway as the front-end component, you…

  5. Attacks to an SAP System: Bypassing Detection and How to Prevent It

    Reading time: 1 mins

    Detecting attacks to SAP applications has become more and more important as we see companies making the headlines after being breached. Equifax is one example of how important it is to apply security patches and maintain the security of your applications. Security patches not only prevent your SAP application from being exploited but also ensure…

  6. Digital Transformation Insights with Hitachi Vantara

    Reading time: 3 mins

    Just a few years ago, the term digital transformation was little more than a concept — a nebulous ideal that had little basis in reality for the day-to-day business. We’d heard of digital disruptors, and were aware of a few famous examples of new business models that were transforming entire industries. For the most part,…

  7. Businesses Need to Do Three Things in 2018: SAPPHIRE NOW Makes It Happen

    Reading time: 2 mins

    In my world, it’s not too early to start thinking about SAPPHIRE NOW in 2018, which I’ll cover onsite this year June 5-7 in Orlando, Florida. One of my first steps was to catch up with Chakib Bouhdary, Global Digital Transformation Officer at SAP. Bouhdary is a busy guy, traveling worldwide to talk with SAP customers…

  8. Has Your System Been Breached?

    Reading time: 1 mins

    Since cyber attackers are aware of methods for breaking into SAP systems, companies need to take countermeasures. It is important that they know what data they should analyze to detect where their systems have been compromised, according to Juan Perez-Etchegoyen of Onapsis. In his upcoming Cybersecurity for SAP Customers 2018 session, “Detect and Respond: How…

  9. How a Penetration Test Can Keep Your SAP System Safe

    Reading time: 2 mins

    In his Cybersecurity for SAP Customers 2018 session “Going from the Outside In: The Truth About Penetration Testing,” Frederik Weidemann of Virtual Forge explains why you should perform a penetration test of your SAP landscape. Security breaches are a big problem and enterprise technology is not exempt, as recent news reports have shown. Weidemann says…

  10. Technical Guide: Intercompany Billing Options on SAP S/4HANA 1610

    Reading time: 11 mins

      As organizations become ever more global, it is becoming increasingly common for the employees charging time to a project to be working in a different legal entity from the one to which the project belongs. Every professional service organization is familiar with this situation, since they inevitably have consultants scattered across the world, but…