Security

Security has always been important for SAP applications, but this has historically been primarily focused on access and process control for applications. With the focus on moving enterprise applications into the cloud space, overall security is becoming more and more critical, as is compliance to various government regulations and standards. Content in this topic area will focus on ensuring that SAP systems are secure from both internal and external security threats, as well as what organizations need to do to prepare systems for potential cybersecurity attacks. It will additionally cover compliance topics, the impact of different compliance regulations, and what steps SAPinsiders need to take to ensure that their applications and data meet these requirements.

Featured

  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

Results

  1. FastPath

    The Fastpath Assure® audit platform can track, review, approve and mitigate access risks across multiple systems from a single dashboard. The suite comes with a pre-configured segregation of duties rule set specific to SAP and works across a variety of ERP/CRM systems. The suite includes multiple modules, including: • Segregation of Duties/Security Access Reviews • Audit Trail • Identity Manager • Custom Code Checker (to identify changes to custom SAP code) • Approval workflows and “Firefighter Access” to automate security for temporary or emergency access • Quantification (quantify the financial exposure of segregation of duties conflicts in your SAP environment)

  2. Parham Eftekhari - third-party risk - image

    Third-Party Risk Is Major Concern for Organizations

    Data breaches often result from attackers gaining access to poorly secured third parties as a path to breach their primary target. Unfortunately, many companies have little visibility into or control over third parties that connect to their systems. To counter these risks, organizations should implement a third-party risk management program, advises Parham Eftekhari, senior vice…
  3. Securing SAP SuccessFactors: Best Practices to Stay Compliant and Keep Data Safe

    To scale HR operations in the modern hybrid work environment, organizations everywhere rely on SAP SuccessFactors and its leading cloud-based human capital management (HCM) platform to recruit, onboard, evaluate, and manage employees from anywhere. However, just like with most cloud or SaaS applications, SuccessFactors has organizations agree to a shared responsibility model whereby they aren’t…
  4. Enabling Digital Transformation with Continuous Controls Monitoring (CCM)

    This past year saw an unprecedented acceleration of digital transformation. Initiatives supporting cloud adoption, remote work, and business continuity quickly jumped to the top of every CIO and CISO’s agenda. Migrating to a modern ERP solution like SAP S4/HANA introduces a whole host of questions and changes, starting with how to secure the sensitive data…
  5. Cybersecurity expert

    Video: Protect SAP from Ransomware and Supply Chain Attacks

    Today, enterprises are confronting a myriad of cyberthreats. Two of the most destructive are ransomware and software supply chain attacks. Ransomware attacks have soared over the last couple of years, and that trend has only accelerated. In fact, ransomware attacks have increased 57% since the beginning of this year, and the average number of companies…...…