Application Security

Ensuring that applications are secure is a key topic for the SAPinsider Community and is one that extends beyond managing and monitoring user access to the application itself to include finding, fixing, and enhancing the security of applications. Lean what tools and methods are available to protect applications once they are deployed, and how to protect applications from increasingly targeted attacks. Understand common software vulnerabilities including topics like cross-site scripting, improper input validation, out-of-bounds read and write, and how they are impacting SAP applications. Explore security tools and methods that can be used to help protect systems and what steps organizations can take to head off application security challenges.


  1. Google Cloud

    Enable your business with SAP on Google Cloud. Our smart infrastructure offers comprehensive cloud security, premium network and superior business continuity with zero downtime infrastructure maintenance. Resources scale easily with the speed of business. Drive smarter decisions and improve processes with Google Cloud’s automated AI/ML models and analytics.

  2. The roadmap to Cybersecurity

    Are you eager to deepen your knowledge about SAP Security, SAP Data Protection products and services? Securing an SAP S/4HANA business application environment involves more than perimeter security and roles & authorizations. The loss of sensitive data can result in severe penalties, damage reputation and endanger a company’s entire business within minutes. In this session…
  3. Panel Discussion: Customer Experiences with Cybersecurity

    All SAP customers have solutions in place that they can use for securing their SAP systems. This typically involves SAP Solution Manager as that is used by most organizations for maintenance and patch deployment but may also include other SAP and non-SAP tools that have different roles and capabilities. This panel will allow attendees to…
  4. Securing SAP Systems from Cyber Attack with SAP Solution Manager

    Protecting SAP systems against advanced cyber threats using standard tools available to all SAP support customers is vital. This includes System Recommendations for patch management, Configuration Validation for vulnerability management, System Monitoring for threat detection, and Guided Procedures for incident response. Some important questions are: – How can I manage cyber threats with tools that…
  5. Protecting SAP with an Adaptive Security Model

    Agility is the name of the game in today’s SAP security landscape. Being able to detect threats as they happen, quickly address vulnerabilities, and continuously improve your security posture is crucial to protecting your SAP data and your business as a whole. However, getting here is a challenge in itself. One strategy that is helping…
  6. SAPinsider Vegas 2022 event image

    SAPinsider 2022 Conference

    Financials2022​ GRC2022​ SAP S/4HANA2022​ Cloud & Admin2022 Data & Analytics2022 Cybersecurity2022
  7. AWS

    AWS is the platform of choice and innovation for 5000+ SAP customers and hundreds of partners. Whether you want to lift and shift ECC to reduce costs, migrate to SAP S/4HANA, or innovate with 200+ AWS services, you can count on AWS’s unmatched experience, infrastructure, and platform breadth to get more value out of your SAP investments.

  8. Why Masking is a Must-Have for Test Data Management

    Cybersecurity demands are becoming more relevant and complex, especially since the introduction of GDPR. Organizations now find themselves asking questions about: Standardizing, automating, and accelerating a vital tasks like data masking How to protect sensitive data for non-productive systems? How to get anonymized data which are GDPR-compliant? Join experts Bernd Baier, Sr. Solution Architect, and…
  9. Virtustream

    Virtustream, a Dell Technologies business, is the enterprise-class cloud service provider trusted by enterprises worldwide to migrate and run their mission-critical SAP applications in the cloud. For enterprises, service providers and government agencies, Virtustream’s xStreamCare Services expertise provides a personalized, high-touch approach to application and system modernization. Virtustream’s SAP-certified experts are backed by 10+ years of migration and management experience, featuring the completion of over 2,500 SAP migrations to date with 0 production rollbacks. As a result, organizations are assured to achieve the highest levels of availability, performance, security, agility and efficiency in the cloud.

  10. Why and how to minimize your Attack Surface in SAP

    Cyber attacks are growing exponentially as remote work becomes the norm and new exploits capture the attention of hackers. A key theme is that these threats increasingly focus on the application layer – more specifically, the user layer – leveraging privileged accounts to get the keys to your kingdom. While perimeter security and IAM best…