Security

Security has always been important for SAP applications, but this has historically been primarily focused on access and process control for applications. With the focus on moving enterprise applications into the cloud space, overall security is becoming more and more critical, as is compliance to various government regulations and standards. Content in this topic area will focus on ensuring that SAP systems are secure from both internal and external security threats, as well as what organizations need to do to prepare systems for potential cybersecurity attacks. It will additionally cover compliance topics, the impact of different compliance regulations, and what steps SAPinsiders need to take to ensure that their applications and data meet these requirements.

Featured

  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

Results

  1. Intel

    For nearly 50 years, Intel and SAP have made a profound impact on people, business and society on a global scale. Together they are turbocharging the next wave of breakthrough innovations with the power of in-memory computing and persistent memory technologies that help unleash the potential of data. Co-innovations are helping enterprises face—and overcome—challenges by increasing business agility and flexibility with real-time analytics and reimagined performance.

    Customers can protect and future-proof their investments (on premises or in cloud) with a modern infrastructure of validated and SAP-certified components and accelerate speed to market with an optimized, enterprise-ready platform designed for innovation. Learn how SAP HANA* and HANA based applications, Intel® Xeon® Scalable processors and Intel® Optane™ persistent memory technology are helping organizations realize the promise of a modern business technology platform.

  2. Event Blog- Securing your SAP Landscape

    These resources are brought to you by SAPinsider’s Securing your SAP Landscape virtual summit. Join us for live sessions, discussions, and interactive roundtables on August 11th, beginning at 10 AM EST. Click here for more details
  3. Protecting SAP Systems from Ransomware Attacks

    Ransomware is headline news, and recent attacks have demonstrated the devastating impact of attacks that target critical infrastructure. According to the Department of Homeland Security ransomware attacks have increased by 300% over the past year, impacting all industries and sectors. The average downtime from an attack is 21 days, but full recovery takes an average…
  4. How Global Pharmaceutical Company Sanofi Overhauled Its SAP Security

    Facing a marked increase in cyberattacks and a complex IT and regulatory environment, multinational drug company Sanofi resolved to revamp its SAP cybersecurity infrastructure. The goal was to better detect attacks, protect mission-critical applications, streamline software deployment, and monitor security in real-time. This was no easy task as Sanofi has many different SAP platforms and…