Security

Security has always been important for SAP applications, but this has historically been primarily focused on access and process control for applications. With the focus on moving enterprise applications into the cloud space, overall security is becoming more and more critical, as is compliance to various government regulations and standards. Content in this topic area will focus on ensuring that SAP systems are secure from both internal and external security threats, as well as what organizations need to do to prepare systems for potential cybersecurity attacks. It will additionally cover compliance topics, the impact of different compliance regulations, and what steps SAPinsiders need to take to ensure that their applications and data meet these requirements.

Featured

  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

Results

  1. Xiting

    Xiting is a highly specialized SAP solution provider for Compliant Identity & Role Management. Xiting offers high-quality services in the area of SAP security and provides, as a consulting partner for companies of various sizes and in very different industries, a comprehensive service portfolio. With the specially-developed software solution Xiting Authorizations Management Suite (XAMS), the company has an unrivalled technology lead for SAP authorizations management according to SAP best practice.

  2. Secure access to cloud applications and services

    Modern enterprise solutions in the cloud-based system on a microservices architecture requires not only access protection with strong means of authentication but also the capabilities to protect subsequent app-to-service communication. Attend this session to: – Learn about recent innovations in the SAP Cloud Identity Services for multi-factor authentication based on FIDO2 – Explore FIDO2 –…
  3. Overview of SAP cybersecurity and data protection solutions

    Cyber-attacks can have severe consequences when it comes to SAP S/4HANA applications. These attacks focus on the company’s application layer and use privileged user accounts. Unfortunately, many security departments see the SAP application layer as a “black box,” and assume the security of SAP applications as the responsibility of their Basis or SAP application colleagues,…
  4. Integrated UI Data Protection: Take protection of your crown jewel data assets to the next level

    The SAP solutions for UI data protection are evolving. Join this session for the debut introduction to the first integrated release of UI Masking and UI Logging. Attend this session to: – Experience a comprehensive demo of many new features, such as data blocking and ‘Reveal on Demand’ with attribute-based authorizations – Know how these…
  5. Creating a cybersecurity risks dashboard in the SAP Analytics Cloud

    When it comes to securing SAP S/4HANA business applications, organizations tend to face three key challenges:  1. How to enable the application security team to prioritize the necessary cybersecurity actions 2. How to give the CISO insight into application security risk activities 3. How to bridge the gap between the problems faced by the CISO…
  6. Case study | Threat detection in SAP applications & implementation of SAP Enterprise Threat Detection

    An important component of a comprehensive security strategy is control over activities performed within the SAP environment to ensure landscape security . This includes monitoring applications behavior with respect to policies and regulatory requirements. This session will discuss three customer scenarios both before and after implementing SAP Enterprise Threat Detection. Scenario 1 Before implementing SAP…
  7. Why Masking is a Must-Have for Test Data Management

    Cybersecurity demands are becoming more relevant and complex, especially since the introduction of GDPR. Organizations now find themselves asking questions about: Standardizing, automating, and accelerating a vital tasks like data masking How to protect sensitive data for non-productive systems? How to get anonymized data which are GDPR-compliant? Join experts Bernd Baier, Sr. Solution Architect, and…
  8. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and respond to…
  9. Securing the SAP Landscape Against Cyber Threats Benchmark Report

    Over the past several years SAP systems have increasingly been targeted for cybersecurity attacks as they contain some of the most critical data within the organization. Part of the reason for this is the fact that those SAP systems are increasingly becoming more connected with each other, with applications like SAP SuccessFactors and SAP Ariba…
  10. Shift to Remote Work Underscores Need for a Robust Identity and Access Management Program

    As a result of the COVID-19 pandemic, remote workforce models are likely here to stay. This shift magnifies the importance of organizations guaranteeing that only authorized individuals can access their network and data. The best way to avoid unauthorized users from entering SAP systems is through a robust and automated identity and access management (IAM)…