GRC
HR
SCM
CRM
BI

Security Strategies

Sort By:
Security Strategies
Secure Your ABAP Code Against Attack

by Jürgen Adolf | 01/31/2017

As new business needs arise, organizations often develop custom code to extend the functionality of their business software. Unfortunately, custom code can sometimes lead to unforeseen risks, including code vulnerabilities that leave your systems open to damaging cyberattacks. SAP NetWeaver Application Server, add-on for code vulnerability analysis helps you mitigate these risks by identifying vulnerabilities in your code during development, before a breach occurs. This article looks at how the latest features delivered with version 7.51 help make it easy to secure your code and ensure overall code quality.


Security Strategies
End-to-End Identity and Access Management in the Cloud

by Donka Dimitrova | 10/10/2016

As businesses extend their technology deployments into the cloud, new security concerns arise as users start accessing business applications from an array of locations and devices. How do you protect your data? How do you ensure that users have access to the right information — and only that information? SAP addresses these concerns with two security services: SAP HANA Cloud Platform Identity Provisioning and SAP HANA Cloud Platform Identity Authentication. Learn how these services work together to improve access and identity management for businesses with growing cloud technology deployments.


Security Strategies
Secure Single Sign-On Across SAP Landscapes

by Regine Schimmer | 08/04/2016

As the number and diversity of applications, systems, and devices in any given business network continues to grow, secure user authentication becomes both increasingly challenging and increasingly important. SAP Single Sign-On enables seamless, simple, and secure authentication for almost every SAP and non-SAP system across a heterogeneous IT landscape, and version 3.0 extends its functionality to meet the needs of modern IT landscapes. Discover the new features included with version 3.0, including automated certificate management and expanded support for mobile devices.


Security Strategies
An Integrated Approach to Identifying Security Risks

by Martin Plummer | 04/26/2016

As technology becomes more sophisticated, so do the cyberattacks that aim to steal and even manipulate data. In response to this new rise in cybercrime, SAP released SAP Enterprise Threat Detection, a native SAP HANA application that quickly identifies suspicious patterns in log data and generates alerts to notify the appropriate personnel to take action. Find out how to configure these alerts and learn how SAP Enterprise Threat works with existing security information and event management (SIEM) solutions to offer the best protection for SAP and non-SAP systems.


Security Strategies
Ensuring a Secure Internet of Things

by Stefanie García Laule | 01/14/2016

The biggest challenge presented by the Internet of Things (IoT) is maintaining the integrity, authenticity, and privacy of critical business data. Security teams are faced with the daunting task of verifying that data sent from a multitude of devices are both accurate and safe. Learn what crucial security measures are needed for the age of IoT and how SAP HANA Cloud Platform for Internet of Things can provide a standards-based approach to secure authentication between devices and help companies better protect themselves.


Security Strategies
7 Security Lessons for the SAP HANA Era

by Mark Hourani and Andrea Kristen | 10/08/2015

In-memory technology helps solve the challenge for how to manage and leverage a growing volume of data. Data security, however, is as paramount a concern as ever. By reading this article, you will learn the seven most critical areas of security for SAP HANA and how it ensures secure access to data.


SAPinsider Security column thumbnail
Simple and Secure User Authentication with SAP Single Sign-On 2.0

by Christian Cohrs and Martina Kirschenmann | 07/14/2015

Get a full introduction into the latest support packages for SAP Single Sign-On 2.0 and the innovative new enhancements that address security, authentication and administration functionality, and user experience. Learn how these features enhance productivity and lower administration costs, while strengthening security of sensitive data.


SAPinsider Security column thumbnail
Simplify Administration and Extend User Management into the Cloud with SAP Identity Management 8.0

by Thomas Wolfer and Regine Schimmer | 04/02/2015

Managing digital access to user identity data is a security and regulatory imperative. Learn more about SAP Identity Management 8.0, which includes a new Eclipse-based development environment, a connector for SuccessFactors Employee Central, and several other enhanced features to make user management easier.


SAPinsider Security column thumbnail
Simple, Secure Access to Business Applications

by Donka Dimitrova | 01/01/2015

Today, there is a real need to provide easy, secure, and reliable access to business processes and solutions outside of a company’s four walls. Employees want to be able to do their work from home or on the road from the device of their choosing. See how on-demand cloud technology, specifically the SAP Cloud Identity service, enables organizations to support these dynamic business requirements in an easy, flexible, and cost-effective way.


SAPinsider Security column Part 2 thumbnail
Safeguard Your Business-Critical Data with Real-Time Detection and Analysis

by Martin Plummer | 10/01/2014

Delve into a comprehensive introduction to a new solution — SAP Enterprise Threat Detection — that enables organizations to analyze threats and prevent attacks before and as they occur. Find out how the solution works, what it safeguards your system against, and how your data can be best protected against cybercrime.


SAPinsider
FAQ