by Jürgen Adolf | 01/31/2017
As new business needs arise, organizations often develop custom code to extend the functionality of their business software. Unfortunately, custom code can sometimes lead to unforeseen risks, including code vulnerabilities that leave your systems open to damaging cyberattacks. SAP NetWeaver Application Server, add-on for code vulnerability analysis helps you mitigate these risks by identifying vulnerabilities in your code during development, before a breach occurs. This article looks at how the latest features delivered with version 7.51 help make it easy to secure your code and ensure overall code quality.
by Donka Dimitrova | 10/10/2016
As businesses extend their technology deployments into the cloud, new security concerns arise as users start accessing business applications from an array of locations and devices. How do you protect your data? How do you ensure that users have access to the right information — and only that information? SAP addresses these concerns with two security services: SAP HANA Cloud Platform Identity Provisioning and SAP HANA Cloud Platform Identity Authentication. Learn how these services work together to improve access and identity management for businesses with growing cloud technology deployments.
by Regine Schimmer | 08/04/2016
As the number and diversity of applications, systems, and devices in any given business network continues to grow, secure user authentication becomes both increasingly challenging and increasingly important. SAP Single Sign-On enables seamless, simple, and secure authentication for almost every SAP and non-SAP system across a heterogeneous IT landscape, and version 3.0 extends its functionality to meet the needs of modern IT landscapes. Discover the new features included with version 3.0, including automated certificate management and expanded support for mobile devices.
by Martin Plummer | 04/26/2016
As technology becomes more sophisticated, so do the cyberattacks that aim to steal and even manipulate data. In response to this new rise in cybercrime, SAP released SAP Enterprise Threat Detection, a native SAP HANA application that quickly identifies suspicious patterns in log data and generates alerts to notify the appropriate personnel to take action. Find out how to configure these alerts and learn how SAP Enterprise Threat works with existing security information and event management (SIEM) solutions to offer the best protection for SAP and non-SAP systems.
by Stefanie García Laule | 01/14/2016
The biggest challenge presented by the Internet of Things (IoT) is maintaining the integrity, authenticity, and privacy of critical business data. Security teams are faced with the daunting task of verifying that data sent from a multitude of devices are both accurate and safe. Learn what crucial security measures are needed for the age of IoT and how SAP HANA Cloud Platform for Internet of Things can provide a standards-based approach to secure authentication between devices and help companies better protect themselves.
by Mark Hourani and Andrea Kristen | 10/08/2015
In-memory technology helps solve the challenge for how to manage and leverage a growing volume of data. Data security, however, is as paramount a concern as ever. By reading this article, you will learn the seven most critical areas of security for SAP HANA and how it ensures secure access to data.
by Christian Cohrs and Martina Kirschenmann | 07/14/2015
Get a full introduction into the latest support packages for SAP Single Sign-On 2.0 and the innovative new enhancements that address security, authentication and administration functionality, and user experience. Learn how these features enhance productivity and lower administration costs, while strengthening security of sensitive data.
by Thomas Wolfer and Regine Schimmer | 04/02/2015
Managing digital access to user identity data is a security and regulatory imperative. Learn more about SAP Identity Management 8.0, which includes a new Eclipse-based development environment, a connector for SuccessFactors Employee Central, and several other enhanced features to make user management easier.
by Donka Dimitrova | 01/01/2015
Today, there is a real need to provide easy, secure, and reliable access to business processes and solutions outside of a company’s four walls. Employees want to be able to do their work from home or on the road from the device of their choosing. See how on-demand cloud technology, specifically the SAP Cloud Identity service, enables organizations to support these dynamic business requirements in an easy, flexible, and cost-effective way.
by Martin Plummer | 10/01/2014
Delve into a comprehensive introduction to a new solution — SAP Enterprise Threat Detection — that enables organizations to analyze threats and prevent attacks before and as they occur. Find out how the solution works, what it safeguards your system against, and how your data can be best protected against cybercrime.