GRC
HR
SCM
CRM
BI
Expand +

Articles

Sort By:
Don’t Wait Until It’s Too Late

by Esther Shein, Contributing Writer, SAPinsider | August 13, 2019

Despite the present and growing threat of cyberattacks — especially when it comes to ERP systems that contain mission-critical and sensitive information — many enterprises often fall behind in applying security patches to address identified vulnerabilities in their systems. So... MORE »»


Complying with Data Protection Regulations

by Vandana Mansharamani | August 13, 2019

Data protection regulations are on the rise, with the California Consumer Privacy Act (CCPA) of 2018, due to go into effect in January 2020, one of the more recent examples. CCPA in combination with the already existing European General Data... MORE »»


SAPinsider Magazine: The Inside Edge for SAP Customers Worldwide (Issue 2 2019)

June 3, 2019

Access the latest insights from SAPinsider in this digital edition of the magazine, which includes articles that offer best practices, such as how to make SAP journal entry processes accurate and efficient; case studies of companies pursuing digital transformations with... MORE »»


Putting Ethics into Practice with Your SAP Security Strategy

by Guido Wagner, Chief Development Architect, SAP SE | April 23, 2019

As artificial intelligence (AI) moves toward becoming a standard technology in daily business, companies increasingly need to balance the potential risks posed by AI-based software with the pursuit of growth and success. This article provides guidance on how to mitigate... MORE »»


SAPinsider Magazine: The Inside Edge for SAP Customers Worldwide (Issue 1 2019)

April 10, 2019

Access the latest insights from SAPinsider in this digital edition of the magazine, which includes articles that offer best practices, such as how to avoid cyber attackers targeting your SAP applications and how to transform your business in the era... MORE »»


Tracing Cisco’s Blueprint for a Successful SAP Data Center

by Erik Lillestolen, Solution Product and Engineering Manager, SAP Data Center, Cisco | February 21, 2019

The traditional data center model is being expanded by a host of new technologies, such as the Internet of Things, data streaming, social media, and machine learning. To adapt to this new world, and to take full advantage of the... MORE »»


Comply with Mandatory E-Invoicing with Confidence

by Aalbert de Niet and Olivia Vorstheim | February 13, 2019

Over the years, companies have been replacing paper invoices with electronic versions to improve agility and to gain better insights into their business. In recent years, however, tax authorities and governmental organizations in an increasing number of countries have begun... MORE »»


Universal Identity and Access Management for Employees and Consumers

by Christian Cohrs and Marko Sommer | January 14, 2019

As digital technologies have expanded their reach, the task of ensuring secure authentication and identity management within business processes has become more complex. Employees are no longer the only users involved — external users, such as consumers accessing a web... MORE »»


Watch Out for Cyber Attackers Targeting Your SAP Applications

by Juan Perez-Etchegoyen, CTO, Onapsis | December 12, 2018

Business-critical ERP applications run the economy by managing the sensitive and all-important data and processes of large global organizations. Because of the processes these applications support, SAP customers store their “crown jewels” here. The massive attack surface of these applications... MORE »»


Securing SAP S/4HANA

by Birger Toedtmann | September 14, 2018

When you are planning a conversion from SAP Business Suite to SAP S/4HANA, many questions about changing security needs can arise. This is due in large part to the architectural and technological changes that come with SAP S/4HANA. Read this... MORE »»


SAPinsider
FAQ