Expand +


Sort By:
Built-In Protection with SAP Cloud Platform

by Annette Fuchs | January 26, 2018

Companies that successfully handle data security breaches rely on a balanced combination of regulatory compliance and security technology. This article explains how SAP Cloud Platform integrates these concepts to provide reliable, built-in protection for SAP customers. You will learn the... MORE »»

Secure Your SAP Landscape with SAP Solution Manager 7.2

by Aman Dhillon | November 8, 2017

Firewalls, intrusion detection systems, and antivirus solutions may not fully protect SAP systems against advanced cyberattacks. However, the answer to SAP customers’ security questions may be closer than they realize. SAP Solution Manager 7.2 includes safety measures that organizations can... MORE »»

Securing the Cloud with SAP Cloud Platform

by Gerold Hübner | November 8, 2017

Security is a major concern for anyone considering a move to the cloud ― along with the benefits of digitizing come increased risks due to code vulnerabilities, missing implementation of security patches, and misconfigurations, among others. So how do you... MORE »»

False Sense of Security: Why Your Antivirus Doesn’t Protect Your SAP System

by Joerg Schneider-Simon | November 8, 2017

SAP systems are high-value targets for sophisticated cyberattacks — they contain treasure troves of sensitive data. While many companies have robust antivirus programs in place to defend against such attacks, most have certain limitations that can prevent them from fully... MORE »»

Compliant Identity Management Processes Can Do More

by Guido Schneider | November 8, 2017

SAP’s solutions for identity management and governance, risk, and compliance (GRC) provide a powerful, integrated toolset for managing SAP accounts and authorizations. In some cases, however, users may have too many authorizations or licensing needs that exceed current agreements. Learn... MORE »»

Modernizing SoD Risk Analysis

by Ben Uher | November 8, 2017

The introduction of SAP Fiori has been a game-changer for SAP applications. And with more organizations making the move to SAP S/4HANA, the SAP Fiori interface will continue to see increased adoption. However, understanding how to maintain access controls and... MORE »»

An Integrated Approach to GRC

by Kevin McCollom | November 7, 2017

Cybersecurity is top of mind for governance, risk, and compliance (GRC) professionals for one clear reason: The value of data is growing. Some might think technology alone is the solution to cyberattacks. And while solutions like SAP Enterprise Threat Detection... MORE »»

Be Compliant, Stay Compliant

by James Baird | November 7, 2017

The General Data Protection Regulation (GDPR) — a new data privacy regulation in Europe — will affect any organization that handles the personal data of EU residents, regardless of whether it is located in the EU. With the regulation going... MORE »»

Meeting Modern Data Protection Requirements

by Volker Lehnert | August 24, 2017

As the volume of data collected by organizations continues to increase, so too do regulations designed to protect data from misuse, particularly when it comes to personal data. One of these is the European General Data Protection Regulation (GDPR), which... MORE »»

Innovate with Confidence

by Volker Haentjes | August 24, 2017

Cybercrime is not some theoretical threat — it is a real and growing issue for companies of all shapes and sizes. With trends such as cloud computing, the Internet of Things, a growing number of connected devices, and the use... MORE »»