by Kristin Bent
April 29, 2011
An email has been sent to:
The enhanced data processing functionality offered by SAP HANA needs to be protected against cyberattacks. Matt Lonstine gives advice on the security measures you can take to safeguard SAP HANA.
Companies that successfully handle data security breaches rely on a balanced combination of regulatory compliance and security technology. This article explains how SAP Cloud Platform integrates these concepts to provide...
SAP NetWeaver serves as the technology foundation for many SAP customer landscapes. With maintenance ending for older SAP NetWeaver releases still in use at some customer sites, now is the...
Please log in to post a comment.
No comments have been submitted on this article. Be the first to comment!
Managing Data with SAP Data Replication and Transformation Tools
SAP S/4HANA Finance: What's in a Name?
Managing Data with SAP Solutions: SAP HANA and non-HANA Use Cases
See more »
SAPinsider is published by WIS Publishing, a division of Wellesley Information Services.
20 Carematrix Drive, Dedham, MA 02026 USA
Sales and Customer Service: 1(781)751-8799; email@example.com
© 2018 Wellesley Information Services. All rights reserved.
Online ISSN #2155-2444, Print ISSN #1537-145X
SAP and the SAP logo are trademarks or registered trademarks of SAP SE in Germany and other countries.