GRC
HR
SCM
CRM
BI
Expand +

GRC

Latest Articles

Universal Identity and Access Management for Employees and Consumers

Universal Identity and Access Management for Employees and Consumers by Christian Cohrs and Marko Sommer
SAPinsider

As digital technologies have expanded their reach, the task of ensuring secure authentication and identity management within business processes has become more complex. Employees are no longer the only users involved — external users, such as consumers accessing a web... MORE »»


Watch Out for Cyber Attackers Targeting Your SAP Applications

onapsis thumbnail image by Juan Perez-Etchegoyen, CTO, Onapsis

Business-critical ERP applications run the economy by managing the sensitive and all-important data and processes of large global organizations. Because of the processes these applications support, SAP customers store their “crown jewels” here. The massive attack surface of these applications... MORE »»


Securing SAP S/4HANA

Securing SAP S/4HANA by Birger Toedtmann
SAPinsider

When you are planning a conversion from SAP Business Suite to SAP S/4HANA, many questions about changing security needs can arise. This is due in large part to the architectural and technological changes that come with SAP S/4HANA. Read this... MORE »»


See all Articles »

SAPinsider
FAQ