Viele Unternehmen schreiben aktuell am Drehbuch für ihre Digitalisierungsprojekte. Wir helfen Ihnen dabei, die Aspekte der SAP Sicherheit ausreichend zu berücksichtigen . Besuchen Sie uns am Stand M4 für eine individuelle Demonstation unsere Lösung SAP Security Lösung.   Sicherheitsbedrohungen für SAP Instanzen in Echtzeit erkennen,…
Like every second Tuesday of a month, today 13th August 2019, SAP has released security patches for their enterprise application product portfolio. This blog article lists the released security notes. Links which direct to the security note details may require an SAP Online Support User.…
In this podcast learn how the CISO of adidas and previously the Head of Global Information Security at Merck, manages the many challenges of SAP ERP security. This podcast provides insights and suggestions for implementing a cohesive strategy for protecting the most valuable corporate data…
It is beyond debate that processes, and data hosted in SAP are one of a company’s most valuable assets. Organizations cannot afford (avoidable) outages caused by miss communication or a lack of coordination amongst project teams. In reality, challenges do occur frequently, and conflicts get…
You are the CISO of a global brand and your network has been compromised. Your most valuable assets are in SAP and you have no idea if your systems have been infiltrated. Now what? Which SAP doors were opened and are the systems compromised? This…
The fact you started reading this blog probably means that you have an interest in SAP security, and I'm pretty sure you're well aware of the potential threats to SAP systems . All too often we see SAP security vendors and service providers using scaremongering…
The human element within the organization is probably the most neglected element in the organizational cyber defense strategy." Exactly this topic we covered at GRC 2018, held in Prague.   Download the used session material.  
SAP security is a great challenge and will be a challenge for many years to come. In order to thoroughly secure an SAP application, all of its components (i.e. SAP HANA) and potential threats need to be understood. SAP security is multi-layered, its building blocks…