SAP Security: From Impossible to Routine
SAP Security: From Impossible to Routine

Confusing terminology isn’t exactly uncommon in the SAP world, but the term “SAP security” sounds pretty straightforward. Outsiders often either assume it covers all the threats against your SAP system, or that it focuses on defeating outsider threats, such as […]

Talking To Your CISO About Cyber Security: A Guide For Board Members
Talking To Your CISO About Cyber Security: A Guide For Board Members

As data breaches fill the headlines, cyber security vulnerabilities and other security issues have become a hot topic within the boardroom. Companies are starting to understand that security is more than a set of boxes to check — it’s a […]

It Can’t Happen — the Risks of a Data Security Breach
It Can’t Happen — the Risks of a Data Security Breach

If your entire company’s value were converted into cash, and stored in a warehouse, how would you go about protecting it? You’d probably start with physical security — a reinforced structure, razor wire, and a secure entryway to prevent unauthorized […]

Accelerating an SAP Security Redesign
Accelerating an SAP Security Redesign

Executing an SAP security redesign is like fixing up a house. If the structure is sound, it makes sense to work with what you have — patch up the roof, knock out a wall here, add a room there, and […]

3 Data Center Security Threats that are Mitigated in the Cloud
3 Data Center Security Threats that are Mitigated in the Cloud

We understand why many companies still host onsite. It just feels safe. You have your own people supervising hosting and keeping an eye out for potential data center security threats. But in reality, keeping your IT onsite is usually more […]

What is SAP Security?
What is SAP Security?

SAP security is the set of tools and processes that controls what users can access inside an SAP landscape. Your SAP hosting environment contains lots of confidential information (such as financial records) and sensitive procedures (such as paying inventory) that […]

The Complete Guide to Outsourcing Managed Security Services
The Complete Guide to Outsourcing Managed Security Services

For most enterprises, there are only two security options: outsourcing or waiting around for disaster to strike. With the growing sophistication of hackers, the rapid adoption of new technologies and the ever-increasing complexity of regulatory compliance, almost no one has […]

How Secure is the Cloud?
How Secure is the Cloud?

If someone asked you “how safe is a community,” how would you respond? Would you ask what kind of community they mean, tell them about the community you live in, or just shrug your shoulders and say, “it depends?”   […]

SAP Security Basics: What You Need To Know
SAP Security Basics: What You Need To Know

SAP Security governs what data and processes users can access inside an SAP landscape. Typically, users are given just enough access to do their jobs. In order to understand the basics of how SAP security operates, picture a warehouse with […]

8 Cyber Security Vulnerabilities: Know Your Enemy
8 Cyber Security Vulnerabilities: Know Your Enemy

Anyone with a computer, an Internet connection and Google can hack. Hacking software is inexpensive (or free), easy to use and powerful enough to cause massive damage to your system — even in the hands of an inexperienced user.   […]

1 2 3