Large migration projects are often taking priority over data security. Andreas Opfer and Holger Hügel show why that is often less than ideal. [shutterstock: 556017796, Zambir Zakaria]

Large migration projects are often taking priority over data security. Andreas Opfer and Holger Hügel show why that is often less than ideal. [shutterstock: 556017796, Zambir Zakaria]

Data Security: Protecting The Crown Jewels

Although the number of security incidents is growing steadily among large and medium-sized enterprises, many of them prioritize data security lower than IT transformation projects. Andreas Opfer and Holger Hügel from Secude explain how modern security concepts should look like and how SAP executives can integrate them usefully into current Hana migration projects.

This article is the last of a series! If you would like to continue reading the series, please use the 'previous button' in the middle of the screen on left side.

[Read more]

When data is regularly being exported from SAP systems, the SAP authorization concept reaches its limits. [Shutterstock: 583980811, Constantin Stanciu]

When data is regularly being exported from SAP systems, the SAP authorization concept reaches its limits. [Shutterstock: 583980811, Constantin Stanciu]

Success Factor Data Classification

Data, protected by SAP authorization policies, is increasingly being exported out of secure SAP systems and distributed over third-party applications such as Microsoft Office. Those who want to protect their data should think about new data-centric security concepts and anchor them as a core process in IT operations.

This article is part of a series! If you would like to continue reading the series, please use the navigation buttons in the middle of the screen on the left and right side.

[Read more]

Doing away with supply chain management based on often incorrect forecast, DDMRP is the way into the future.[shutterstock: 536560483, Yeexin Richelle]

Doing away with supply chain management based on often incorrect forecast, DDMRP is the way into the future.[shutterstock: 536560483, Yeexin Richelle]

Long Overdue: Paradigm Shift in Supply Chain Management

At Sapphire, SAP presented its development strategy for Demand-Driven MRP. SAP is thus supporting a concept which finally adapts supply chain planning to the reality of today's business. This is still new territory for many SAP users.

[Read more]

Full speed ahead for SAP/SLES on AWS, Azure and Google Cloud Platform. [shutterstock: 675805390, showcake]

Full speed ahead for SAP/SLES on AWS, Azure and Google Cloud Platform. [shutterstock: 675805390, showcake]

SAP/SLES: Amazon, Microsoft and Google Step On The Gas

Anyone can now get Infrastructure as a Service (IaaS) such as Hana combined with Suse SLES for SAP applications directly via three public-cloud service provider heavyweights or cloud platforms: Amazon/AWS, Microsoft/Azure and Google/GCP.

[Read more]

Even with years of experience in IT security, securing an SAP system with custom codes and be quite the challenge. [shutterstock: 264410330, file404]

Even with years of experience in IT security, securing an SAP system with custom codes and be quite the challenge. [shutterstock: 264410330, file404]

Why SAP Security Is Difficult For Security Departments To Understand

I recently wanted to tell a colleague of one of our partners the benefits of our Virtual Forge TransportProfiler solution. The first question I encountered was “What is a transport?” Now, it’s not as if the individual with whom I was speaking was incompetent: He has over 25 years of experience in IT security, CISSP, CISM, and as a lecturer; nevertheless, in the long conversation followed, I had to explain to him the basic architecture of an SAP system.

[Read more]