Unsecured interfaces are one of the top issues in SAP security. Hackers and data thieves can gain access via the unsecured backdoor. [shutterstock: 787105330, g0d4ather]

Unsecured interfaces are one of the top issues in SAP security. Hackers and data thieves can gain access via the unsecured backdoor. [shutterstock: 787105330, g0d4ather]

Do you know your interfaces – all of them?

Unsecured interfaces to and from SAP systems open the doors to hackers. Many companies are aware of this – yet they still do not have sufficient security measures in place. Solutions with which interfaces in SAP system landscapes can be analyzed and monitored comprehensively are needed

[Read more]

Common encryption technologies may very well be out of date soon with quantum computing right around the corner. [shutterstock: 447671734, Ruslan Grumble]

Common encryption technologies may very well be out of date soon with quantum computing right around the corner. [shutterstock: 447671734, Ruslan Grumble]

IT Security in the Age of Quantum Computing

IT security experts hear alarm bells ringing: Breakthroughs in quantum computing could sound the death knell for conventional encryption techniques. The time has come for post-quantum cryptography (PQC).

[Read more]

According to Syslink, they poured 23 years of SAP systems monitoring best practice into their new software release. [shutterstock: 572306548, Peter Kotoff]

According to Syslink, they poured 23 years of SAP systems monitoring best practice into their new software release. [shutterstock: 572306548, Peter Kotoff]

Xandria: Fresh Monitoring Experience with Actionable Analytics for SAP

Syslink just made the newest update to the Xandria solution for monitoring SAP systems available in October. Xandria now offers enhances capabilities in the areas of landscape visibility, predictive resource planning and audit-readiness.

[Read more]

Large migration projects are often taking priority over data security. Andreas Opfer and Holger Hügel show why that is often less than ideal. [shutterstock: 556017796, Zambir Zakaria]

Large migration projects are often taking priority over data security. Andreas Opfer and Holger Hügel show why that is often less than ideal. [shutterstock: 556017796, Zambir Zakaria]

Data Security: Protecting The Crown Jewels

Although the number of security incidents is growing steadily among large and medium-sized enterprises, many of them prioritize data security lower than IT transformation projects. Andreas Opfer and Holger Hügel from Secude explain how modern security concepts should look like and how SAP executives can integrate them usefully into current Hana migration projects.

This article is the last of a series! If you would like to continue reading the series, please use the 'previous button' in the middle of the screen on left side.

[Read more]

When data is regularly being exported from SAP systems, the SAP authorization concept reaches its limits. [Shutterstock: 583980811, Constantin Stanciu]

When data is regularly being exported from SAP systems, the SAP authorization concept reaches its limits. [Shutterstock: 583980811, Constantin Stanciu]

Success Factor Data Classification

Data, protected by SAP authorization policies, is increasingly being exported out of secure SAP systems and distributed over third-party applications such as Microsoft Office. Those who want to protect their data should think about new data-centric security concepts and anchor them as a core process in IT operations.

This article is part of a series! If you would like to continue reading the series, please use the navigation buttons in the middle of the screen on the left and right side.

[Read more]