SAP Security in the Age of Digitalization
Blog Security

SAP Security in the Age of Digitalization

No matter if Industry 4.0, SAP Hana, Cloud or Blockchains: if you want to survive on the global market, you cannot afford to shut yourself off to recent IT trends.

This is also shown by the relevant offers of SAP. But the progressing digitalization and the use of new technologies like quantum computing means higher demands on security.

Top priority is that digitalization and data security have to be declared as management issues. The manager cannot simply focus on technical issues. Rather, they also have to build personal resources and specialist knowledge to be able to use the chances given by the digital transformation while minimizing its dangers.

It is of utmost importance to invest in IT specialists (e.g. through further training) in order to establish a competent in-house IT support. Furthermore, the employees of the other departments also need to be regularly informed about IT innovations and their security risks.

Main safety hazards are Shadow IT and the use of private devices because more and more often malware enters the company’s IT infrastructure on this route via mobile devices, like smartphones or tablets.

This is especially the case for SAP landscapes: Many consider their SAP landscape to be separate from their “regular” IT infrastructure but today’s SAP systems are de facto just as connected – and due to that, vulnerable.

In addition, management needs to explicitly name an IT contact person, whom other workers can call on and who is also in charge of communication with IT service providers. It is recommended to regularly work with external advisers to sensibly complement one’s own IT competence.

Virtual Forge

About the author

Markus Schumacher, Virtual Forge

Dr. Markus Schumacher is co-founder and CEO of Virtual Forge.

Add Comment

Click here to post a comment

Sign up for e3zine´s biweekly newsbites

Please do not use administrative mail adresses like "noreply@..", "admin@.." or similar as these may get blocked for security reasons.

We use rapidmail for dispatching our newsletter. By signing up, you agree that the data you have entered will be transmitted to rapidmail. Please take note of their terms and conditions and privacy policy.termsandconditions.

Our Authors