SAP Security Blog


SAP Professional Journal Highlights the Importance of Data Security

May 4, 2016

Today’s successful business environment thrives on technologies that have specific functions, yet are intertwined in a complex matrix. Data flows freely between systems making operations both efficient and vulnerable, at the same time. Data protection and data security are extremely critical — the number of new regulations published every single day across the globe proves [...]

What Makes an Outstanding DLP Solution for SAP?

May 2, 2016 DLP solution for SAP Security

  A successful DLP solution depends heavily on what sensitive information needs to be protected and how it can be directly identified. An outstanding DLP solution takes into account other factors that contribute to data loss, employee productivity, and streamlining the entire process. An outstanding DLP solution for SAP… …Integrates with your SAP system SAP, [...]

Reducing Data Loss Risks During Firefighter/EAM Sessions in SAP

March 15, 2016 SAP Firefighter

Governance, risk, and compliance initiatives are beginning to take root in many businesses that have to deal with many compliance rules and regulations. With integrated GRC solutions in place, companies have found a way to streamline processes and workflows without an overwhelming amount of software, hardware, and independent solutions that will incite confusion and increase [...]

Effective Risk Management Starts with GRC: Key Components of a GRC Framework

February 29, 2016 SAP GRC

Businesses are under a lot of pressure these days to comply with the complex and ever-evolving environment that is Governance, Risk Management, and Compliance. The need for a GRC framework is growing exponentially, and it is becoming increasingly more difficult and expensive to manage and comply with the many new regulations placed on businesses at [...]

5 Reasons to Integrate SAP Data in Your Existing Classification Framework

February 15, 2016 Classification Tagging

Protecting your organizations sensitive data is one of the most critical parts of business operations, and many are now taking steps to ensure data is protected. Large enterprises tend to apply large-scale solutions such as traditional perimeter security and DLP, and overlook the greater efficiency found in directly integrating security solutions, such as classification, into [...]

5 Steps to Implementing a Successful Data Classification Policy

February 1, 2016 Data Classification Guide

Many organizations have recognized that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into every day business activities. However, many companies fail to identify the sensitive of data they are trying to protect, which results in wasted resources used to [...]

Why Data Centric Security is the Next Big Thing

January 18, 2016 Data Centric Security

The past year has been quite threatening for large businesses and their customers when it comes to sensitive data security. Cyber attackers have been squeezing their way through corporate network security with ease, causing irreparable damage to big brands and their reputations. Network Security is Severely Lacking According to Verizon’s 2014 Data Breach Investigations Report, [...]

It’s Time to Tighten Our Belts: Security Risks Abound

January 11, 2016 ITRC 2014 Breach List

Data security risks are on the rise in the digitized world we live in. Showy examples of what happens when risk becomes a reality within large corporations are covered well by the media. Reading about the plight and consequences of these unfortunate organizations should bring about awareness to even the individual non-IT consumer. However, more often [...]

Shining Light on Shadow IT: What You Can Do to Protect Your Data

January 4, 2016

Lurking in the shadows of traditional IT departments are the ‘do it yourselfers’, the ‘I don’t need them’, and the ‘we have someone for that?’ employees who shun the idea of using technology approved by their corporate IT departments. Sounds implausible, but it is a rampant issue and for a time crunched employee who needs [...]

A Look at Multi-Layered Security Technologies

December 28, 2015

In the age where digitizing information is the norm, organizations large and small rely on a myriad of applications, systems, and tools to create, collaborate, calculate, and report large volumes of data pertaining to the success of their business. Examples of such data are Financials, PII, Bills of Materials, Trade data, Customer data, Engineering drawings, [...]

BYOD Best Practices: Securing Your Mobile Data

December 21, 2015

BYOD is a relatively new provision for companies and employees wanting to stay on the cutting edge of technology, while utilizing convenient mobility solutions within the company. Instead of an organization determining and providing the hardware for work use, employees are allowed to bring their existing devices and use them for work purposes as well [...]

What’s at risk with BYOD? Biggest Threats to Mobile Devices

December 14, 2015

There is an easy answer to this question when looked at from two different viewpoints. The use of employee personal devices in a work environment, for work purposes poses security concerns for both the employee as well as the employer. As an employee, the biggest risk with BYOD is allowing your employer access to your [...]

Sony Hack is Possibly Worst in History. Could It Have Had Less Impact?

December 9, 2014

YES. Despite the rumored reasons for the cyber attack on Sony Pictures, a data breach of any sort was unanticipated, and Sony’s IT infrastructure, which was largely unprepared for this type of situation, was exposed. The negligent and straightforward naming of sensitive documents, in conjunction with the lack of classification, authorization, encryption, and policies made these [...]

Enterprise Mobility: 2014 Trends and Threats

July 2, 2014

Technology has transformed the way we do business.  From clinical cubicles and being in an office 40+ hours a week to open workspaces, multiple screens, VPNs, and home offices, as technology advances, so does the way we work. With the advent of the mobile phone, came the age of enterprise mobility and a change in [...]

The CFO’s Critical Role in the Data Security War

April 15, 2014

Data thefts and breaches of unprecedented magnitude produce headlines nearly every day. From retail giants and financial institutes to healthcare and consumer companies, no organization is immune. For a long time, data security was considered solely a concern of the IT department. Now organizations are accepting that data security is actually a business problem. Think [...]

Data breaches are the new black…

March 10, 2014

…Or so it seems.  From well-known high profile companies, to lesser-known regional companies, 2013 has been fill with unprecedented amounts of cyber attacks and data breaches. Hackers, former employees, disgruntled workers, and shady competitors have picked up speed in the cyber attack business, and information security is having a hard time keeping up. Of all [...]

Did You Know Your SAP Data May Already Be in the Cloud?

January 3, 2014

 Whether You Like It or Not Many companies are finding it difficult to decide what resources they can or should migrate from their own private data centers into the modern and less expensive clouds run by IT giants such as Amazon and Microsoft. The decision of moving to the cloud is generally based on limitations of customized legacy platforms, the low [...]

Subscribe to Our Newsletter

Enter your email address to subscribe to our newsletter and receive educational information about latest trends and data security technologies.