SAP Security in the Digital Age
Close the ‘Insider’ Security Gap and Become GDPR Compliant
New challenges for SAP customers
The migration to SAP S/4HANA pushes proven SAP security concepts to their limits and creates new application interfaces and security gaps. Furthermore, the digitization of society makes data theft more attractive.
This is shown by the increasing number of security incidents. More than half the companies in Germany have been victims of industrial espionage, sabotage or data theft over the past two years.  Sixty percent of cyber attacks worldwide are caused by insiders or third parties who have access to systems.  The new EU General Data Protection Regulation (GDPR) requires extensive documentation of personal data processing. Breach of the regulation could lead to penalties of up to 20 million Euros or four percent of the company’s global annual turnover. 
This Guide briefly explains how to
- Protect your intellectual property against misuse and attack
- Meet the documentation requirements of GDPR
- Integrate data security into your current SAP S4/HANA migration projects
Get answers to the following questions:
- How do companies protect from loss or theft critical data exported from secure SAP systems?
- How do data protection officers document and control the use of personal data outside the SAP system?
- What are the options to carry out necessary measures in a time-saving manner in parallel to currently prioritized transformation projects?
 Bitkom 2017,  IBM,  EU-DSGVO