Key Insights Blog

Read the latest insights from our experts on Cybersecurity and Risk management for SAP. 

May 22, 2020
Even though SAP systems run on regular operating systems and databases, the application itself uses very specific standards and formats for exchanging and storing data. This article explains the top reasons chief security officer's neglect SAP Security
Category:
May 22, 2020
On 04.05.2020 / 23:19 CET/CEST SAP SE published an ad-hoc news informing their investors about a security shortcoming affecting some products of their cloud portfolio. On-Premise customers are not impacted. The company emphasizes that no cyber security incident was found.
Category:
Find recent Security Advisories for SAP©

You like it?
Share it!

Share on linkedin
Share on twitter
Share on whatsapp
Share on email

Next-Gen Application Security for SAP

Join roundtable delegates who will discuss the challenges, solutions, and their experiences in simplifying security and combining it across the network and the SAP application, to introduce a shift in paradigm for SAP customers.
Download the White Paper “YOUR ROAD TO SAP SECURITY” to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.
Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.