Security and compliance continue to be the top concerns for migrating to SAP S/4HANA in the cloud, even above performance, flexibility and cost. That’s because, ultimately, it’s still your responsibility to ensure the security of your data and applications—even if they reside in someone else’s datacenter. Fortunately, a strong cloud provider and the right tools can take security from a project roadblock to an accelerator, while keeping your data and applications protected along the way.
During our recent webinar covering our threat report, we received a lot of great questions from attendees. In this post, we are going to address some of the questions that were asked in the live session.
Welcome to the final installment of our series on the Dangers in SAP Transport Management. In our final post, we’ll focus on how an attacker could leverage logical file names and logical OS commands within SAP transports to access, modify and exfiltrate data.
Recently, Onapsis and SAP released research that provides conclusive evidence that the impact and probability of attacks on unprotected SAP applications is putting organizations at extremely high risk.
In our recent webinar, “Top Cybersecurity and Compliance Tips for Salesforce”, we went over why Salesforce security is so important and the best ways to mitigate risk.