• What does a CISO need to know about SAP SECURITY?

    by Sükrü ilkel Birakoglu, Senior DirectorSAP Systems had their evolution in years from closed mainframes [...]

  • Monitoring and assessing segregation of duties (SoD) conflicts in SAP systems

    by Sükrü ilkel Birakoglu, Senior Director Segregation of Duties (SoD) is an internal process which [...]

  • Securing your business-critical data with BCS for SAP

    By Ira Lisa Kristina Leino, Product Marketing Manager SAP systems are the center of business operations, [...]

  • Protecting Intellectual Property (IP) in SAP

    Always the bridesmaid and never the bride, SAP, in security terms, is the often-maligned function [...]

  • Business-critical applications: What are they and how do you protect them from cyberattack?

    by Aida Grollov, Product Marketing Manager, LogpointDid you know that SAP customers generate 87% of [...]

  • On Demand: Webinar – Bridging the SAP Security Gap in your Digital Transformation

    Security is a huge part of any digital transformation, however, according to a recent Ponemon [...]

  • SAP Security – Recommended Best Practices

    Our free guide “Meeting Information Security Standards with SAP Security” provides recommendations and best practices [...]

  • SAP under attack: Be aware of the gap

    Christoph Aschauer, Director, LogPoint for SAPSAP is a market leader in enterprise application software and [...]

  • Beginners guide to SAP Security: Why is it important and how does it work?

    Organizations using SAP as their business application or ERP system often store their most critical [...]