Blog

Latest and greatest about IT and SAP security

Compromised data is compromised security

A few days ago news media organizations around the world ran the story of a memory stick found on a London street. It seemed innocuous enough, except that the stick contained extremely sensitive information on the travel routines of dignitaries’ locations of CCTVs in the airport, secret escape routes, ID requirements for physical access, timetable for antiterrorism patrols, and so on. One of the fundamental questions is: Could theft of such information be avoided?

read more

E-3 Magazine Interview: Data Security – Protecting The Crown Jewels

‘Run the business-change the business’ has always been a challenge for all organizations across industries. This fine balance further accentuates when it comes to IT – the typical question being prioritization between data security solutions and IT transformation projects. Often large migration projects take priority over data security. Andreas Opfer and Holger Hügel show why that is often less than ideal.

read more

E-3 Magazine Article: Data Exports – The Big Security Risk

Most business processes are not limited to SAP. Sensitive data is exported by users using Microsoft Office applications – a risk that is clearly underestimated. In this article, the author Holger Hügel (VP, Products and Services), explains inherent risks in data sharing – a quintessential requirement in today’s business scenario.

read more

Magazine Article: Success Factor Data Classification

Recently, SECUDE published a series of articles on SAP data security in the popular independent magazine, E-3. In this article, the author Holger Heugel (VP, Products and Services), shares his perspectives on data classification in context to SAP data security. This article is part of a series published by the magazine.

read more

E-3 Special: Data Security

In an interview with the E-3 magazine, Andreas Opfer and Holger Hügel describe how companies can leverage the architectural changes that are associated with SAP S / 4 HANA in order to raise the data security level.

read more

Why reinvent the wheel? Leverage existing investments in data security with a difference

CISOs are increasingly investing in robust data security solutions, such as DLP, assuming that their organization’s data will be perfectly secure. Most DLPs are content-based solutions that function based on key words. While it might seem secure, they could lead to complications, such as ‘false positives’ and ‘false negatives’, maybe even leading to permitted data being blocked and unauthorized data passing through the security filter.

read more

Complete Digital interconnection through IOT is the way forward for global businesses. But be wary.

Over the past few decades, Digital has been considered a key enabler in business and operations. In this regard, in January 2017, SAP launched SAP Leonardo – its digital transformation platform based on the Internet of Things. With a singular focus on levering ‘Things’ for superior business ‘Outcomes’, SAP Leonardo promises a revolution. But there may be a few things to keep in mind…

read more

Is your automated, policy-based machine-to-machine communication secure? Think again!

The rapid change in the development of enterprise IT architecture in the context of the digital transformation has led to a significant shift in application integration and data distribution models. As a result, applications too exchange sensitive data based on protocol. This is in addition to exchanges between users – internal and external. To effectively protect intellectual property and personal data, and thus, to meet the requirements of the new European Data Security regulation – GDPR, new solutions need to be considered.

read more

GDPR is around the corner. Are companies really prepared?

A recent study by Veritas Technologies reveals startling facts about the level of preparedness by companies, especially in Germany. While CISOs and CTOs may state their level of readiness being on track, certain fundamental issues are still, scarily, left unanswered.

read more

Companies realize that they are unprepared for GDPR

Why should enterprises simplify timely provision of data?
The General Data Protection Regulation (GDPR), which will be enforced from May 2018, requires companies to localize and provide personal data on request to clients and users within a short period of time. This would, essentially mean that, within 30 days, an applicant should have a copy of his or her data in order to be able to decide on its use, if necessary.

read more