Latest and greatest about IT and SAP security
A few days ago news media organizations around the world ran the story of a memory stick found on a London street. It seemed innocuous enough, except that the stick contained extremely sensitive information on the travel routines of dignitaries’ locations of CCTVs in the airport, secret escape routes, ID requirements for physical access, timetable for antiterrorism patrols, and so on. One of the fundamental questions is: Could theft of such information be avoided?read more
‘Run the business-change the business’ has always been a challenge for all organizations across industries. This fine balance further accentuates when it comes to IT – the typical question being prioritization between data security solutions and IT transformation projects. Often large migration projects take priority over data security. Andreas Opfer and Holger Hügel show why that is often less than ideal.read more
Most business processes are not limited to SAP. Sensitive data is exported by users using Microsoft Office applications – a risk that is clearly underestimated. In this article, the author Holger Hügel (VP, Products and Services), explains inherent risks in data sharing – a quintessential requirement in today’s business scenario.read more
Recently, SECUDE published a series of articles on SAP data security in the popular independent magazine, E-3. In this article, the author Holger Heugel (VP, Products and Services), shares his perspectives on data classification in context to SAP data security. This article is part of a series published by the magazine.read more
In an interview with the E-3 magazine, Andreas Opfer and Holger Hügel describe how companies can leverage the architectural changes that are associated with SAP S / 4 HANA in order to raise the data security level.read more
CISOs are increasingly investing in robust data security solutions, such as DLP, assuming that their organization’s data will be perfectly secure. Most DLPs are content-based solutions that function based on key words. While it might seem secure, they could lead to complications, such as ‘false positives’ and ‘false negatives’, maybe even leading to permitted data being blocked and unauthorized data passing through the security filter.read more
Over the past few decades, Digital has been considered a key enabler in business and operations. In this regard, in January 2017, SAP launched SAP Leonardo – its digital transformation platform based on the Internet of Things. With a singular focus on levering ‘Things’ for superior business ‘Outcomes’, SAP Leonardo promises a revolution. But there may be a few things to keep in mind…read more
The rapid change in the development of enterprise IT architecture in the context of the digital transformation has led to a significant shift in application integration and data distribution models. As a result, applications too exchange sensitive data based on protocol. This is in addition to exchanges between users – internal and external. To effectively protect intellectual property and personal data, and thus, to meet the requirements of the new European Data Security regulation – GDPR, new solutions need to be considered.read more
Does your organization use Microsoft AIP to protect critical documentation and files? Do all your employees use it effectively? What stops them? Is it because they feel that the extra effort of applying a protective layer hampers their workflow? Too many questions, right? Here is a solution.read more
On 24th July, NBC News published a rather statistic heavy report by ITRC that presented a paradoxical picture. While on one end, the frequency of data breach in the US has “jumped 29% in the first half of this year”, on the other “cyber security still doesn’t get the respect it deserves”. Strange, but true!read more
A recent study by Veritas Technologies reveals startling facts about the level of preparedness by companies, especially in Germany. While CISOs and CTOs may state their level of readiness being on track, certain fundamental issues are still, scarily, left unanswered.read more
Why should enterprises simplify timely provision of data?
The General Data Protection Regulation (GDPR), which will be enforced from May 2018, requires companies to localize and provide personal data on request to clients and users within a short period of time. This would, essentially mean that, within 30 days, an applicant should have a copy of his or her data in order to be able to decide on its use, if necessary.