Skip to Content
Author's profile photo Kristian Lehment

Webinar-Recordings about SAP Security Products available

In September and October of 2016 there were several interesting webinars recorded. Product experts from the SAP headquarter in Walldorf, Germany, held several sessions under the umbrella of the International Focus Group (IFG). The recordings are available online, but hard to find using the search or even google. This is why I have listed them below with each one link to the recording.

SAP Security Products – Overview and Roadmap (Kristian Lehment)
SAP security products help safeguard your valuable information assets and support you in protecting your enterprise operations. The solution portfolio includes applications for identity and access management, single sign-on, threat detection, secure programming, and data security. In this session, find out more about the continuous evolution of our security products portfolio and learn about new features and enhancements planned for upcoming releases that help secure your business critical cloud and on-premise applications.

Simple steps towards higher security with the new release SAP Single Sign-On 3.0 (Christian Cohrs)
SAP Single Sign-On has become a best practice for secure authentication and protection of business data for SAP customers around the world. Ever since the release of version 2.0 we have closely collaborated with customers to continuously extend the product. In this session we would like to present the numerous enhancements and simplifications that are available to customers in version 3.0. This includes new options for secure authentication, single sign-on for mobile devices and a seamless user experience for cross scenarios covering native clients and browser based applications. As the product becomes more and more a security suite for SAP, we now also offer a reduction of operational costs for running a secure SAP landscape.

SAP Identity Management – Overview and Road Map (Kristian Lehment)
SAP Identity Management helps companies centrally manage the complete lifecycle of user accounts in a complex system landscape, including both, SAP and non-SAP systems. It protects your applications and data with tools that manage user access, integrate with company processes, ensure compliance and increase productivity via automation and self-service. Learn more about what is new, how to make a new connector for SAP IDM and what is coming next.

SAP Netweaver Application Server, add-on for code vulnerability analysis – Overview and Roadmap (Juergen Adolf)
How do we ensure secure software development at SAP? Learn how you can apply the same security standards in your custom development process as SAP is doing in-house. Using the ABAP development tools will help your developers to create highly secure applications.

SAP HANA Cloud Platform Identity Authentication service – the single sign-on solution for cloud applications (Marko Sommer)
One Log-In for SAP Applications in the Cloud. Join us for an overview of our plans for the on-demand SSO service. In addition to its features and functions, we cover SAP’s strategy to offer single sign-on across our various cloud offerings, including SAP S4/HANA, SAP Ariba, Concur and SAP SuccessFactors solutions, based on the SAP HANA Cloud Platform. We also provide information on supported standards for integrating cloud solutions with on-premise landscapes in identity federation scenarios.

SAP Enterprise Threat Detection – Overview and Road Map (Martin Plummer)
Are your key business processes running on SAP Systems? Would theft or manipulation of data stored in your key SAP systems seriously damage your business? Many customers would answer yes to one or both of these questions but yet do not take the steps necessary to protect themselves. Take time to understand how SAP Enterprise Threat Detection can complement your existing security measures to ensure the best possible protection.

If you want to get a copy of the presented slides: PDF versions are also available for download on the main page for IFG-Security-Webinars – click the (+) !  

Assigned Tags

      Be the first to leave a comment
      You must be Logged on to comment or reply to a post.