Businesses large and small can now reap the benefits of cloud computing, one of which is the availability of core business applications via the Software-as-a-Service (SaaS) model. But while the benefits of such a model are exponential, so is the perception of risks. Security concerns for the application delivery environment in a SaaS model share many of the same concerns as other application delivery models. Where we really start to see a difference in the SaaS model in terms of security practices is around multi-tenancy, identity management, data storage and location, and data transmission and flow controls.
The good news is that when you partner with SAP for your SaaS applications, you don’t have to worry about any of these security concerns – because we do that all for you!
SAP Cloud uses a unique multi-tenant architecture that serves millions of users around the world in a secure yet cost-effective manner. For example, SuccessFactors an SAP company logically segments each customer’s data at the database level, complete with their own database schema. Customers can export their own schema out of the database, import or export data, and configure or modify fields. With this approach, SuccessFactors leverages the self-describing attributes of XML to abstract much of the unique customer data requirements into its object model, retaining all the advantages of a highly scalable and secure multi-tenant model while still offering a highly configurable application that does not comingle customers' data. SuccessFactors also provides a distinct application instance per customer, offering better security through enforced memory segregation.
SAP Cloud has adopted one of the best defenses for cloud security risk in the industry. Called “defense in depth,” this approach combines information security best practices with layered technology. Designed to protect information confidentiality, integrity, and availability, the “defense-in-depth” strategy for cloud solutions from SAP is multilayered, with defenses at all the touch points in the flow of data, and provides complete and comprehensive privacy, transparency, and audit controls.
The critical layers in a “defense in depth” approach include several key levels, such as:
We do it – so you don’t have to!
When your business is protected by a “defense in depth” security solution, you can confidently reap the benefits of a SaaS cloud computing offering. With cloud solutions from SAP, you can be assured that your data is secure at all times. We work with the best security and monitoring providers to:
At SAP, a seasoned team of industry experts that specialize in creating secure, reliable environments will help you save on IT staffing and build-out costs to safeguard your critical applications and data while keeping your business operations intact. We relentlessly focus on security—so you don't have to.
To learn more about “defense in depth” and the approach SAP Cloud takes to secure your data, download this white paper entitled “SAP Cloud: Focusing on security, so you can focus on business.”
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
11 | |
10 | |
6 | |
6 | |
4 | |
4 | |
4 | |
3 | |
3 | |
3 |