SAP Enterprise Threat Detection
91 Blog Posts
43 Contributors
-
Post-COVID, the cyber threat landscape has undergone a seismic shift as cybercriminals take advantage of vulnerabilities created by the pandemic. This evolving threat landscape has been highlighted by many organizations in their recent research and... Read More »0Comments1Like
-
One of the first known cases of a cyber-attack to critical infrastructures was the power outage in Ukraine, which left over 225,000 people without electricity for several hours. Cybersecurity has evolved significantly in today’s... Read More »0Comments4Likes
-
Why your organization should take care: Maintaining the security of installed SAP software is of critical strategic importance for the continuous protection of SAP business applications to defend against new types of cyber attacks and to close... Read More »0Comments1Like
-
The energy and water sectors are two of the 16 critical infrastructure sectors the U.S. government labels as vital, noting that “their incapacitation or destruction would have a debilitating effect on security, national economic security, national... Read More »0Comments3Likes
-
SAP Enterprise Threat Detection is a security tool that helps organizations identify and respond to potential threats to their SAP systems. It uses machine learning algorithms to analyze system behavior and detect anomalies that could indicate... Read More »0Comments3Likes
-
(Jana Subramanian serves as APJ Principal Cybersecurity Advisor for Cloud Security and a Fellow of Information Privacy (FIP), awarded by the International Association of Privacy Professionals (IAPP). In this role, Jana supports strategic customer... Read More »0Comments16Likes
-
As a refresh, at SAP we tend to talk about 4 key ERP processes for the Intelligent Enterprise: Source-to-Pay Recruit-to-Retire Design-to-Operate Lead-to-Cash This blog looks at the last of these, Lead-to-Cash, and is in fact the last in the... Read More »1Comment6Likes
-
SAPinsider 2022, Vienna The 2022 conference in Vienna has been another great SAPinsider success. The experiences and challenges that people from companies all around the world share and discuss with each other is essential to support the... Read More »1Comment7Likes
-
– Some Best Practises about Application Security Monitoring and Network IT Security From a historical perspective, Security Experts performing Security Monitoring have generally been very focussed on Network and IT Security Monitoring.... Read More »0Comments5Likes
-
SAP Application Security Monitoring. In a perfect world all of this would not happen, but today CISOs are sometimes surprised when their business applications are compromised and the company loses data or business is affected by data... Read More »0Comments8Likes