Transforming Governance, Security and Compliance
- LANGUAGE: English DATE: Tuesday, May 24, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central high-volume and high-performance database. Deploying traditional SAP environments in the cloud and leveraging new cloud-based SAP applications introduce new groups of customers to SAP services and shift the focus of existing SAP users.
Subsequently these new types of technologies come with new security requirements and challenges and require adequate security and governance concepts. Appropriate access needs to be granted in a secure and auditable manner while fulfilling constantly changing regulatory requirements. Business-Oriented Access Governance and Intelligence are key in this transformation journey.
In this KuppingerCole Webinar, you will hear about:
- Why the SAP HANA security model differs from a traditional database.
- The biggest security challenges for SAP deployments in the cloud.
- Securing modern SAP environments from the ground up while meeting existing and changing compliance demands.
- A two-step process for security management that builds on a "security rulebook" and derived privilege-user mapping
In the first part of this webinar, Matthias Reinwarth, Senior Analyst at KuppingerCole, will give an overview of the new SAP cloud and Big Data offerings, their benefits and challenges. Then he will illustrate the changing security requirements for these new software technologies in contrast to traditional IT Security.
In the second part, Amit Saha COO at Saviynt, will dive deeper into the S/4HANA data model and the connected security challenges. He will explain how real life scenarios for addressing these challenges can be designed and will provide an overview of adequate solutions and capabilities. He will then extend this case to other critical enterprise and cloud applications.
Passwords are quickly and easily compromised, they are costly and difficult to manage, and they result in poor user experiences. Many organizations are looking for alternatives, but find it challenging to identify appropriate passwordless and phishing resistant authentication solutions that are simple, effective, and secure.