Transforming Governance, Security and Compliance

  • LANGUAGE: English DATE: Tuesday, May 24, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Transforming Governance, Security and Compliance New strategies for securing modern SAP technology approaches like HANA

The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central high-volume and high-performance database. Deploying traditional SAP environments in the cloud and leveraging new cloud-based SAP applications introduce new groups of customers to SAP services and shift the focus of existing SAP users.

Subsequently these new types of technologies come with new security requirements and challenges and require adequate security and governance concepts. Appropriate access needs to be granted in a secure and auditable manner while fulfilling constantly changing regulatory requirements. Business-Oriented Access Governance and Intelligence are key in this transformation journey.

In this KuppingerCole Webinar, you will hear about:

  • Why the SAP HANA security model differs from a traditional database.
  • The biggest security challenges for SAP deployments in the cloud.
  • Securing modern SAP environments from the ground up while meeting existing and changing compliance demands.
  • A two-step process for security management that builds on a "security rulebook" and derived privilege-user mapping

In the first part of this webinar, Matthias Reinwarth, Senior Analyst at KuppingerCole, will give an overview of the new SAP cloud and Big Data offerings, their benefits and challenges. Then he will illustrate the changing security requirements for these new software technologies in contrast to traditional IT Security.

In the second part, Amit Saha COO at Saviynt, will dive deeper into the S/4HANA data model and the connected security challenges. He will explain how real life scenarios for addressing these challenges can be designed and will provide an overview of adequate solutions and capabilities. He will then extend this case to other critical enterprise and cloud applications.


Amit manages overall operations at Saviynt that includes driving product strategy, business development, alliances and go-to-market planning. He also manages strategic customer and partner relationships. He comes with over 16 years of experience in IT Security, Identity & Access Management...

Watch now


Trending Videos

Next Webinar


Effective Threat Detection for Enterprises Using SAP Applications

Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00