Transforming Governance, Security and Compliance
- LANGUAGE: English DATE: Tuesday, May 24, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
New strategies for securing modern SAP technology approaches like HANA
The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central high-volume and high-performance database. Deploying traditional SAP environments in the cloud and leveraging new cloud-based SAP applications introduce new groups of customers to SAP services and shift the focus of existing SAP users.
Subsequently these new types of technologies come with new security requirements and challenges and require adequate security and governance concepts. Appropriate access needs to be granted in a secure and auditable manner while fulfilling constantly changing regulatory requirements. Business-Oriented Access Governance and Intelligence are key in this transformation journey.
In this KuppingerCole Webinar, you will hear about:
- Why the SAP HANA security model differs from a traditional database.
- The biggest security challenges for SAP deployments in the cloud.
- Securing modern SAP environments from the ground up while meeting existing and changing compliance demands.
- A two-step process for security management that builds on a "security rulebook" and derived privilege-user mapping
In the first part of this webinar, Matthias Reinwarth, Senior Analyst at KuppingerCole, will give an overview of the new SAP cloud and Big Data offerings, their benefits and challenges. Then he will illustrate the changing security requirements for these new software technologies in contrast to traditional IT Security.
In the second part, Amit Saha COO at Saviynt, will dive deeper into the S/4HANA data model and the connected security challenges. He will explain how real life scenarios for addressing these challenges can be designed and will provide an overview of adequate solutions and capabilities. He will then extend this case to other critical enterprise and cloud applications.
Digitalization evolves with the increased use of microcomputers in everyday objects like cars and smart fridges, but also in industrial applications. Therefore, communication between devices is growing accordingly. While connecting devices is supposed to make our lives easier, it poses a great challenge from a security standpoint. Every connection opens a potential backdoor for attackers to slip inside your network.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
KuppingerCole analysts build upon competencies from comprehensive research, experience from highly topical PAM advisory projects and systematically expanded and advanced best practices. Our analysts and advisors offer a one-of-a-kind, multi-channel approach to modern knowledge transfer: the KuppingerCole Master Class Privileged Access Management. Webinars and webcasts, up-to-date research documents, an all-day classroom workshop with final exam and certification of the acquired skills lay the foundation for establishing the necessary technical and methodological knowledge in your own organization.