Latest Sponsored Events
Related Videos
Webinar Recording
Jun 29, 2022
Effective Threat Detection for Enterprises Using SAP Applications

Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage. But this can be challenging, especially when critical data is stored in business applications on-premise and in the cloud. Join cybersecurity experts from KuppingerCole Analysts and SAP for a discussion on why monitoring the SAP landscape is necessary and how this can be best achieved.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about finding the right mix of cross-application solutions for threat detection, SIEM, and SOAR, and specialized solutions for critical environments such as the SAP line of business applications. He also will look at the interplay between security and identity, and how this can all converge in a modern Security Operations Center. Arndt Lingscheid, Solution Owner for SAP GRC – Security and Data Protection at SAP  will share his perspectives and provide a detailed overview of SAP Enterprise Threat Detection Cloud Version that is designed to provide expert SAP security monitoring to neutralize threats in real time based on an included Managed Security Service.

Webinar Recording
May 27, 2022
Effective Identity Access Governance in Hybrid SAP Environments

Increased cyber threats and regulatory requirements for privacy and security make staying on top of user roles and access rights in hybrid IT environments more important and challenging than ever, which means it’s important to understand the real risks and how to mitigate them effectively with modern GRC capabilities.

Join IAM experts Martin Kuppinger, Principal Analyst at KuppingerCole, Anna Otto, Customer Advisory Expert for SAP Security & GRC at SAP, and Steffen Trumpp, a Solution Advisor Expert at SAP, for an in-depth discussion of modern IAM challenges and solutions, especially in the context of traditional SAP environments and SAP Cloud applications such as Ariba and SuccessFactors.

Martin Kuppinger looks at the evolution of the IAM (Identity and Access Management) and Application Risk Management (ARM) markets. He will explain how to support in-depth management of SAP environments including the cloud-based applications, while supporting the broader IT environment, and discuss strategies for convergence and integration.

Anna Otto and Steffen Trumpp provide an overview of SAP Cloud Identity Access Governance and how it can simplify management of users and authorizations in hybrid IT environments. They will also discuss benefits of activity monitoring, risk simulation, and automation in terms of regulatory compliance, efficiency, and security.

Webinar Recording
Dec 09, 2020
Explore the Cutting Edge of Data-Driven Customer Experience

To accomplish complex and critical missions, market leaders are turning to a new generation of customer data platforms (CDPs). They uncover hidden revenue opportunities by unifying all sources of customer data into comprehensive and actionable profiles.

Webinar Recording
Nov 13, 2015
Controlling Access through Centralized Authorization
Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected devices and smart phones brings a new set of challenges beyond these traditional controls requiring the use of authorization as a fundamental component for a complete access and security strategy.