Five Steps to Integrate SAP into Your Enterprise Defense Framework

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Steps to Integrate SAP into Your Enterprise Defense Framework-4 Next

Roles and Authorizations

Extend Roles and Authorizations Beyond SAP

Roles and authorizations configured in SAP are a crucial part of SAP security, as they ensure that only authorized users can access certain data. However, in order to do their jobs, users often have to extract such information from SAP for the purpose of collaboration with co-workers and partners, or for analytics or reporting. Unfortunately, the configured roles and authorizations in SAP do not extend to the data exported from SAP. Once the data has been exported, it is left vulnerable and exposed on users’ computers, mobile devices or cloud storage.

Information moves in and out of the enterprise in enormous volumes and rates, with sensitive data being sent beyond the enterprise borders every 49 minutes. By extending roles and authorizations configured in SAP to documents downloaded or extracted from SAP systems, enterprises can ensure persistent protection of their sensitive data, no matter how that data is accessed, stored or moved. The latest document security technologies, such as information rights management (IRM), allow companies to ensure that only authorized users can open protected content, while also controlling what they can do with it, such as printing, editing or saving it.

In an age where digitizing information is the norm, organizations large and small rely on a myriad of applications, systems, and tools to create, collaborate, analyze, and report large volumes of data critical to the success of their businesses.  One such tool, SAP, is used by a remarkable 282,000 customers around the world to run their businesses.

In addition to being an enterprise resource planning (ERP) tool, SAP is also a primary storage vault for a vast amount of sensitive and business-critical data. The data stored in SAP ranges from personally identifiable information (PII) such as Social Security numbers and financial metrics (such as unreleased quarterly results) to bill of material (BOM) information – often related to products that are subject to export control regulations (EAR and ITAR) and trade secrets.

SAP represents a mission-critical piece of IT infrastructure companies spend a lot of time and effort protecting, but many often fail to integrate SAP and its sensitive data into their overall data protection strategy. A comprehensive enterprise defense model is a key requirement in today’s age of digitized data, and ERP software should be an incremental part of that ecosystem. In this slideshow, SECUDE highlights five steps organizations should take to ensure SAP is integrated in their security framework.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.