Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SAP

Is your IP safe from China? The US Government doesn't think so.

An Economist article published in June 2024 claimed that China is actively targeting US SMEs for long-term sabotage and for financial gain through sustained IP theft. With China using previously undetected methods of ‘cyber warfare’, it’s increasingly important that US companies adopt Zero Trust protection for their most valuable IP data.

From SAP IDM to One Identity: The preferred path for seamless migration

SAP recently announced the end-of-life for SAP Identity Manager (IDM). This announcement required SAP to establish guidelines for existing customers to transition away from the platform with other products. One Identity is a leading vendor of choice for this migration due to its well-established market presence and robust SAP solutions support. In this two-part blog series, we will shed some light on how One Identity can seamlessly integrate with SAP products, starting with its certified ABAP connector.

How One Identity can support SAP environments

In part two of this blog series, we will look at how One Identity can support SAP environments from an Identity and Access Management (IAM) perspective. As SAP Identity Management (IDM) reaches its end-of-maintenance, customers will need to explore alternatives for their identity management landscapes. Here is a list of some key elements to consider.

One Identity chosen as a leading IGA vendor for SAP transition

Larry Chinski, One Identity VP of Corporate Strategy, announces that One Identity was chosen as a leading vendor for SAP’s IGA customers, following SAP’s announcement of the end-of-life for SAP Identity Manager. One Identity Manager was selected as the IGA replacement solution for SAP customers due to its well-established market presence and robust SAP solutions support.

SASE | The future of secure networking in the cloud

Forward-thinking CIOs are turning to SASE. Secure networking has become imperative as new operating models emerge and workloads/applications shift rapidly to the cloud. Learn why SASE offers improved resilience and security while reducing complexity and enhancing efficiency for a more scalable IT infrastructure.

7 Cybersecurity Trends for 2024

As the curtains close for year 2023, the financial impact of cyberattacks on the global economy is predicted to reach $10.5 trillion. It is imperative for IT managers to be aware of the evolving landscape. Let’s see what will shape the cybersecurity arena in the coming year. From a data-centric perspective, we have identified 7 trends that will be important for data security.

How Secure is your Engineering Data?

The manufacturing industry has undergone a huge digital transformation in recent years. While these changes have increased productivity, the industry has also experienced new pressures from cybersecurity. In 2022, the industry has been vulnerable to 250 data violation incidents in the United States alone costing nearly 23.9 million USD. More and more industries are finding their intellectual property (IP) at risk as threat actors become more sophisticated.

Protecting SAP CUI Exports with HALOCORE

Business-critical applications such as ERP, SCM, CRM, PLM, and others support essential business functions and processes for the world’s largest commercial and government organizations. This includes supply chain, manufacturing, finance, sales and services, and defense. Many businesses in the Defense Industrial Base (DIB) utilize SAP in their ERP landscape.

How to manage SAP user accounts and access rights with Identity Manager

Does your company run SAP applications? If you do, you know how difficult it can be to manage identities. Most of the time, SAP applications are siloed and run completely independently of the rest your IT environment. This makes provisioning users across your SAP and non-SAP platforms a challenge at minimum and at worst, an impossible task. One Identity Manager provides comprehensive certified integration with SAP products.

Holistic SAP governance through enterprise environment integration

Vertical risk management and complete identity governance can only be achieved through the integration of critical platforms with other systems and applications in use and by either integrating existing point solutions or reducing their number altogether. Integration of an identity platform with SAP is one of those major challenges for many organizations today.