Cyberthreats to SAP Require a Next-Generation Identity Platform

With over 320,000 customers worldwide, SAP is one of the most critical business applications in the market. Because of the information that it contains, it is also one of the most targeted applications and systems for cyberthreats. Over the past few years, the SAP landscape has expanded beyond legacy ERP systems into technologies such as cloud, mobile, big data and the Internet of Things (IoT), while at the same time broadening the attack surface for SAP applications. According to a Ponemon Institute survey released earlier this year: Two of three SAP platforms were likely breached between 2014 and 2015. 75%…

SAP TechEd: 3 Realities of the SAP Community

We just completed another productive week at SAP TechEd and would like to thank the many Centrify customers who visited with our team and reaffirmed that Centrify is a vital to securing their SAP environments. Our customers inspire us to work harder each day, and we will continue to do our very best to maintain their confidence and trust. After attending the conference, and as we look ahead, Centrify understands these three realities of the SAP community: SAP systems are under constant attack: Since SAP is a critical business application in an enterprise containing some of the most crucial business data, intellectual…

SAP Security and Cyberattacks Do Not Mix

Let’s face it — if you’re using SAP to run your business, you simply can’t afford to allow a cyberattack to affect your critical business application. Until now, security for SAP has not been at the forefront of addressing a prevalent cause of data breaches — compromised credentials. Within a typical SAP landscape, organizations may have ordinary users, power users/basis admins and mobile users, all of whom access the network from different user interfaces. And, of course, you need infrastructure to power the SAP applications, as the infrastructure is vital to a high-performance environment. All too often, these two worlds rarely intersect…