SAP TechEd: 3 Realities of the SAP Community

We just completed another productive week at SAP TechEd and would like to thank the many Centrify customers who visited with our team and reaffirmed that Centrify is a vital to securing their SAP environments. Our customers inspire us to work harder each day, and we will continue to do our very best to maintain their confidence and trust.


After attending the conference, and as we look ahead, Centrify understands these three realities of the SAP community:

  1. SAP systems are under constant attack: Since SAP is a critical business application in an enterprise containing some of the most crucial business data, intellectual property and even financials, this creates a sprawling attack surface for hackers to target.
  2. Security is everyone’s responsibility: We heard many people (especially enterprise architects, security managers and basis teams) tell us that there is a pressing need to improve SAP Security. However, in many organizations, it’s unclear which individuals have the responsibility for securing the SAP ecosystem. The harsh reality is that every “user” shares the duty to secure our critical systems and applications. Just as we do not hold the doors to our secured offices to let anyone come in, we must all be vigilant.
  3. “I didn’t know” is no longer an acceptable excuse: There was a time when IT leadership could claim plausible deniability and a general lack of awareness that there were serious cyberthreats affecting their organizations. Katherine Archuleta, who once headed the Office of Personnel Management, can surely tell you that there are consequences to ignoring current market conditions, especially as it relates to failing to secure data, infrastructure and applications. Given the barrage of headlines about the daily breaches that occur, responsible leaders are proactive to put appropriate measures in place to keep pace with hackers.

Centrify understands these challenges and invites you to join us for one of our upcoming webinars, where we will share insights to how some of the greatest companies in the world leverage Centrify to protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.

Be sure to register for our upcoming webinar on Tuesday, October, 11th.