{"id":28999,"date":"2017-10-10T00:00:18","date_gmt":"2017-10-09T22:00:18","guid":{"rendered":"https:\/\/e326.greatsolution.dev\/?p=28999"},"modified":"2024-01-19T14:52:49","modified_gmt":"2024-01-19T13:52:49","slug":"sap-data-security-in-the-digital-age","status":"publish","type":"post","link":"https:\/\/e326.greatsolution.dev\/en\/sap-data-security-in-the-digital-age\/","title":{"rendered":"SAP data security in the digital age"},"content":{"rendered":"<h3>The challenge of system integration<\/h3>\n<p>Digitized processes know no system boundaries. Using modern development platforms such as SAP S\/4 Hana, thousands of sensitive data are exported from SAP to other applications, such as Microsoft Office, every day without any control.<\/p>\n<p>Traditional, role-based authorization concepts reach their limits here and confidential files quickly fall into the hands of cyber criminals or insiders - whether intentionally or accidentally.<\/p><div class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\" id=\"great-1563763587\"><a data-no-instant=\"1\" href=\"https:\/\/e326.greatsolution.dev\/en\/media-kit\/\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>According to a Bitkom study, more than half of German companies have already been victims of industrial espionage, sabotage or data theft in the last two years - a financial loss of almost 55 billion euros per year.<\/p>\n<p>The leaks are often found within the company's own ranks. 62% of the almost 600 companies surveyed stated that the relevant actions originated from their own employees. 41% confirmed corresponding activities from their business environment (competitors, customers, suppliers, service providers).<span style=\"color: #808080;\"> <em>[1]<\/em><\/span><\/p>\n<h3>Increasing pressure to act due to new EU GDPR<\/h3>\n<p>Although politicians are trying to curb data misuse with measures such as the EU GDPR, most companies are not yet up to the far-reaching, cross-process documentation obligations for personal data.<\/p>\n<p>Although the law has already come into force and the transition phase is only due to last until May 2018, most companies feel ill-prepared. <em><span style=\"color: #808080;\">[2]<\/span> <\/em><\/p>\n<p>Some CIOs have even ordered the topic to be ignored altogether. A decision that could prove fatal for them. After all, those who fail to comply with the new requirements risk high fines of up to 20 million euros or four percent of their annual global turnover.<em><span style=\"color: #808080;\"> [3]<\/span><\/em><\/p>\n<h3>Regaining control and rethinking for the long term<\/h3>\n<p>In order to effectively secure SAP data in the digitalized world, companies must first regain control over cross-system data flows.<\/p>\n<p>Those responsible must know who exports which data and when, and ensure that it is protected across all applications. The same applies to background data transfer between SAP and other systems such as Microsoft or Oracle.<\/p>\n<p>In the long term, the company-wide IT security concepts should also be reconsidered - from the type of data provision to the expansion of the role-based authorization system to include new, context-related data security concepts.<\/p>\n<p><a href=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Sap data security in the digital age\" class=\"aligncenter size-full wp-image-28634\" src=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel.jpg\" alt=\"Holger Huegel\" width=\"800\" height=\"619\" srcset=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel.jpg 800w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-768x594.jpg 768w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-100x77.jpg 100w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-480x371.jpg 480w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-640x495.jpg 640w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Holger-Huegel-720x557.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/e326.greatsolution.dev\/en\/partners\/secude-gmbh\/\"><img loading=\"lazy\" decoding=\"async\" title=\"Sap data security in the digital age\" class=\"aligncenter wp-image-11377 size-full\" src=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg\" alt=\"https:\/\/e326.greatsolution.dev\/partners\/secude-gmbh\/\" width=\"1000\" height=\"112\" srcset=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE.jpg 1000w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-768x86.jpg 768w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-100x11.jpg 100w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-480x54.jpg 480w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-640x72.jpg 640w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-720x81.jpg 720w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/03\/CI-SECUDE-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p><strong>To the guide:<\/strong><br \/>\n<a href=\"https:\/\/bit.ly\/2xzyUrN\" target=\"_blank\" rel=\"noopener noreferrer\"> https:\/\/bit.ly\/2xzyUrN<\/a><\/p>\n<p><em>References:<\/em><br \/>\n<em>[1] Economic protection in the digital world, Bitkom study 2017<\/em><br \/>\n<em>[2] GDPR Report, Veritas Study 2017<\/em><br \/>\n<em>[3] EU General Data Protection Regulation (EU GDPR), EU Regulation 2016<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Digital platforms such as SAP S\/4 Hana and increasing application integration present SAP security managers with new challenges. If you want to effectively secure intellectual property and sensitive data in the future, you need to think beyond system boundaries and establish new data-centric security concepts. A new guide from SECUDE shows what companies can do in the medium and long term to secure processes across systems against data misuse and to fulfill the documentation requirements of the new EU GDPR.<\/p>","protected":false},"author":355,"featured_media":29000,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2],"tags":[606,11281,5959],"coauthors":[23277],"class_list":["post-28999","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","tag-daten","tag-dsgvo","tag-sap-s4-hana","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"thumbnail":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-150x150.png",150,150,true],"medium":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",400,180,false],"medium_large":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-768x346.png",768,346,true],"large":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"image-100":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-100x45.png",100,45,true],"image-480":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-480x216.png",480,216,true],"image-640":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-640x288.png",640,288,true],"image-720":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-720x324.png",720,324,true],"image-960":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-960x432.png",960,432,true],"image-1168":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"image-1440":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"image-1920":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"1536x1536":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"2048x2048":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"trp-custom-language-flag":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",18,8,false],"bricks_large_16x9":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"bricks_large":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"bricks_large_square":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",1000,450,false],"bricks_medium":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",600,270,false],"bricks_medium_square":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden.png",600,270,false],"profile_24":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-24x24.png",24,24,true],"profile_48":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-48x48.png",48,48,true],"profile_96":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-96x96.png",96,96,true],"profile_150":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-150x150.png",150,150,true],"profile_300":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2017\/09\/Abbildung-Leitfaden-300x300.png",300,300,true]},"post_excerpt_stackable_v2":"<p>Digitale Plattformen wie SAP S\/4 Hana und die zunehmende Applikationsintegration stellen SAP-Sicherheitsverantwortliche vor neue Herausforderungen. Wer geistiges Eigentum und sensible Daten k\u00fcnftig wirksam absichern will, muss \u00fcber Systemgrenzen hinausdenken und neue datenzentrierte Sicherheitskonzepte etablieren. Ein neuer Leitfaden von SECUDE zeigt, was Unternehmen mittelfristig und langfristig tun k\u00f6nnen, um Prozesse system\u00fcbergreifend gegen Datenmissbrauch abzusichern und die Dokumenatationspflichten der neuen EU-DSGVO zu erf\u00fcllen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e326.greatsolution.dev\/en\/category\/scene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e326.greatsolution.dev\/en\/category\/sap-news\/\" rel=\"category tag\">Community Nachrichten<\/a>","author_info_v2":{"name":"Holger H\u00fcgel, Secude","url":"https:\/\/e326.greatsolution.dev\/en\/author\/holger-huegel\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/28999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/users\/355"}],"replies":[{"embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/comments?post=28999"}],"version-history":[{"count":1,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/28999\/revisions"}],"predecessor-version":[{"id":138214,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/28999\/revisions\/138214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/media\/29000"}],"wp:attachment":[{"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/media?parent=28999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories?post=28999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/tags?post=28999"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/coauthors?post=28999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}