Implement cybersecurity throughout your SAP landscape!

Cybersecurity for SAP

approx. $84.99

Pre-order now

approx. $89.95

Pre-order now

approx. $99.99

Pre-order now

Print edition E-book Bundle
500 pages, , Print edition hardcover
ISBN 978-1-4932-2592-7
500 pages,
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2593-4
500 pages, , Print edition hardcover
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2594-1
Protect your SAP system from bad actors! Start by getting a thorough grounding in the why and what of cybersecurity before diving into the how. Create your security roadmap using tools like SAP’s secure operations map and the NIST Cybersecurity Framework (CSF). Then walk through key cybersecurity processes: vulnerability management, threat detection, incident response, disaster recovery, and more. With step-by-step instructions for implementing infrastructure and network security and using tools like SAP Trust Center, this guide will help you safeguard your system!
  • Learn to use the secure operations map framework for cybersecurity
  • Implement vulnerability management, threat detection, network security, and other cybersecurity techniques in your SAP system
  • Map SAP cybersecurity functions to frameworks, standards, and regulatory requirements for compliance
About the Book About the E-book 500 pages, hardcover. Foreword by Mariano Nuñez. Reference book format 7 x 10 in. Printed black and white on 50# offset paper from sustainable sources. Casebound for durability. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout. E-book in full color. PDF and EPUB files for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application.

In this book, you'll learn about:

  1. Getting Started

    Walk through cybersecurity principles, concepts, and frameworks in the context of your SAP system. Learn why your baseline SAP landscape needs additional cybersecurity protection and which tools can be used to defend which parts.

  2. Implementing Cybersecurity

    Establish robust cybersecurity practices in your SAP landscape! Build a review process for patch day, detect anomalies, create a backup strategy, assess the impact of the cloud on your security protocols, and much, much more.

  3. Frameworks and Tools

    Discover how to map SAP security functions to standard frameworks like NIST, ISO, and CIS. Explore tools that help you secure your landscape like SAP Trust Center and discover the RISE with SAP shared responsibility model.

Highlights include:

  • Security architecture
  • Secure operations map
  • Vulnerability management
  • Threat detection
  • Incident response
  • Business continuity
  • Disaster recovery
  • Infrastructure security
  • Network security
  • SAP Trust Center
  • Cloud cybersecurity

Gaurav Singh is an SAP cybersecurity manager at Under Armour with more than 19 years of experience and a proven track record of helping organizations protect themselves from cyber threats while maximizing their SAP investments.

Juan Perez-Etchegoyen is the chief technology officer at Onapsis. JP oversees the research and innovation teams that keep Onapsis on the cutting edge of the business-critical application security market.

more >

You may also like:

  • NewCover of Enterprise Architecture with SAP: Planning, Management, and Transformation

    Enterprise Architecture with SAP: Planning, Management, and Transformation

    Anup Das, Peter Klee, Johannes Reichel

    562 pages, paperback

    Calling all SAP enterprise architects—the strategy guide you need is here! See how the SAP EA Framework supports your enterprise architecture with methodology, reference content, tools, and services. Explore examples of architecture design pattern implementation for real-world use cases, including More about the book

    from $84.99

    Available

    E-book | Print edition | Bundle
  • Cover of Introducing SAP Cloud Identity Access Governance (IAG)

    Introducing SAP Cloud Identity Access Governance (IAG)

    Raghu Boddu, Bhagyashree Patil

    111 pages

    Learn about access management for your cloud and hybrid landscapes with SAP Cloud Identity Access Governance! First, understand the security challenges that SAP Cloud IAG helps solve. Then see how SAP Cloud IAG’s services work, from access analysis and privileged More about the book

    $24.99

    Available

    E-Bite
  • Cover of Introducing RISE with SAP

    Introducing RISE with SAP

    Anurag Barua

    88 pages

    Is RISE right for you? Get the inside scoop on SAP’s private cloud adoption pathway with this starter guide to RISE with SAP! First, see what’s on offer: Explore the capabilities of SAP S/4HANA Cloud Private Edition and SAP Signavio More about the book

    $24.99

    Available

    E-Bite