Implement cybersecurity throughout your SAP landscape!

Cybersecurity for SAP

approx. $84.99

Pre-order now

approx. $89.95

Pre-order now

approx. $99.99

Pre-order now

Print edition E-book Bundle
455 pages, , Print edition hardcover
ISBN 978-1-4932-2592-7
455 pages,
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2593-4
455 pages, , Print edition hardcover
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2594-1
Protect your SAP system from bad actors! Start by getting a thorough grounding in the why and what of cybersecurity before diving into the how. Create your security roadmap using tools like SAP’s secure operations map and the NIST Cybersecurity Framework (CSF). Then walk through key cybersecurity processes: vulnerability management, threat detection, incident response, disaster recovery, and more. With step-by-step instructions for implementing infrastructure and network security and using tools like SAP Trust Center, this guide will help you safeguard your system!
  • Use the NIST Cybersecurity Framework to design your cybersecurity program
  • Implement vulnerability management, threat detection, network security, and other techniques in your SAP system
  • Map SAP cybersecurity functions to frameworks, standards, and regulatory requirements for compliance
About the Book About the E-book 500 pages, hardcover. Foreword by Mariano Nuñez. Reference book format 7 x 10 in. Printed black and white on 50# offset paper from sustainable sources. Casebound for durability. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout. E-book in full color. PDF and EPUB files for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application.

In this book, you'll learn about:

  1. Getting Started

    Walk through cybersecurity principles, concepts, and frameworks in the context of your SAP system. Learn why your baseline SAP landscape needs additional cybersecurity protection and which tools can be used to defend which parts.

  2. Implementing Cybersecurity

    Establish robust cybersecurity practices in your SAP landscape! Build a review process for patch day, detect anomalies, create a backup strategy, assess the impact of the cloud on your security protocols, and much, much more.

  3. Frameworks and Tools

    Discover how to map SAP security functions to standard frameworks like NIST, ISO, and CIS. Explore tools for securing your landscape, such as SAP Trust Center, and discover the RISE with SAP shared responsibility model.

Highlights include:

  • Security architecture
  • NIST Cybersecurity Framework (CSF)
  • Secure operations map
  • Vulnerability management
  • Threat detection
  • Incident response
  • Business continuity
  • Disaster recovery
  • Infrastructure security
  • Network security
  • SAP Trust Center
  • Cloud cybersecurity

Gaurav Singh is an SAP cybersecurity manager at Under Armour with more than 19 years of experience and a proven track record of helping organizations protect themselves from cyber threats while maximizing their SAP investments.

Juan Perez-Etchegoyen is the chief technology officer at Onapsis. With more than 20 years of experience in the IT security field, JP is a leading expert in business-critical application security, specializing in safeguarding ERP landscapes.

more >

You may also like:

  • Cover of Enterprise Architecture with SAP: Planning, Management, and Transformation

    Enterprise Architecture with SAP: Planning, Management, and Transformation

    Anup Das, Peter Klee, Johannes Reichel

    562 pages, paperback

    Calling all SAP enterprise architects—the strategy guide you need is here! See how the SAP EA Framework supports your enterprise architecture with methodology, reference content, tools, and services. Explore examples of architecture design pattern implementation for real-world use cases, including More about the book

    from $84.99

    Available

    E-book | Print edition | Bundle
  • Cover of Introducing SAP Cloud Identity Access Governance (IAG)

    Introducing SAP Cloud Identity Access Governance (IAG)

    Raghu Boddu, Bhagyashree Patil

    111 pages

    Learn about access management for your cloud and hybrid landscapes with SAP Cloud Identity Access Governance! First, understand the security challenges that SAP Cloud IAG helps solve. Then see how SAP Cloud IAG’s services work, from access analysis and privileged More about the book

    $24.99

    Available

    E-Bite
  • Cover of Implementing SAP Enterprise Threat Detection

    Implementing SAP Enterprise Threat Detection

    Mercedes Barrachina, Glen Hoaglund, Gaurang Joshi, Ryan Throop

    80 pages

    Stay ahead of cybersecurity vulnerabilities with SAP Enterprise Threat Detection. Learn to set up and use standard and nonstandard logs to analyze risks in your SAP environment. Review attack detection patterns and create your own custom patterns based on log More about the book

    $29.99

    Available

    E-Bite