Security for SAP Cloud Systems
written by
Ming Chang
123 pages, 2019
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-1854-7
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-1854-7
Data breaches, account hijacking, exploits—you know the threats to your data. With this E-Bite, see how SAP secures your cloud system. Discover the tools you can use to protect your data: single sign-on, the code vulnerability analyzer, SAP Solution Manager, and more. From data and operations to local regulations, understand what's being done, and what you can do, to keep your system secure.
- Understand SAP’s and your responsibilities for security in the cloud
- Learn about the SAP tools and services that secure cloud operations
- Walk through operations security, data security, compliance, and more
Content Keywords:
cloud security, security tools, operations security, data security, compliance
‹
›
Your web browser does not support this website feature!
Your browser is outdated and is not compatible with the latest online technologies.
Here are instructions on
how to upgrade to a modern web browser.
You may also like:
-
SAP System Security Guide
574 pages, hardcover
If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you! Discover information on security-relevant issues, from identity and access management to network and backend security. Get the technical know-how … More about the bookfrom $74.99
Available
E-book | Print edition | Bundle -
SAP HANA 2.0 Security Guide
608 pages, hardcover
Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and … More about the bookfrom $84.99
Available
E-book | Print edition | Bundle -
Implementing SAP Fiori 3 Security
104 pages
Get the guidance you need to protect your SAP Fiori apps! Start by reviewing SAP Fiori 3 architecture to see how it impacts security. Then follow step-by-step instructions to configure frontend and backend authorizations. Learn how to implement security methods … More about the book$29.99
Available
E-Bite