X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 sap security


The
During the course of product evaluations for a customer, the Technology Evaluation Center has uncovered a potential security hole in SAP R/3's three-tier

sap security  S in SAP Doesn't Stand for Security (that goes for PeopleSoft too) Event Summary During the course of product evaluations for a customer, the Technology Evaluation Center has uncovered a potential security hole in SAP R/3's three-tier architecture. SAP has revealed that it expects the database or third party products to handle security between the application server and the database server. If the client does not take these extra measures, the master password for the SAP database instance travels

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » sap security

Security Innovation


Security Innovation has been identifying application security risks for top software vendors and US government agencies since its inception. The company offers security services from application testing, to security code review, to auditing. Security Innovation was founded by a recognized authority in software security and is managed by software industry veterans and a team of experts that came from companies like Microsoft, Lockheed Martin, Harris Corporation, and IBM. The company is headquartered in Melbourne, FL (US) and has offices in Boston, MA and Bozeman, MT.

sap security   Read More

SAP Run Better Tour: Unwired


My TEC colleague Aleksey Osintsev and I recently made our way to the last stop of the SAP Run Better Tour in Montreal to get a taste of what SAP was cooking up in terms of improvements and strategies for 2011. I was hoping for some developments regarding mobile technology and support. Did I get my fill? Let’s just say I was still feeling a bit peckish when I left. Here’s the lowdown on SAP’s

sap security   Read More

How to Reduce Business Risk through Secure User Access for SAP


Unencrypted communication between users’ workstations and the backend SAP servers is a significant vulnerability to your SAP environment. This can put the confidential data inside your SAP systems and your entire business activity at risk—and have a negative impact on your customers. Find out how to reduce business risks and improve audit results through encrypted communication and two-factor user authentication for SAP.

sap security   Read More

GTM Solutions--Always Watch Out for SAP


For global trade management solutions (GTM) one should never overlook the enterprise applications leader SAP, which in most cases opts for in-house product delivery.

sap security   Read More

SAP Jam


SAP Jam brings together several types of social collaboration including social networking, collaboration with external participants (customers, recruits, partners, vendors, suppliers), structured collaboration for problem solving (business tools to strategize, rank items, enabling groups to weigh in on options, etc.), and business process integration. This combination of features enables businesses to seamlessly bring social into any process: social learning, social opportunity management, collaborative customer engagement, etc.

sap security   Read More

SAP ERP Market Analysis for SMB'S


As you'll discover in SAP ERP for SMB, SAP offers a range of ERP solutions for small and midsized businesses including a SaaS-based version called...

sap security   Read More

The Whys and Hows of a Security Vulnerability Assessment


TEC outlines the reasons for having a Security Vulnerability Assessment done, how a security vulnerability assessment is performed, what can be gained by enlisting the Security Vulnerability Assessment process, and what you should expect to see in a Security Vulnerability Assessment report. After all, the most important reason for having a Security Vulnerability Assessment performed is to enable corrective action. How can you know what to secure if you don't know what is insecure?

sap security   Read More

New Market for Security Insurance


Some insurance companies are now offering policies which protect companies against system, network, and website security losses. What do these policies offer corporations that they don't get in their standard General Liability Insurance Policy coverage?

sap security   Read More

Has SAP Become a PLM Factor to Be Reckoned With?


You have probably heard of SAP’s recent blockbuster acquisitions, but did you know about the vendor’s fervent in-house innovation and newly developed products for SCM and PLM sectors. In his recent article, TEC Principal Analyst P.J. Jakovljevic takes a close look at the continuous product and service innovation at SAP and discusses the key products and development strategies with SAP PLM solutions managers. Read more.

sap security   Read More

Vendor Analysis: Interliant's Security Vulnerability Assessment


A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security vulnerability assessment service to find out what their tactical strategy is in helping organizations minimize risk, how this strategy evolved, and what IT decision makers can expect to gain from using their services.

sap security   Read More