What's Hot

    What Can You Trust?

    May 7, 2025

    Build a Safer Jobsite with AI and Cameras

    May 7, 2025

    Women in Construction: PPE

    May 6, 2025
    Get your Copy Today
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    Connected WorldConnected World
    • SPM
    • Sustainability
    • Projects
    • Technology
    • Constructech
    • Awards
      • Top Products
      • Profiles
    • Living Lab
    Connected WorldConnected World
    Home»Peggy's Tech Blog»How to Secure SAP
    Peggy's Tech Blog

    How to Secure SAP

    Updated:March 27, 2023No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn WhatsApp Pinterest Email

    Cyberattacks are on the rise, as threat actors become more creative, geopolitical conflicts rise, and supply-chain disruptions continue to surge. At the same time, security teams are tasked with siphoning through a massive amount of raw data to uncover true threats. As the challenges continue to mount, this is causing general fatigue among security teams, as they continue to face all the cybersecurity and ransomware attacks thrown at them.

    This is where a third party can cut through all that noise and find the true threats quickly. I recently had an opportunity to sit down with Ryan Throop, executive consultant – Americas Lead SAP Security Services, IBM Consulting, and Nathan Weaver, senior director, SAP Business Unit, Microsoft, on The Peggy Smedley Show to talk specifically about SAP security.

    Throop says SAP is a large software company and provides solutions that literally cover all aspects of a business—and there are so many security concepts that need to be covered. Add to this the fact that nearly every large corporation in nearly every vertical market from manufacturing to retail runs SAP, and the need to secure it becomes paramount.

    “What we do is we developed a framework called the 13 layers of SAP security that really look at these security challenges from a traditional technical security standpoint, from a compliance and controls perspective, sometimes you see that referred to as governance, risk, and compliance, or GRC, and really in the past couple of years we are focusing based on what our clients are needing and the trend is on SAP cybersecurity,” Throop explains. “Across those three areas that is really what encompasses that broader SAP security space.”

    Weaver adds when we think about the relationship Microsoft has with SAP, it runs 30 years deep. And, in fact, it often uses itself as customer one.

    “Today, we run a huge environment,” Weaver says. “We have a very large SAP system. If you think about it, every Xbox transaction, every Surface device transaction, all of these transactions go through a Microsoft SAP environment running on Azure. We have a vested interest to make sure it is secure, not only for our customers, but also for ourselves.”

    Securing SAP

    As challenges rise and new technologies emerge like AI (artificial intelligence), and the edge, leaders need to better understand how to secure SAP. They need solid strategies for how to keep the bad actors at bay. So, how then do they do that? Throop and Weaver have some keen ideas.

    “SAP, like IBM, we love our three-letter acronyms. What I am seeing with a lot of our clients is they are inundated with so many new SAP products,” Throop says. “Things like BTP (Business Technology Platform), IAS (Identity Authentication Service), and it goes on and on. And with these new products and technologies, clients aren’t quite sure where to start, and aren’t sure where to put that focus.”

    Throop goes on to explain all of it needs to be secured, but there is an order. “There is an order that we can help put around all of this madness to make sure those highest risk items, those items that we are seeing threat actors show the most interest in, those are the ones we need to look at first, using that risk-based approach.”

    There are copious organizations keeping an eye on the threat and vulnerability space. And as Throop explains, many have a very mature security operation center, but what they often do not have is that same level of visibility of the security event logs across the SAP landscape.

    Weaver also sees values here. “With Azure, with our Microsoft cloud approach, we have a shared responsibility approach, or a shared responsibility model,” he says. “We have all the tools out there to do pretty much anything and everything you need to. That is why we love working with IBM security with our customers because you need a general contractor or a quarterback that can help really look at the entire landscape soup to nuts to be able to assess and look at that so you have the knowledge.”

    At the end of the day, leaders are facing new challenges when it comes time to secure their data. A third-party partner could help in the threat and vulnerability environment and be one way to have a high level of visibility of the security event logs across a large dataset. How will you proceed forward in this era of cyber wars?

    Want to tweet about this article? Use hashtags #IoT #sustainability #AI #5G #cloud #edge #futureofwork #digitaltransformation #green #ecosystem #environmental #circularworld #security #cybersecurity

    5G AI Circular Circular World Cloud Cybersecurity Digital Transformation Edge Featured Future of Work IBM Consulting IoT Microsoft Nathan Weaver Peggy’s Tech Blog Ransomware Ryan Throop SAP Security Sustainability Sustainable Ecosystem Environmental
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email

    Related Posts

    What Can You Trust?

    May 7, 2025

    Build a Safer Jobsite with AI and Cameras

    May 7, 2025

    Women in Construction: PPE

    May 6, 2025

    Success Stories: Customized Sensors for Wildfire Prevention

    May 5, 2025

    The Rise of Prefab

    May 1, 2025

    Manufacturing in an Era of Digital Product Passports

    April 30, 2025
    Add A Comment

    Comments are closed.

    Get Your Copy Today
    2025 ASCE REPORT CARD FOR AMERICA’S INFRASTRUCTURE
    https://youtu.be/HyDCmQg6zPk
    ABOUT US

    Connected World works to expand quality of life and influence a sustainable future through digital transformation, innovation, and create opportunities all around.

    We’re accepting new partnerships and radio guests right now.

    Email Us: info@specialtypub.com

    4611 Hard Scrabble Road
    Suite 109-276
    Columbia, SC  29229

     

    Our Picks
    • What Can You Trust?
    • Build a Safer Jobsite with AI and Cameras
    • Women in Construction: PPE
    Specialty Publishing Media

    Questions? Please contact us at info@connectedworld.com

    Press Room

    Privacy Policy

    Media Kit – Connected World/Peggy Smedley Show

    Media Kit – Constructech

    Facebook Twitter Instagram YouTube LinkedIn
    © 2025 Connected World.

    Type above and press Enter to search. Press Esc to cancel.