Currently Being Moderated

Featured Content in Security

Replay of Broadcast: Data Security in the Age of Credit Card Breaches

Listen to the replay of the recent broadcast “Data Security in the Age of Credit Card Breaches, Part 3: Authentication” with Gerlinde Zibulski, Head of SAP Product Management Security, and other security experts. Listen now. June 5, 2015

 

http://scn.sap.com/people/michael.shea/avatar/46.png?a=57546

Attack Detection Patterns of SAP Enterprise Threat Detection

Attack detection patterns are what powers the ability of SAP Enterprise Threat Detection to alert you to suspicious activity in your network. Read Michael Shea’s blog for an overview of the kind of patterns we deliver with our product. May 7, 2015

 

Join the SAP Enterprise Threat Detection Customer Engagement Initiative

Join our Customer Engagement Initiative for SAP Enterprise Threat Detection that helps you to detect cyberattacks against SAP systems and non-SAP systems in real-time. You will be able to influence product development and get early insight into upcoming innovations. Find out more and contact Carmen Graf to register. April 16, 2015

 

Join the SAP Cloud Identity Service Customer Engagement Initiative

Join our Customer Engagement Initiative (CEI) 2015 for SAP Cloud Identity service and influence our product development in collaboration with your peers! For more details go to the CEI “Enhance Functionality for SAP Cloud Identity Service” and contact Donka Dimitrova to register. March 13, 2015

Delete Document

Are you sure you want to delete this document?

Actions