Friday, December 12, 2014
Encrypt, Mask, Purge: A 3-Step Approach To SAP Security
Last year, PC World published an article discussing SAP security. Though SAP has consistently improved its data security, the article highlighted inconsistent security practices used by users of SAP products. For example, one expert cited in the article estimated that 5 to 10 percent of SAP users expose critical services to the Internet that ought not to be publicly accessible. These services are vulnerable to hacking. Another expert felt that those numbers were low and that many of the systems were still vulnerable to well-known exploits.