Upcoming Webcast: High-Performance Threat Analytics Protecting SAP S/4HANA Applications

Join us on November 10, 16:00 – 17:00 pm CEST, for this live webcast hosted by SAP's Global User Groups Organization. Learn how SAP Enterprise Threat Detection helps organizations worldwide detect threats to their S/4HANA applications and how to analyze and respond to these threats to protect your core business applications.


SAP offers a comprehensive portfolio of security products and services that provide you with the tools you need to protect your data - and your business.

Featured Content

How to Become a Part of SAP TechEd

How about becoming part of this year’s event and submitting a Community Talk proposal? We’d love to hear about your experience with our security products and features. Share best practices, or show us how you are using SAP functionality to make your business more secure.

Learn more

SAP Insider: RISE with SAP and its Impact on Security and Compliance

This article explains the following three topics that you should tackle when embarking on your RISE with SAP journey from a security and compliance perspective: Business transformation (business adoption), technical system transformation, and post-go-live activities.

Read the SAPinsider article

CIO Guide: Identity Lifecycle in Hybrid Landscapes

This updated guide explains how identity and access management software from SAP supports building successful system integrations in cloud and hybrid environments and helps provide a seamless user experience while also helping ensure security and compliance.

Read the SAP CIO guide

How to Establish a Consistent Identity Access Management

The journey to utilize SAP cloud solutions is usually not a big-bang, but a stepwise integration of new SaaS applications into an existing landscape. In the recent SAP Community Call, learn about SAP’s IAM solutions Identity Authentication and Identity Provisioning that support this integration journey.

Watch the replay

Expert Content

Cloud Identity Services

SAP offers cloud-based identity services that provide basic capabilities for user authentication and provisioning, which is a core requirement for all integration and/or extension scenarios of the Intelligent Enterprise. SAP provides these services under the umbrella brand SAP Cloud Identity Services, a group of cloud services for secure authentication, single sign-on, user provisioning, and more.

Learn more

Hybrid Identity and Access Management

When it comes to securing on-premise landscapes, most companies have invested in proven SAP software to ensure the protection of their data and business processes. Today, most companies are running a hybrid model – a combination of cloud and on-premise systems. SAP provides options for bringing cloud-based security solutions together with existing on-premise security solutions.

Learn more

Secure Development Services

SAP offers secure development services that enable developers to design secure business applications for the cloud. By reusing security services, you can develop secure and compliant applications without re-inventing the wheel. Developers need a platform which is ready for enterprise-grade business applications, and SAP Business Technology Platform (SAP BTP) can help you with this challenge.

Learn more

Risk and Compliance

SAP offers cloud-based security services in the area of risk and compliance, comprising topics such as segregation of duties, access certification, and business role management or the compliant collection of consumer data.

Learn more


By moving solutions into the cloud, security insight and control are getting more and more important to companies. Questions arise about such topics as which certifications are necessary and where the current operating status can be seen. Also, where the data is located and what critical data movements have taken place.

Learn more