Risk-Based Authentication with SAP Cloud Identity Service
Do you want to flexibly configure authentication to your applications based on your security requirements and corporate needs? Check out Radostina Kasova’s latest blog and learn how to define risk-based authentication rules with SAP Cloud Identity service. February 18, 2016
Ensuring a Secure Internet of Things (IoT)
Read the new SAP Insider article by Stefanie Garcia Laule and learn what crucial security measures are needed for the age of IoT and how SAP HANA Cloud Platform for Internet of Things can provide a standards-based approach to secure authentication between devices and help companies better protect themselves. January 22, 2016
Tool for Code Vulnerability Analysis for ABAP 7.5 Now Available
With SAP NetWeaver AS, add-on for code vulnerability analysis 7.5 scanning of ABAP sources for security weaknesses became even easier. Allowing more systems to be scanned for even more types of defects, the new release can now be deployed centrally. Read Patrick Hildenbrand’s blog to learn more. November 18, 2015