Protect Your SAP Landscapes (Episode 3 of 5)
SAP invests a lot in providing secure products and solutions. However, all this is in vain if SAP software systems are not also managed, configured, and operated in a secure manner.
SAP Digital Business Services therefore assists our customers in optimizing security with tools, applications, information, and best practices, as well as knowledgeable SAP experts.
Ever wonder what kinds of support are available to help you efficiently build and run secure SAP systems and landscapes? In this session, we will provide an overview of our security offerings, with helpful information and links to get you started!
Have you wondered how you can run your projects most productively? Or asked yourself how other companies have dealt with similar challenges in the past, and where appropriate best practices can be found? We will show how the SAP Global Delivery group of SAP Consulting assists our customers in planning, setting up, and operating secure business applications, and how our consultants support on-premise implementations of SAP’s security
Fritz Bauspiess, Global Content Owner Support, Security Services, SAP SE
Fritz Bauspiess is a security expert with 30 years of experience focused on IT security – ranging from research in cryptology to security consulting, security product management, and security support. In his current role at SAP as global content owner for security services, he is responsible for the SAP's support portfolio of security tools, applications, best practices, and services, as well as ensuring the portfolio's global availability to SAP Customers.
Birger Toedtmann, Head of Global GRC and Security Community, SAP SE
At SAP, Birger Toedtmann is known as an expert in application security and enterprise risk management topics. Within the SAP Global Delivery group of SAP Consulting, he is also the lead of the “GRC/security” community, a virtual group of all of SAP’s field experts in the security domain. Before joining SAP eight years ago, he had gained over 10 years of IT security expertise in various positions in both the communications industry and research organizations.