How to secure and monitor your SAP systems for cyber threats without third-party software

How to secure and monitor your SAP systems for cyber threats without third-party software

Author: 
Dhillon, Aman
Publisher: 
SAP Press
Date published: 
2014
Record type: 
Journal Title: 
SAP Professional Journal
Source: 
SAP Professional Journal, Volume 16, Update 4, 2014, pp. 50-56
Abstract: 

Secure your SAP systems from cyber attacks using SAP configuration validation.

Language: 

CITATION: Dhillon, Aman. How to secure and monitor your SAP systems for cyber threats without third-party software . : SAP Press , 2014. SAP Professional Journal, Volume 16, Update 4, 2014, pp. 50-56 - Available at: https://library.au.int/how-secure-and-monitor-your-sap-systems-cyber-threats-without-third-party-software