The leap of the century? S/4HANA security in the cloud

Employees' personal data, contracts, invoices, billing and logistical data and sensitive information on which the future of the company depends. All gathered no one knows where, in the mythical 'cloud', i.e. ... 'on the Internet'. No wonder implementing ERP systems or software based on cloud solutions does not seem like a good idea for many people.

RISE with SAP is a cloud-based ERP system available in the public or private version. The whole system is based on S/4HANA, an innovative technology whose ultimate aim is to replace the now obsolete solutions that will no longer be supported from 2027. However, switching to the cloud entails some security-related concerns among clients.

Should you be afraid of the cloud? Here are 8 reasons why you shouldn’t.

How secure is the SAP Cloud?

 

LET'S TALK ABOUT THE CLOUD

Our cloud solutions support businesses. We can help you too! Say bye to the limits. Hi!Cloud

Sorry, an unknown error has occurred, please try again

Thank you, Your message has been sent

#1 A string or a U-lock?

A few decades ago, you would leave your bicycle in front of a shop without paying much attention to securing it properly. Today, with a notable rise in theft incidents, chains, padlocks or U-locks have become commonplace.

The same holds true of software. Outdated systems have obsolete security features based on a completely different technology than today’s solutions. It is impossible to update them to the point where they match modern ERPs.

Modern software, regardless of whether it is a cloud or on-premise solution, is much better at communicating with all sorts of firewalls, NAC, authorization tools, and security systems. The foundations are also much better and can be developed in any direction you choose.

#2 Small moat

Data centers have one job: to store their clients’ data in a secure manner. Clients are fully aware of their value and, as this is a core aspect of their business, they earmark huge resources for security systems, which smaller organizations often simply cannot afford. Dedicated staff ensure that all processes run smoothly and skills are confirmed by certificates.

#3 Quick switch

For the same reason, significant outlays are also made on infrastructure, because security is also about availability. Clients’ systems need to run continuously. Dedicated equipment maintenance teams are often able to diagnose and resolve failures much faster than an individual company. They know that every minute of downtime costs them tens of thousands of euros and the potential loss of clients.

Expenditure on both security and infrastructure accounts for a half of all data center maintenance costs. [1]

Investing in infrastructure also entails environmental side effects. The more modern the equipment, the smaller the carbon footprint it generates. It is important to remember that switching to S/4HANA also entails energy consumption savings.

#4 Inside the hacker’s head

Psychology plays a huge role in the world of security. Let’s play the role of a hacker for a moment. As any other professionals, cyber criminals hope to make a quick profit with relatively low risk. Although data centers seem appealing from the point of view of the amount of information stored there, the multitude of security features effectively deters most hackers. Small and medium-sized companies that do not have adequate security measures in place and do not expect an attack are three times more likely to fall prey to cyber criminals. When they can get their hands on valuable loot in a matter of moments, hackers have no interest in fighting security software for hours.

It can be compared to a bank robbery. The heist of the century, while spectacular, will attract a huge manhunt, often on an international scale. It seems more sensible to opt for a few smaller thefts that will yield a comparable profit and that everyone will forget about after a few days.

#5 SAP-guaranteed security

SAP is the world’s largest provider of management support systems and there are reasons why its products enjoy so much trust. RISE with SAP and moving to the cloud version of S/4HANA, regardless of the plan chosen, includes the area of security. Embedded mechanisms enable a better response to threats, thanks to, among other things, integration with applications to protect the system, and provide a secure connection to business applications.

Hicron experts emphasize that the focus on security is greater than ever. Changes can be seen primarily in the intensive development of BTP tools in terms of system protection.

Updates anticipate the development of security software and its improvements.

#6 Standardization

Compliance with the European NIS2 directive and adaptability to the Australian Essential 8 strategies confirm that RISE with SAP is of the highest quality. By standardizing the infrastructure and working with major vendors such as Amazon, Google, and Microsoft, we have created an architecture that can be combined with a wide range of security features.

The service itself, based on hyperscalers, provides excellent security and the possibility to carry out a range of tests, such as penetration tests. What is more, the applications come pre-configured, which allows protection to be set up from the first moments of use.

#7 Adopt a zero-trust policy

RISE with SAP is also a good practice in terms of security. In addition to streamlining business processes, the scenarios provide for a zero-trust policy, where every user, both inside and outside the organization, is treated as unknown. The system deals with monitoring threats and system traffic, policy management, hardware configuration and preparing for the worst: backup and disaster recovery.

When implementing a new ERP system, a security audit should be considered in order to close any gaps in protection.

#8 Hindsight is 20/20

A final takeaway: at the core of any security system there is a human being. An untrained, unaware user can be a major threat to an organization, so proper education is one of the most important elements of any security system. Implementing a new solution will enable training key users on how to operate the solution safely, and they will pass on their knowledge to others.

[1] https://www.streamdatacenters.com/glossary/data-center-cost/

 

This site use cookies. By continuing to use this website, you agree to our Privacy Policy.

OK, I agree