Blog

AWS Security Solutions for SAP S/4HANA (V): Application Protection

Protecting cloud environments is not possible without ensuring application security. This is precisely the topic for this post, which is the last part of a series of technical blogposts that our expert Mario de Felipe has been preparing to help companies move their workloads to the cloud safely.

Read More

AWS Security Solutions for SAP S/4HANA (IV): Data Protection

Protecting data and workloads is a top priority for all companies that migrate their systems to the cloud, and this topic is addressed by our expert Mario de Felipe in the fourth post of the series of 5 posts that we are dedicating to security in AWS.

Read More

AWS Security Solutions for SAP S/4HANA (III): Infrastructure Protection

This week our post is dedicated to understanding the most important AWS Services for SAP workloads. This is the third article of the five in the series written by our specialist Mario de Felipe so that companies can address their migrations to the AWS cloud with the necessary security guarantees. 

Read More

AWS Security Solutions for SAP S/4HANA (II): Detective Controls and Incident Response

What can we do before a security incident happens? What can we do after a security incident has happened? Our expert Mario de Felipe addresses this topic in the second post of the five in the series that we are dedicating to the options that AWS offers to guarantee the security of SAP workloads.

Read More

How to securely deploy SAP S/4HANA on AWS

Did you know that a cyber attack can cause more damage than a natural disaster? Faced with the escalation of attacks against security, we have addressed in a webinar the keys to implement SAP S/4HANA securely on Amazon Web Services (AWS) for all those companies that are driving their digital transformation processes and have chosen to take their SAP systems to the public cloud platform. 

Read More

How to secure your SAP data on AWS

Cybersecurity has become a business concern at the highest level, following a year in which the risk of cyber-attacks has grown, increasing in both number and severity. As workloads and applications move to the cloud, securing this environment is key. If you are concerned about how to secure your SAP data, here are some of the keys to doing so. 

Read More

Stay tunned for more content like this.

Nueva llamada a la acción
Nueva llamada a la acción
New Call-to-action
Download Key Steps to Adopt DevOps on a Cloud-Native Company in PDF
Download The Linke AWS Connector for SAP in PDF