Headquartered in Waldorf, Germany, SAP is the world's largest inter-enterprise software company, and the world's third-largest independent software supplier overall. SAP employs over 28,909 people in more than 50 countries. Their professionals are dedicated to providing high-level customer support and services. SAP integrates with Thales Luna HSM to provide users with a powerful database and file encryption solution.
Thales supports external, multi-cloud key lifecycle management for SAP applications via its integration with the SAP Data Custodian. Using CipherTrust Cloud Key Manager, organizations can seamlessly manage the key life cycle of the encryption securing their SAP applications – all from the same single pane of glass they use to protect their other cloud encryption deployments. By adding CipherTrust Cloud Key Manager to their SAP deployment, highly-regulated customers can externally root and manage their encryption keys, or generate their own keys for use in their SAP applications.
Whether organizations take advantage of SAP’s native encryption functionality or bring their own keys to the SAP encryption conversation, CipherTrust Cloud Key Manager simplifies key lifecycle administration and reduces the effort of demonstrating data sovereignty and regulatory compliance.
|CipherTrust Cloud Key Manager for SAP Applications - Solution Brief|
Thales and SAP have partnered to provide an integrated data protection solution for SAP applications. Thales CipherTrust Tokenization now secures SAP application data via the SAP Data Custodian. Via the SAP Data Custodian, SAP customers can choose to tokenize specific fields and assign access policies that determine which users have access to sensitive data. Specific functions such as HR, Finance, and Legal may all have access to the same application, but have permissions to see different application fields. Any field that isn’t authorized will show token values in place of real data.
|CipherTrust Tokenization for SAP Applications - Solution Brief|
SAP HANA is an in-memory, column-oriented, relational database management system developed by SAP. Deployable on premises or in the cloud, SAP HANA lets organizations accelerate business processes, deliver more business intelligence, and simplify their IT environment. By providing the foundation for all data needs, SAP HANA removes the burden of maintaining separate legacy systems and siloed data, so organizations can run live and make better business decisions in the new digital economy.
SAP HANA works with Thales CipherTrust Transparent Encryption to create and enforce policies to protect data and log volumes, and prevent unauthorized system administrator, root user, and privileged users from accessing data. CipherTrust Transparent Encryption also encrypts data and log volumes in a cloud service provider infrastructure – allowing the customer to be the custodian of the encryption keys. CipherTrust Transparent Encryption can be quickly deployed to secure data – requiring no change to SAP, the underlying database, or hardware infrastructure. The approach enables enterprises to meet data governance requirements with rigorous separation of duties.
Thales provides a proven approach to securing SAP data that meets rigorous security, data governance, and compliance requirements. Whether securing an existing SAP deployment or upgrading to a new version, Thales delivers a proven approach to quickly secure SAP data while ensuring continued operation at optimal performance. Thales is a SAP Silver Partner, and CipherTrust Transparent Encryption has been qualified to work in SAP HANA solution environments.
|Centralized key management||CipherTrust Manager is a centralized key manager for CipherTrust Transparent Encryption as well as other encryption systems in enterprise|
|Separation of duties||Well defined, strong separation of duties between data administrators and security administrators|
|Audit Logs||Logs events that help with compliance and audits|
|Security Intelligence||Logs easily integrated with SIEMs to provide security intelligence and reduce APT attack surfaces|
|Structured and unstructured data||Use for SAP HANA, other databases, log and config files and all other kinds of files|
|Privileged User control||Control privileged user access and reduce APT risk surface|
|Performance and scalability||Proven in the field, high-performance and scalability|
|Security Standards||FIPS 140-2 Level 3 compliance; Common Criteria certification pending|
|Database coverage||All databases, big data systems and unstructured file types|
|Cloud ready||Runs across physical, virtual and cloud environments; Multi-tenant capabilities of DSM|
|Achieving Security and Compliance for SAP HANA - Solution Brief|
|Achieving Security and Compliance for SAP HANA in the Cloud - Solution Brief|
|Thales CipherTrust Transparent Encryption and SAP HANA secure database files in Microsoft Azure - Solution Brief|
|Make SAP HANA Secure and Compliant on Google Cloud with Thales CTE - Solution Brief|
|Protecting sensitive data in and around SAP HANA - Whitepaper|
|CipherTrust Transparent Encryption for the SAP HANA® data management suite on Microsoft Azure - White Paper|