{"id":266667,"date":"2026-01-28T13:13:28","date_gmt":"2026-01-28T13:13:28","guid":{"rendered":"https:\/\/sapbasis.dk\/services\/sap-security\/"},"modified":"2026-01-28T13:13:29","modified_gmt":"2026-01-28T13:13:29","slug":"sap-security","status":"publish","type":"page","link":"https:\/\/sapbasis.dk\/en\/services\/sap-security\/","title":{"rendered":"SAP Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#001B34&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#ffffff 0%|rgba(0,0,0,0) 17%|#001b34 100%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/sapbasis.dk\/wp-content\/uploads\/2021\/09\/sap-raadgivning-banner.jpg&#8221; background_position=&#8221;bottom_center&#8221; custom_padding=&#8221;||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;30vh||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"preheader\">SAP Security<\/h2>\n<p class=\"title-hero\">Security for your data and processes in SAP<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][dsm_button button_one_text=&#8221;Contact us&#8221; button_one_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIxMzAyNCIsImVuYWJsZV9odG1sIjoib2ZmIn19@&#8221; button_one_url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_one_url&#8221; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; position_origin_a_tablet=&#8221;bottom_right&#8221; position_origin_a_phone=&#8221;bottom_right&#8221; position_origin_a_last_edited=&#8221;on|desktop&#8221; position_origin_f_tablet=&#8221;&#8221; position_origin_f_phone=&#8221;&#8221; position_origin_f_last_edited=&#8221;on|desktop&#8221; position_origin_r_tablet=&#8221;&#8221; position_origin_r_phone=&#8221;&#8221; position_origin_r_last_edited=&#8221;on|desktop&#8221; background_layout=&#8221;dark&#8221; positioning_tablet=&#8221;absolute&#8221; positioning_phone=&#8221;none&#8221; positioning_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/dsm_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_class=&#8221;intro&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"title-big\">Your SAP landscape is often vital to your business processes and contains critical data.  <\/h2>\n<p>Processes that must not stand still and data that must not be seen by prying eyes or lost. There are more and more serious attacks on companies that find their way into their SAP systems. It often costs a lot of resources, time and money to get back to a more or less normal situation, as well as loss of prestige and possible litigation.  <\/p>\n<p>SAP systems are often connected to many other systems inside and outside the company. And data flows to and from SAP around the clock. Inaccessibility of your SAP system can be a big problem in itself, but if data is compromised and leaked or perhaps encrypted and taken hostage, it&#8217;s not just a matter of removing a vulnerability and bringing the systems back so that processes can continue. Then a real restoration of all or part of the IT landscape may be on the table.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; module_class=&#8221;c2a-simple&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;shadow-hover border-radius&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; background_color=&#8221;#ffffff&#8221; custom_padding=&#8221;||34px||false|false&#8221; custom_padding_phone=&#8221;40px|20px|40px|20px|false|false&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIxODE4MSIsImVuYWJsZV9odG1sIjoib2ZmIn19@&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/sapbasis.dk\/wp-content\/uploads\/2021\/09\/sap-stratetisk-raagivning.jpg&#8221; title_text=&#8221;sap-strategic-raising&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;20px|34px|20px|34px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"title-big\" style=\"font-size: 26px !important;\">SAP Security as a Service<\/h3>\n<p style=\"margin-top: -15px;\">Reduce SAP security costs and system risks<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/sapbasis.dk\/wp-content\/uploads\/2021\/01\/arrow-blue.png&#8221; title_text=&#8221;arrow-blue&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;shadow-hover border-radius&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; background_color=&#8221;#ffffff&#8221; custom_padding=&#8221;||34px||false|false&#8221; custom_padding_phone=&#8221;40px|20px|40px|20px|false|false&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIxODIyNyIsImVuYWJsZV9odG1sIjoib2ZmIn19@&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/sapbasis.dk\/wp-content\/uploads\/2021\/09\/sapbasis-projektledelse-eksekvering.jpg&#8221; title_text=&#8221;sapbasis-project-management-execution&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;20px|34px|20px|34px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 class=\"title-big\" style=\"font-size: 26px !important;\">SAP Security Assessment<\/h3>\n<p style=\"margin-top: -15px;\">Eliminate security risks before they become critical\n<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/sapbasis.dk\/wp-content\/uploads\/2021\/01\/arrow-blue.png&#8221; title_text=&#8221;arrow-blue&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#001B34&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"title-big\">How it works<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][dsm_content_timeline dsm_timeline_style=&#8221;left&#8221; dsm_responsive_style=&#8221;left&#8221; dsm_tree_animation=&#8221;on&#8221; dsm_fill_animation_speed=&#8221;300&#8243; dsm_bg_color=&#8221;RGBA(255,255,255,0)&#8221; dsm_pointer_bg_color=&#8221;#004787&#8243; dsm_pointer_active_bg_color=&#8221;#25ABF9&#8243; dsm_pointer_icon_color=&#8221;#002F59&#8243; dsm_pointer_active_icon_color=&#8221;#FFFFFF&#8221; dsm_tree_bg_color=&#8221;#002F59&#8243; dsm_tree_active_bg_color=&#8221;#25ABF9&#8243; dsm_tree_width=&#8221;2px&#8221; dsm_icon_color=&#8221;#FF6B00&#8243; dsm_image_width=&#8221;46px&#8221; dsm_opposite_content_width=&#8221;1%&#8221; dsm_card_margin=&#8221;||0px||false|false&#8221; dsm_card_padding=&#8221;0px|0px|0px|0px|false|false&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;22px&#8221; content_text_color=&#8221;#FFFFFF&#8221; content_font_size=&#8221;16px&#8221; content_line_height=&#8221;1.8em&#8221; image_icon_custom_margin=&#8221;7px|20px|||false|false&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; header_font_size_tablet=&#8221;26px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; border_color_all_pointer_border=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][dsm_content_timeline_child dsm_use_icon_image=&#8221;off&#8221; dsm_title=&#8221;Making it hard for hackers&#8221; dsm_content=&#8221;Close known vulnerabilities and don&apos;t give access to more than necessary.<\/p>\n<ul class=%22list-arrows%22>\n<li>Are your systems updated with security notes that close known SAP holes?<\/li>\n<li>Do you encrypt your data, both when it is stored and when it is sent around the network?<\/li>\n<li>Users, roles and authorizations must be maintained and adjusted, %22least possible privilege%22.<\/li>\n<li>Do you isolate your systems and use both firewalls and whitelists?<\/li>\n<li>There only needs to be one vulnerability that can provide enough access &#8211; they&apos;ll find it.<\/li>\n<li>A backup is worthless if the hacker can delete it or encrypt it.<\/li>\n<\/ul>\n<p>&#8221; dsm_use_pointer_element=&#8221;on&#8221; dsm_point_font_icon=&#8221;&#x33;||divi||400&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; opposite_text_font=&#8221;|700||on|||||&#8221; opposite_text_text_color=&#8221;#BE9E57&#8243; opposite_text_font_size=&#8221;13px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; parent_header_level=&#8221;h4&#8243;][\/dsm_content_timeline_child][dsm_content_timeline_child dsm_use_icon_image=&#8221;off&#8221; dsm_title=&#8221;Understanding and overview&#8221; dsm_content=&#8221;<\/p>\n<p>Do you have all the necessary files and data to restore the systems and do you know what the consequences are if a system is unavailable?<\/p>\n<ul class=%22list-arrows%22>\n<li>Do you know your integrations and how data flows inside and outside your IT landscape?<\/li>\n<li>Clean up data, including users. Both inside the systems, but also what may have been sent to other systems. <\/li>\n<li>Do you know your backup strategy, your RPO and RTO and your recovery priorities?<\/li>\n<li>The technical dependencies around your processes and how a temporary solution can be used if a system is unavailable.<\/li>\n<li>Custom code is not exempt from vulnerabilities, old unused code is an overlooked risk.<\/li>\n<\/ul>\n<p>&#8221; dsm_use_pointer_element=&#8221;on&#8221; dsm_point_font_icon=&#8221;&#x33;||divi||400&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; opposite_text_font=&#8221;|700||on|||||&#8221; opposite_text_text_color=&#8221;#FF5C00&#8243; opposite_text_font_size=&#8221;13px&#8221; global_colors_info=&#8221;{}&#8221; parent_header_level=&#8221;h4&#8243;][\/dsm_content_timeline_child][dsm_content_timeline_child dsm_use_icon_image=&#8221;off&#8221; dsm_title=&#8221;Security is an ongoing process&#8221; dsm_content=&#8221;<\/p>\n<p>It should be natural and possible to follow your security policies<\/p>\n<ul class=%22list-arrows%22>\n<li>Clear guidelines and best practices<\/li>\n<li>Audit and control can&apos;t close a vulnerability<\/li>\n<li>Every new integration or technology deployed is potentially a new attack vector and introduces new vulnerabilities.<\/li>\n<li>Do you have old technologies that are no longer used? Are your firewalls and whitelists up to date with what is actually used? <\/li>\n<\/ul>\n<p>&#8221; dsm_use_pointer_element=&#8221;on&#8221; dsm_point_font_icon=&#8221;&#x33;||divi||400&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; opposite_text_font=&#8221;|700||on|||||&#8221; opposite_text_text_color=&#8221;#FF5C00&#8243; opposite_text_font_size=&#8221;13px&#8221; global_colors_info=&#8221;{}&#8221; parent_header_level=&#8221;h4&#8243;][\/dsm_content_timeline_child][\/dsm_content_timeline][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; module_class=&#8221;mobile-split split-mobile&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Want us to help you with security?&#8221; image=&#8221;https:\/\/sapbasis.dk\/wp-content\/uploads\/2021\/09\/2021-kenneth-lylloff.jpg&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||50px||false|false&#8221; sticky_position=&#8221;top&#8221; sticky_limit_bottom=&#8221;row&#8221; sticky_position_tablet=&#8221;top&#8221; sticky_position_phone=&#8221;none&#8221; sticky_position_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>SAPBASIS is your partner throughout the journey, whether you need sparring, executive consultants or close collaboration with your team, we adapt our support to your needs.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP Security Security for your data and processes in SAP<div class=\"et_pb_module dsm_button dsm_button_0 et_pb_bg_layout_dark\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"et_pb_button_module_wrappers dsm_button_0_wrapper  et_pb_module\">\n\t\t\t\t<a class=\"et_pb_button et_pb_button_one et_pb_bg_layout_dark dsm-none \"  target=\"_blank\" data-dsm-lightbox-id=\"dsm_button_one_lightbox dsm_button_0\"><span>Contact us<\/span><\/a>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>Your SAP landscape is often vital to your business processes and contains critical data. Processes that must not stand still and data that must not be seen by prying eyes or lost. There are more and more serious attacks on companies that find their way into their SAP systems. It often costs a lot of resources, time and money to get back to a more or less normal situation, as well as loss of prestige and possible litigation. SAP systems are often connected to many other systems inside and outside the company. And data flows to and from SAP around the clock. Inaccessibility of your SAP system can be a big problem in itself, but if data is compromised and leaked or perhaps encrypted and taken hostage, it&#8217;s not just a matter of removing a vulnerability and bringing the systems back so that processes can continue. Then a real restoration of all or part of the IT landscape may be on the table.SAP Security as a Service [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":216599,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-266667","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SAP Security - SAP Basis<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sapbasis.dk\/en\/services\/sap-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security - SAP Basis\" \/>\n<meta property=\"og:description\" content=\"SAP Security Security for your data and processes in SAPYour SAP landscape is often vital to your business processes and contains critical data. Processes that must not stand still and data that must not be seen by prying eyes or lost. There are more and more serious attacks on companies that find their way into their SAP systems. It often costs a lot of resources, time and money to get back to a more or less normal situation, as well as loss of prestige and possible litigation. SAP systems are often connected to many other systems inside and outside the company. And data flows to and from SAP around the clock. Inaccessibility of your SAP system can be a big problem in itself, but if data is compromised and leaked or perhaps encrypted and taken hostage, it&#039;s not just a matter of removing a vulnerability and bringing the systems back so that processes can continue. Then a real restoration of all or part of the IT landscape may be on the table.SAP Security as a Service [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sapbasis.dk\/en\/services\/sap-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SAP Basis\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-28T13:13:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sapbasis.dk\/en\/services\/sap-security\/\",\"url\":\"https:\/\/sapbasis.dk\/en\/services\/sap-security\/\",\"name\":\"SAP Security - SAP Basis\",\"isPartOf\":{\"@id\":\"https:\/\/sapbasis.dk\/#website\"},\"datePublished\":\"2026-01-28T13:13:28+00:00\",\"dateModified\":\"2026-01-28T13:13:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sapbasis.dk\/en\/services\/sap-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sapbasis.dk\/en\/services\/sap-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sapbasis.dk\/en\/services\/sap-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hjem\",\"item\":\"https:\/\/sapbasis.dk\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/sapbasis.dk\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SAP Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sapbasis.dk\/#website\",\"url\":\"https:\/\/sapbasis.dk\/\",\"name\":\"SAP Basis\",\"description\":\"Danmarks ledende og eneste fokuserede SAP Basis virksomhed\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sapbasis.dk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAP Security - SAP Basis","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sapbasis.dk\/en\/services\/sap-security\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security - SAP Basis","og_description":"SAP Security Security for your data and processes in SAPYour SAP landscape is often vital to your business processes and contains critical data. Processes that must not stand still and data that must not be seen by prying eyes or lost. There are more and more serious attacks on companies that find their way into their SAP systems. It often costs a lot of resources, time and money to get back to a more or less normal situation, as well as loss of prestige and possible litigation. SAP systems are often connected to many other systems inside and outside the company. And data flows to and from SAP around the clock. Inaccessibility of your SAP system can be a big problem in itself, but if data is compromised and leaked or perhaps encrypted and taken hostage, it's not just a matter of removing a vulnerability and bringing the systems back so that processes can continue. Then a real restoration of all or part of the IT landscape may be on the table.SAP Security as a Service [&hellip;]","og_url":"https:\/\/sapbasis.dk\/en\/services\/sap-security\/","og_site_name":"SAP Basis","article_modified_time":"2026-01-28T13:13:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sapbasis.dk\/en\/services\/sap-security\/","url":"https:\/\/sapbasis.dk\/en\/services\/sap-security\/","name":"SAP Security - SAP Basis","isPartOf":{"@id":"https:\/\/sapbasis.dk\/#website"},"datePublished":"2026-01-28T13:13:28+00:00","dateModified":"2026-01-28T13:13:29+00:00","breadcrumb":{"@id":"https:\/\/sapbasis.dk\/en\/services\/sap-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sapbasis.dk\/en\/services\/sap-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sapbasis.dk\/en\/services\/sap-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hjem","item":"https:\/\/sapbasis.dk\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/sapbasis.dk\/services\/"},{"@type":"ListItem","position":3,"name":"SAP Security"}]},{"@type":"WebSite","@id":"https:\/\/sapbasis.dk\/#website","url":"https:\/\/sapbasis.dk\/","name":"SAP Basis","description":"Danmarks ledende og eneste fokuserede SAP Basis virksomhed","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sapbasis.dk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/sapbasis.dk\/en\/wp-json\/wp\/v2\/pages\/266667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sapbasis.dk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapbasis.dk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapbasis.dk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapbasis.dk\/en\/wp-json\/wp\/v2\/comments?post=266667"}],"version-history":[{"count":2,"href":"https:\/\/sapbasis.dk\/en\/wp-json\/wp\/v2\/pages\/266667\/revisions"}],"predecessor-version":[{"id":266669,"href":"https:\/\/sapbasis.dk\/en\/wp-json\/wp\/v2\/pages\/266667\/revisions\/266669"}],"up":[{"embeddable":true,"href":"https:\/\/sapbasis.dk\/en\/wp-json\/wp\/v2\/pages\/216599"}],"wp:attachment":[{"href":"https:\/\/sapbasis.dk\/en\/wp-json\/wp\/v2\/media?parent=266667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}