Learn about the key areas that need to be secured in your SAP systems in order to defend your business against cyberattacks. Topics that this session covers include key areas to secure and their business impacts, implementation approaches to minimize business disruptions, and monitoring and tooling aspects to help with implementation and ongoing monitoring.

Key takeaways:

  • Hear how Schlumberger got security right from the beginning for its SAP implementation.
  • Take home best practices for securing SAP applications during digital transformation, with a special focus on a greenfield implementation.
  • Learn about the benefits of implementing compliance and security scanning to maintain ongoing security.


Holger Piprek, SAP Infrastructure & Security Manager, Schlumberger

Mahesh Ravinutula, SAP Basis/DBA/TCM Lead, Schlumberger

Troy Siewert, SAP Basis Suite Lead, Schlumberger


  • Agenda and Topics Covered-  3:09
  • About Schlumberger, ITE SAP Landscape- 5:30
  • Securing SAP Environment- 8:07
  • Implementation Approach- 13:15
  • High Priority Security Measures- 17:12
  • Infrastructure: Network Security Zones- 22:45
  • Securing Internal Server Communications- 26:34
  • Securing RFC Connectivity and the SAP Gateway- 29:17
  • Securing the SAP Web Dispatcher and the HANA Database- 35:35
  • Profile Consistency and Ongoing Monitoring & Refinements- 37:02
  • Key Takeaways- 42:06
  • Q&A- 44:28

Want to watch this webcast? Become a member and get access to all ASUG benefits including news, resources, webcasts, chapter events, and much more!

Learn more

Already an ASUG member? Log in to watch