Security and sovereignty options

Meet your security and compliance aspirations while maintaining adherence to regulatory and legal requirements. Transform your IT landscape and secure your investment through tailored deployment, security, and delivery options.
man looking at data center in anvil

Advanced protections tailored to your needs

We help you manage a modern and compliant IT landscape by enabling you to make decisions about data and application management in hybrid cloud landscapes.

placeholder

Security and sovereignty options

We also offer options to increase sovereignty, data residency, and provide more localized operations.

placeholder

Customer managed encryption keys and local data residency

  • Enhanced encryption-key control to help you create and control an initial application-level data isolation layer.
  • Additional business case driven data center regions to help customers in certain regions meet data center requirements.

 

With an increased regulatory and data protection driven environment in Europe, data residency and processing within legal guidelines require a specific set of organizational and technical measures which we address via our EU access option.

Organizational and technical measures in our EU access option comply with European data residency and processing laws in an increasingly regulatory and protective environment.

Sovereign cloud capabilities

SAP sovereign cloud capabilities are our security hardened SAP Cloud solutions, aligned with industry standards (NIST 800-53) for regulated industries and governments.

SAP has been delivering scalable and consistent sovereign cloud services for over 15 years and has experience in helping customers meet strict national regulations regarding data access, data residency, local and credentialed personnel, and secured facilities.

We manage sovereignty holistically and provide an answer to local regulatory demand and operate with additional local entities where it is required.

Sovereign cloud capabilities are offered in the following regions:

  • United States (USA) services via NS2

  • Australia & New Zealand, Canada and United Kingdom (UK) sovereign cloud

  • German public sector & private regulated industries: VS-NfD certified German data centers, operated by SAP (planned)

  • German public sector services via Delos

placeholder

Understand the levels of sovereignty

Based on your specific business case, regulatory or location requirement, the core aspects of sovereignty will help you select the right option.

placeholder
  • Data sovereignty
    Keep data securely within your country's borders and subject to that country's regulations.
  • Operational sovereignty
    Ensure that your sovereign cloud operations (including the staff and facilities involved) must follow the regulations of the country in which they are used and be free from noncompliant influences.
  • Technical sovereignty
    Gain the control, transparency, and flexibility of your organization's technologies so you can manage your cloud workloads as you see fit or as required.

See how customers and partners are succeeding with SAP

Toll Group bolsters its cyber resilience with sovereign cloud capabilities from SAP

As a very cyber-centric organization, we wanted to modernize and fortify our network and SAP’s sovereign cloud capabilities were a clear choice for us.

Perry Singh, President of Government and Defense, Toll Group

Secure your business with support from an innovative and reliable partner

Our long-standing partnership with SAP has helped many companies, including those in highly-regulated industries like Toll Group securely modernize their cloud environments. IBM Consulting looks forward to bringing our expertise to help more ANZ clients benefit from SAP’s sovereign cloud capabilities in Australia.

Amanda Williamson, IBM Australia’s Business

 

Additional security, compliance and risk related solutions from SAP:

placeholder

SAP Cloud Identity Access Governance

Govern access authorizations through the cloud and allow companies to enforce segregation of duties while minimizing mistakes, misuse, and financial loss.

placeholder

SAP Cloud Identity Services

Enable cloud-based user authentication and provisioning, which are core requirements for integration and extension scenarios of an intelligent enterprise.

placeholder

SAP Secure Login Service for SAP GUI

Enhance the user experience and strengthen security with a lean cloud service, providing risk-based and multi-factor authentication for SAP GUI applications.

placeholder

SAP Identity Management

Embed identity management into business processes and centralized user access management in diverse business environments.

placeholder

SAP Enterprise Threat Detection

Identify, analyze, and neutralize cyberattacks in SAP applications as they happen and before serious damage occurs.

placeholder

SAP Focused Run

Monitor security configurations across your ERP landscape through a centralized, policy-based system. 

placeholder

SAP Early Watch Alert

Analyze the essential administrative areas of SAP systems through a free, automated cloud service. 

placeholder

SAP Code Vulnerability Analyzer

Identify and fix security vulnerabilities in ABAP programming language, avoiding potential exploits and cyberattacks.

placeholder

SAP Customer Data Platform

Help ensure customer data is accurate and credible with a solution built on an enterprise identity and data privacy foundation.

placeholder

SAP Data Privacy Integration

Support data privacy compliance through the processing of personal data with purpose management, retrieval of personal data, and data deletion records.

placeholder

UI data protection

Refine access to sensitive data, improve protection against misuse, and support key requirements of data protection and privacy through an ERP add-on.

placeholder

SAP Risk Management

Support responsible, risk-aware decisions and monitor the effectiveness of cybersecurity measures and controls.

placeholder

SAP Process Control

Run more confident, simplified internal cybersecurity programs by automating processes and compliance management. 

placeholder

SAP Audit Management

Improve audit quality and deliver insights by aligning your businesses with critical cyberrisks and controls. 

placeholder

Security dashboard

Combine feeds from security solutions and allow executives to prioritize mitigations, leveraging risk scoring and quantification through a single dashboard.

SAP software deployment strategies

You can choose from three different types of cloud deployment: public, private, and hybrid. Many companies choose more than one approach and set up a multi-cloud environment.

Public cloud

In public cloud deployment, customers receive services over a network available for usage by the provider’s clients. Public clouds are typically efficient and affordable. They are also often multi-tenant – meaning the provider runs your service in a shared environment.

Private cloud

In private cloud, providers maintain services on a private network protected by a firewall. You can build a private cloud within your own data center or subscribe to one hosted by a vendor.

Hybrid cloud

Hybrid cloud deployment is a combination of public cloud, private cloud, and on-premises infrastructure. Hybrid clouds let you keep sensitive information in a traditional data center or a private cloud while taking advantage of public cloud resources.