Five Minute Briefing - SAP
April 28, 2021
Published in conjunction with the Independent SAP Technical User Group (formerly the International Sybase User Group), this monthly publication contains news, market research, insight for the SAP user community, as well as ISUG-TECH news and information.
Esri, a global leader in location intelligence, is advancing it partnership with SAP by announcing the certification and support for SAP's database-as-a-service offering and key component of SAP Business Technology Platform, SAP HANA Cloud. With this capability, Esri and SAP are accelerating customer adoption of cloud-based location intelligence platforms with a high-performance environment that scales to the largest enterprises.
IBM and SAP continue to assist companies through their digital transformations, upping their commitment to clients more than ever during the COVID-19 pandemic. SAP and IBM look to continue to co-create and enhance solutions as businesses operate in this new normal, complementing their collaboration on cloud and RISE with SAP.
Qlik is expanding its relationship with Amazon Web Services (AWS) by launching a collaborative solution that will help enterprises drive more value from SAP data with cloud analytics. Customers can now seamlessly and easily leverage Qlik Data Integration to deliver real-time, analytics-ready data from their SAP systems into AWS, accelerating and enabling cloud data warehousing, data lakes, and machine learning initiatives.
SAP is introducing new service components of the SAP HANA Cloud database that allow customers to handle ever-growing amounts of transactional and analytical data in data-intensive, highly regulated industries. The new services in SAP HANA Cloud are a core component of SAP Business Technology Platform aimed at providing users with a high-performance, cloud-native data management environment that supports increased scalability and flexibility, on-demand provisioning, and consumption-based pricing.
Think About It
Social engineering, or an attempt to manipulate human behavior through specific, orchestrated actions to gain access to restricted information or systems without permission, is reportedly being used by 84% of hackers. The challenge is that humans are hard wired to trust, often willing to accept someone at his or her word, and social engineering attacks are all about taking advantage of that inherent want to trust. Unfortunately, this is not a good mix and often leads to humans becoming the weakest link in the security chain,