{"id":65049,"date":"2020-03-05T11:00:00","date_gmt":"2020-03-05T10:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=65049"},"modified":"2025-02-12T15:38:50","modified_gmt":"2025-02-12T14:38:50","slug":"security-for-business-critical-data","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/sicherheit-fuer-businesskritische-daten\/","title":{"rendered":"Business-Critical SAP Data Need Backup and Recovery"},"content":{"rendered":"<p>SAP applications are used for many different things. One of the most important aspects: SAP systems have to be ideally adapted to a company\u2019s specific requirements to run smoothly. On the one hand, high availability (HA) solutions are leveraged to ensure uninterrupted operation. <\/p>\n\n\n\n<p>On the other hand, SAP applications have to be optimally secured, since errors that can lead to disastrous outcomes are plenty. Backups are indispensable for cybersecurity threats like ransomware attacks. The problem: Many companies confuse HA functionalities like mirroring with backup solutions. <\/p><div id=\"great-2965634722\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>The misbelief that efficient HA solutions that immediately mirror data in a second system (that doesn\u2019t necessarily have to be on location) can replace a data recovery solution is unfortunately very prevalent. When systems fail, the solution can continue to run them on a second system, that much is true. What many people forget, however, is that this only works if the error is hardware related. <\/p>\n\n\n\n<p>In the event of a malware or ransomware attack, the virus is immediately transferred to the second system, corrupting the data and rendering them useless. Encryption Trojans encrypt data systems without users noticing anything until a few weeks later when it\u2019s already too late. For efficient recovery, companies have to be able to access the data of before the Trojans even got into the systems.<\/p>\n\n\n\n<p>For SAP applications, companies therefore have to leverage a comprehensive backup solution. It\u2019s equally important to use an SAP-certified data recovery solution. Only then can customers be sure that SAP will support them, that their business-critical applications run smoothly and securely, and that data can be recovered if necessary. <\/p>\n\n\n\n<p>Ideally, the SAP backup solution is integrated in a company\u2019s data recovery solution, so it becomes easier to manage and train employees for. In general, the backup solution should be certified for a number of platforms, applications and databases to ensure smooth operation in heterogeneous environments. <\/p>\n\n\n\n<p>This guarantees that backup and recovery of virtual and physical environments, databases and applications are consistent and based on the provider\u2019s guidelines. Additionally, the solution should support cloud use. <\/p>\n\n\n\n<p>Companies need to involve the data backup solution in their business continuity strategy based on recovery point objectives and recovery time objectives. This is essential to a comprehensive data recovery scenario. SLAs (service level agreements) have to be defined and documented in a disaster recovery plan. Furthermore, it needs to be technically feasible for the backup solution to comply with legal regulations like the EU GDPR. <\/p>\n\n\n\n<p>Considering recent security mishaps and the danger of security gaps, it\u2019s important to check that the software doesn\u2019t have any backdoors that could cause problems. German or European solutions are recommendable.<\/p>\n\n\n\n<p> Requirements are manifold and the list of dangers is long, ranging from blackouts and natural disasters to accidental and purposeful manipulation, like sabotage, ransomware or hackings. Backup is often the last resort, saving data and business-critical SAP systems.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/e3mag.com\/partners\/sep-ag\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"112\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SEP.jpg\" alt=\"https:\/\/e3mag.com\/partners\/sep-ag\/\" class=\"wp-image-15592\" title=\"Security for business critical data\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SEP.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SEP-768x86.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SEP-100x11.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SEP-480x54.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SEP-640x72.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SEP-720x81.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-SEP-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>SAP applications store business-critical data and are therefore often the heart of a company\u2019s system landscape. Two often neglected yet highly important topics in IT security are backup and recovery.<\/p>","protected":false},"author":2014,"featured_media":15608,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[7,21,37274],"tags":[8618,3862,619],"coauthors":[37336],"class_list":["post-65049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-it-security","category-mag-2002","tag-high-availability","tag-ransomware","tag-support","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>SAP-Anwendungen beinhalten businesskritische Daten und stellen h\u00e4ufig das Herz des Unternehmens dar. Backup und Recovery werden dabei beim Thema IT-Security v\u00f6llig zu Unrecht oft vernachl\u00e4ssigt.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-2002\/\" rel=\"category tag\">MAG 20-02<\/a>","author_info_v2":{"name":"Andreas Mayer, SEP","url":"https:\/\/e3mag.com\/en\/author\/andreas-mayer\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/65049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2014"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=65049"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/65049\/revisions"}],"predecessor-version":[{"id":149062,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/65049\/revisions\/149062"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/15608"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=65049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=65049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=65049"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=65049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}