Secure internet access to SAP’s R–3: keeping dragons out

  • Authors:
  • Katherine Jones

  • Affiliations:
  • 2 Alden Street, Newton, MA

  • Venue:
  • International Journal of Network Management
  • Year:
  • 1998

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security of the networking environment is critical for today’s corporations. Issues such as reliably identifying remote-access users, checking authorizations, data-transfer security and database security are of paramount importance. This article discusses a resolution of these problems for the R/3 environment using CYBERSHIELD†. © 1998 John Wiley & Sons, Ltd.