Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Data Protection

SECUDE Launches Security Solution for SAP NetWeaver

SECUDE, a maker of security solutions for SAP, announced the general availability of Halocore for SAP NetWeaver, a new offering that provides protection against loss, leak, and theft of sensitive data, beyond the traditional network boundaries.

SECUDE, a maker of security solutions for SAP, announced the general availability of Halocore for SAP NetWeaver, a new offering that provides protection against loss, leak, and theft of sensitive data, beyond the traditional network boundaries.

According to the company, the new solution secures sensitive SAP information by enforcing protection on the data/documents themselves, and is designed to give SAP users bolstered security for sharing documents both inside and outside of the enterprise.

Unlike other most security solutions, which monitor the network or scan storage locations, Halocore for SAP NetWeaver is integrated directly with the application and classifies and secures data as it is delivered to the end-user.

Halocore applies a company’s security policy to any file downloaded from NetWeaver-based applications, so the file can travel securely within and outside of the company’s IT perimeter, helping to ensure that only authorized users can access sensitive data no matter where it is located.

By utilizing Microsoft Active Directory Rights Management Services (AD RMS), the Halocore solution delivers instant and permanent protection, while reducing the productivity impact file security solutions typically have on the workforce, the company said.

Key features of Halocore for SAP NetWeaver include:

• Works for any file type and protects data at the source before it is downloaded from SAP to the end-user’s computer

Advertisement. Scroll to continue reading.

• Provides a simple, user-friendly experience for classifying sensitive information

• Offers fine-tuned control over who can do what with information (view, edit, print, forward, etc.)

• With extended Microsoft Hybrid Azure support, protection persists beyond SAP, including mobile and cloud platforms

“The information age has shifted focus from physical assets to connectivity and information,” says Dr. Heiner Kromer, SECUDE’s founder and CEO, “data now flows in and out of the enterprise walls in enormous volumes and rates. With mobile devices and cloud sharing services becoming prevalent and powerful tools for business use, companies are faced with increased risk of data loss or theft. In many ways, new technologies have made doing business easier however, these same technologies have made securing the business more difficult.”

SECUDE was Founded in 1996 as a partnership between SAP AG and research organization the Fraunhofer Institute in Germany. In early 2011, the company sold its SECUDE Application Security product to SAP in order to focus on Endpoint Security. The company has offices in Europe, North America and Asia.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cybersecurity Funding

CommandK announced that it has raised $3 million in a seed funding round for a solution designed to help organizations secure sensitive data.