Feeds

SAP buys secure login tech

ERP plans to bake in basic security

The Essential Guide to IT Transformation

German software giant SAP has moved into the security market with the acquisition of identity and access management technology from Secude.

SAP, which is best known for its Enterprise Resource Planning and enterprise application software, plans to roll secure login and enterprise single sign-on technologies acquired via the acquisition into its portfolio. The Secude deal, announced Wednesday, also involves the move of consulting staff to SAP, a move that will help its sales staff to flog SAP-owned security technology as an alternative to third-party add-ons.

SAP plans to bake the basic version of Secude’s secure login into future releases of its enterprise applications – at no extra cost. The technology will sit alongside SAP's existing NetWeaver identity management technology, as explained in a statement by SAP here.

Switzerland-based Secude, which remains separate from SAP, plans to focus on developing and marketing its remaining data protection products. The financial terms of the deal, announced Wednesday, were not disclosed.

More and more enterprise technology heavyweights are buying into security. SAP's deal to acquit technology assets from Secude can be loosely compared to EMC's decision to acquire RSA Security, the market leader in secure remote access, back in 2006, in a much larger and more significant deal. More recently there's HP's purchase of security tools firm ArcSight for $1.5bn, a move that strengthens its existing security portfolio, and Intel's far more puzzling acquisition of McAfee.

Back in the day, security start-ups used to pine over an acquisition by the likes of Cisco or Symantec. These days a much larger range of potential suitors are available. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.