Ihre Suche

Ihre Suche

Security Special

IT-Security zur Chefsache machen
Wenn Unternehmen ihre Geschäftsprozesse in Richtung Mobility, Collaboration oder Cloud transformieren, geht das nicht ohne IT-Security.
Zum Security Special

PAC Radar Report

Whitepaper PAC Radar Report
Whitepaper: Führende Anbieter von SAP Consulting & Systemintegration (C&SI) in Deutschland
Zum DokumentDokument in die InfoBox legen.


AH Rittersbacher

Mehr Tempo mit VaudisPro

Die Händlersoftware VaudisPro unterstützt die Verkaufs- und Serviceprozesse in den Niederlassungen der Autohandelsgesellschaft Rittersbacher.
Zur Kundenlösung
AH Prengemann

Mit Xenon alle Finanzen im Blick

Finanz- und Buchhaltungssystem Xenon liefert dem Autohaus Prengemann aktuelle Kennzahlen.
Zur Kundenlösung
AH Schade und Sohn

Mit VaudisPro breiter aufgestellt

Um neben Mercedes- auch VW-Kunden zu betreuen, führt das Autohaus Schade u. Sohn als weiteres Dealer-Management-System VaudisPro ein.
Zur Kundenlösung
HIL GmbH | Beispiel für ein hochsicheres Weitverkehrsnetz

Hochsicheres Weitverkehrsnetz dank Kryptoboxen

Beispiel für ein hochsicheres Weitverkehrsnetz: Die HIL GmbH arbeitet mit kryptologisch abgesicherter Datenübertragung bei allen Material- und Logistikanwendungen.
Zur Kundenlösung
Flughafen Scheremetjewo Moskau

Flughafen Scheremetjewo Moskau

Durch die Integration einer SAP-Rechnungswesenkomponente hat der Flughafen seine Rechnungsstellung automatisiert und die Liquidität verbessert.
Zur Kundenlösung

Landesweites SAP

Seit der Einführung eines zentralen SAP-Systems verfügt das Land Baden-Württemberg über Controllinginstrumente – wie ein privates Unternehmen.
Zur Kundenlösung
Magna International Inc.

Dynamic Sourcing als SAP-Betriebsmodell

Der österreichisch-kanadische Automobilzulieferer Magna hat den Betrieb seiner SAP-Systeme auf Cloud Computing umgestellt.
Zur Kundenlösung

Wählen Sie eine Kategorie, um auf der Übersichtsseite zugehörige Referenzen zu sehen.

Wählen Sie eine Kategorie, um auf der Übersichtsseite zugehörige Referenzen zu sehen.

13. September 2013 Lösungen

„Cloud Partner of the Year“ – T-Systems von Cisco ausgezeichnet

“Cloud Partner of the Year“

T-Systems ist für Cisco als Cloud-Partner erste Wahl.

Meine InfoBox

Die Anzahl der Dokumente in der InfoBox ist beschränkt auf: 20
Mit der InfoBox können Sie Informationen wie Grafiken, Whitepaper und sogar ganze Seiten der T-Systems Website komfortabel an einem zentralen Ort sammeln und später downloaden und versenden. Klicken Sie dafür einfach auf das InfoBox-Symbol, das sie auf vielen unserer Seiten finden können:Sie haben noch keine Dokumente in der InfoBox abgelegt. Ihre InfoBox ist zur Zeit leer.
Gesamtgröße 0 MB
Schließen Ihre E-Mail wurde erfolgreich versandt. Ich möchte diese Dokumente versenden. * Verpflichtende Angaben

(Mehrere Empfänger mit Komma trennen)


By month:

Security – real security remains elusive

AMM Blog / 16. September 2011

Link between information security and AMM

Security needs more awareness! And, this is not only true in terms of the IT industry: 72% of all decision makers, suggested by latest research, indicate that their IT-security program is neglected -somehow. Furthermore, security measures are – most of the time – part of the equation when it is actually too late.

What can be inferred from that?

If a company is going to be successful in a sustainable way not only reactive, but also holistic and/or proactive concepts need to be implemented in order to take full advantage of a company’s potential. This is why security is paramount on the AMM CoE (short for Center of Excellence) agenda. The purpose is to bring data security and data integrity to the next level and make it one of the indispensable core competencies that complement AMM implementation efforts.

What are the main goals of information security?

Any form of information security has to meet the following criteria to provide sustainable safety:

  • Availability: Information has to be available consistently
  • Confidentiality: Prevents the disclosure of information to
    unauthorized individuals or systems
  • Integrity: Information has to be protected from  damage
    and modification

Lesson learned: AMM efforts and security are not at odds, they rather complement each other – but where is the link between AMM and security?

Information security addresses the main goals of Application Management and Modernization (AMM), especially against the backdrop of sprawling application jungles. Application Management increases transparency in complex legacy landscapes – that have grown over the years – and brings about improved delivery capabilities as well as standardization.

Many applications carry out redundant assignments for different departments and/or processes. A case in point would be procurement: Furniture is managed by one application, while as procurement for paper is managed by another application; although the process and activities are identical.

Application Management and Modernization identifies these applications and functionalities to, for example, build new standalone applications.

Lack of transparency and complexity are the most common obstacles to every efficient security program. Transparency and simplified complexity is achieved by implementing, transforming, and modernizing all affected IT-processes according to certain standards (ITIL).
As a result, however, the customer receives an exact overview of his applications and is able to answer the following questions.

  • Does the application work?
  • Where is the application?
  • What is the application doing exactly?
  • Who is managing the application?
  • Are their interdependencies and which data is processed by the application?

With the help of a Security Risk Management Process, the user is able to take actions that are capable of minimizing security risks. Yet, the prime principles, when choosing the battlefield, remain efficiency and error-free implementation.

Above all, it is extremely vital to stick to the security standards in order to increase the possibility of a resilient security system and ROI for all security measures.

Delivery capacities describe T-Systems capability to provide this service worldwide. This means that every employee and every data center is able to perform the necessary standardised process; differences only arise out of the chosen delivery model (on- or offshore). In the case of an incident, like a power shortage in one region, another data center will deliver the service with minimal impact on the daily business. This leads to a high availability of the running application


Several blog entries already addressed the utilization of AMbition® 3.0, T-Systems AMM solution. This standardized tool allows every project participant to react quickly and unitarily in the event of an incident – the required availability is the result. Security measures in every of the three phases (transparency, delivery capacity and standardization) provide a gapless progress. The goal is to continuously ensure the necessary security criteria (availability, confidentiality, integrity).

“Information security is a mix of measures and controls in order to protect information and information systems. Today, information and data are the real assets a company has.”  Dan Vultur (Information Security Expert AMM CoE).  



Disclaimer of Liability: All comments reflect the opinion of individual readers. For correctness and completeness of these contents T-Systems assumes no liability.
Write comment

Mandatory fields *

Please make sure you read the policy before submitting your content.

a) Blog visitors are always invited to comment.

b) Comments are supposed to increase the value of this weblog.

c) Comments will be activated only after validation.

d) Comments which do not relate to the topic, obviously violate copyrights, have offensive content or contain personal attacks will be deleted.

e) Links can be inserted to the comment but should refer to the topic of the blog post. Links to other websites or blogs which do not refer to the posting will be considered as spam and will be deleted.