Cloud Security , Security Operations , Video

Protecting Unsecured SAP Deployments

Fortinet's Dan Schrader and Aidan Walden on Unique Aspects of Securing SAP
Dan Schrader, director of product marketing, cloud, SAP and application acceleration, Fortinet; Aidan Walden, global director of public cloud architecture and engineering, Fortinet

How are threat actors taking advantage of unsecured SAP deployments, and what are some of the truly unique aspects of securing SAP? Fortinet's Dan Schrader and Aidan Walden share insights and recommendations for improved defenses.

In an interview with Information Security Media Group, the two Fortinet executives discuss:

  • The need for securing SAP migrations;
  • How adversaries are taking advantage of unsecured deployments;
  • How Fortinet helps clients secure SAP.

Schrader has a long history of working at the intersection of information security, networking and cloud computing. He is currently the director of product marketing for public cloud at Fortinet. Prior to this role, he worked at F5 Networks, where he was responsible for DevOps and automation product marketing. Earlier in his career, Schrader held product management and product marketing roles at Symantec, Nortel and Trend Micro.

Walden has served as the global director of public cloud architecture and engineering at Fortinet for the past six years. Prior to Fortinet, he served in various engineering and leadership roles at a Tier 1 mobility and global ISP. Throughout his 18-year career, he has navigated the evolving security landscape across cloud, mobility, IoT, and service provider infrastructure.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.