Using SAP NetWeaver Process Integration (PI) to Ensure the Safe Transfer of Data Across Security Domain Boundaries

  • by Eduard Neuwirt, Senior Developer, SAP AG
  • Manfred Reinart, Development Architect, SAP AG
  • March 15, 2008
Your data is one of your most valuable assets, so you protect it by separating it into systems with varying levels of security, depending on the sensitivity of the information. But what if processes running in lower-level security areas need to access data stored in higher-level security areas? This article shows you how to use SAP NetWeaver Process Integration (PI) 7.0 in conjunction with a security gateway to ensure the safe transfer of data between high and low security domains. PI serves as a flexible and transparent integration platform while the security gateway acts as a firewall, enabling data to cross domain boundaries without compromising security.

Eduard Neuwirt

Eduard Neuwirt joined SAP AG in 1999 and became a member of the ABAP Connectivity group, where he worked on the design, tools, and rollout of the ABAP communication infrastructure. Eduard was also responsible for the development of the remote function call (RFC) tools on the external side, including the RFC library and JRFC. Since September 2005, Eduard has worked for the SAP Defense and Public Security Department. He is responsible for the interfaces to external military non-SAP systems.

See more by this author

Manfred Reinart

Manfred Reinart studied computer science as part of his career in the German Armed Forces. He worked as an IT teacher and information management officer at the headquarters of a multinational organization. He was also involved in the development of a Command and Control Information System and worked for a CORBA producer. After he joined SAP in 2003, he participated in the design of a distributed system landscape architecture for the support of armed forces in deployed operations. Since 2004 Manfred has been responsible for the development of interoperability functionalities to non-SAP defense information systems.

See more by this author


Comments

No comments have been submitted on this article. 


Please log in to post a comment.

To learn more about subscription access to premium content, click here.