Privacy Policy

Collection of Information

insiderBOOKS collects personally identifying information during registration and subscription processes. In addition, information is collected through certain portions of this website where users specifically and knowingly provide such information along with content submissions, community postings, or suggestions. Personal information includes IP address, geographic location, and contact information.


Use of Information and Data Sharing

WIS and its network of sites, including SAPinsider and insiderBOOKS, may use personally identifying information for the purposes of customer service, subscription fulfillment, obtaining editorial feedback or input, or informing users of other products and services offered by SAPinsider, insiderbOOKS and/or its sponsoring organizations. Customers wishing not to receive any additional information from SAPinsider, insiderBOOKS, and/or its sponsors may elect to opt out.

Attendee contact information for SAPinsider events is shared with SAP. Attendee contact information for SAPinsider custom events is shared with SAP and sponsoring organizations. Contact information for sponsored webinars, Q&As, white papers, books, and other programs is also shared with the sponsoring organization. By registering for an SAPinsider event or sponsored program, you consent to this information sharing.



This site uses cookies to provide users with easy access to restricted material and to help us continually improve the site by monitoring usage patterns. Cookies are pieces of information that websites transfer to a user's hard drive for record-keeping purposes. For example, they allow you to save passwords and preferences. The cookie itself does not contain any personally identifying information, although it may enable insiderBOOKS to relate your use of the site to personally identifying information that you previously submitted, if any.

If you have registered with our website, the information in your cookie is used to provide a more personalized experience on the website. If you have not registered with our website, we may place a cookie on your computer to help provide a more personalized experience. Most browsers are initially set to accept cookies. If you'd prefer, you can set your browser to refuse cookies. However, it is likely that most areas of the site will not function properly if you do so. insiderBOOKS reserves the right to change this policy at any time by notifying users by email or through a notice posted on this site.


Analytics Tracking Tools and Associated Cookies

In addition, cookies placed on your computer by a third-party advertiser may be used by advertisers to collect web viewing data to serve further online-based advertising known as behavioral advertising.

These cookies (which do not include personally identifying information) are used to manage the banner advertisements or personalized information presented to you on the website.

Browsers or third-party software can allow you to block the use of cookies while surfing this website. Third-party "anonymizer" services can mask information in your cookie, like your computer's IP address. In such cases, you would not be able to take advantage of most of the personalization services offered by WIS’s network of sites.

Residents of the European Union

WIS takes reasonable precautions for storing and keeping your data secure and protected. By using WIS’s sites and signing up for its services, you consent to this privacy policy and the processing and international transfer of your personal data to the United States. Data is stored for the purposes of fulfilling services for advertisements, subscriptions, events, and online programs such as webinars, white papers, Q&As, books, articles, and special reports, and providing relevant content. If you would like to make updates, request access to your data, or ask for erasure, please feel free to email at any time.

Remarketing and Third-Party Advertising Technologies

The aggregated information we collect is used to improve the content and design of the website; to help advertisers, potential advertisers, or marketers assess the suitability of the website for their ad campaigns; or to serve clear GIFs, also known as pixel tags, that place cookies on your computer. WIS utilizes displays re-targeting ads, too, based on the sites you have visited within its network.

WIS serves advertising on its websites and through its email newsletters and other online products. WIS also uses marketing automation software which helps us understand how you use our website, including the pages you have visited, and to serve ads on our network of websites and to deliver relevant content. You can review AdRoll Group's privacy policy and opt out of our targeted advertisements.

We use web metric vendors to gather information that helps us understand how you use our website and other online products. You may opt out by visiting the Google advertising opt-out page or you may opt out of Google Analytics by visiting the Google Analytics opt-out page.

insiderBOOKS reserves the right to change this policy at any time by notifying users by email or through a notice posted on this site.

Popular Chapters

View More
  • Chapter 7: Phase Four: Transition

    In the final phase, transition, we go through what you can expect at go-live, followed by lengthy discussions regarding service level agreements, operations process training, and transition to cloud operations. We talk about intricacies of system stabilization and monitoring. Finally, we explore the options for business continuity and security

    Read More
  • Chapter 6: Phase Three: Build

    In the third phase, build, we walk through developing proofs of concept for your project. The chapter discusses how to take advantage of a provision-shared infrastructure, as well as strategies for building and testing that infrastructure. There is an examination on how to build and mitigate databases and applications, as well as planning the phase cutover. It also looks at automated provisioning and automated services.

    Read More
  • Chapter 5: Phase Two: Model

    The second phase of moving SAP to the cloud, model, contains an overview of the second half of onboarding to the cloud. It examples infrastructure requirements and design and walks the reader through the process of developing a workload analysis. The chapter discusses application and business process discovery as well as operational run books and migration strategy.

    Read More
View More

Do you #LearnLikeAnInsider?

See what it means to redefine reading and start to #LearnLikeAnInsider today.

insiderBOOKS Video

From The Blog

  • Encryption

    The previous chapters [of SAP in the Cloud: Security Essentials] discussed how cloud providers can prevent an attacker from accessing your data. But what happens if an attacker does gain access? Does this mean it’s game over, data’s stolen, start running damage control? Not necessarily. This is where encryption can help you. In this chapter excerpt, we’ll cover what encryption is and how you can use it to protect your cloud-based SAP system.

    Read More