ERP for Small and Medium-Sized Businesses

Discover the technical requirements for installing SAP Business One highlighting the minimum requirements for hardware components, bandwidth, network connectivity and software. SAP Business One provides comprehensive security protections for your data and applications using rigorous security approaches, software development, and deployment. Learn how SAP provides access control, secure sign-in credentialing, identity management and training to keep your business protected.




1. Hardware

Below are the technical requirements for SAP Business One for various environments.



SAP Business One add-ons require additional RAM, from 25-150 MB.


For Windows Server or Citrix Server, typically 8 GB is required. In addition, for each concurrent user, the following are minimum RAM requirements:

  • SAP Business One (1 GB)

  • Citrix or Windows Terminal Services Sessions (Consult the respective service documents)

  • Add-ons (Consult with the add-on providers for requirements)

Processor and Network Bandwidth

Each physical CPU core can support 5-8 SAP Business One users concurrently. For virtual environments, each vCPU can support fewer than 5 concurrent SAP Business One users.

Third-party add-ons, format search and extensions require additional CPUs. Partner testing is necessary to determine CPU consumption needs for customizations and extensions.

Bandwidth requirements:

  • Each concurrent user is accessing Citrix or WTS sessions via a WAN needs 0.5 Mbps (512 Kbps) of external bandwidth. Network latency and screen resolution can affect sessions.

  • SAP Business One components must be installed on the same local area network (LAN). If clients and servers are installed in different locations, such as a VPN, SAP Business One performance will be affected.

  • Latency should be as low as possible (< 1 ms).

2. Software

Below are the software requirements for SAP Business One.


  • Microsoft Internet Explorer 8.0 or higher

  • Microsoft Data Access Components (MDAC) 2.6 or higher


  • Microsoft Internet Explorer 8.0 or higher

  • Microsoft Data Access Components (MDAC) 2.6 or higher



Security and Compliance

Maintaining regulatory compliance is a must for most businesses today. Various government entities at the regional, country and state level are passing more stringent guidelines related to data privacy, use of protected consumer information and notification mandates.

One of the most far-reaching regulatory mandates is the General Data Protection Regulation (GDPR), which went into effect in May 2018. The GDPR covers all European Union citizens, giving them the rights to consent and object to data usage, be forgotten, access the collected data, rectify mistakes, erase information or restrict its use.

That’s a tremendous about of complexity for a small or medium-sized business to manage. Failure to comply can result in stiff fines.

Customers using SAP Business One have peace of mind when it comes to GDPR. Its existing and upcoming data privacy and protection features address key provisions of the GDPR mandate. SAP Business One provides the following:

  • Built-in processes for data acquisition that protect data by default

  • The ability to fully erase personal data on customers, employees and vendors as necessary

  • Functionality that easily moves data from one processing system to others

  • Automated records of data processing activities that ensure transparency and document compliance

Security is at the forefront of SAP operations. At the organizational level, SAP uses the following methodologies as part of its software development process:

  • Security training for all employees

  • Security risk assessments

  • Security planning for each product. This application-specific planning is developed from both business and technology contexts and within a regulatory perspective. Once risks are identified, security requirements and controls are determined, including:

    • Authentication and authorization features

    • Data encryption while in transit and at rest

    • Integrity protection

    • Secure session management

    • Forgery and click-jacking controls

    • Data access logging

    • Security event logging

  • Secure design principles when developing new products

  • Validation and security response

For data stored in a cloud-based SAP Business One solution, SAP uses advanced physical and digital security tools at its data centers. Customer data is classified as confidential and protected from unauthorized access, including by SAP employees. To access customer systems, two-factor authentication is required.

SAP offers several security products designed to protect systems and users, including:

  • Access Control. This governance software that automates user provisioning and helps verify access to on-premises data and apps

  • Identity Management. These tools provide role-based user access to data and functionality, self-service password resets and workflow approvals

  • Single Sign-On. Give your users access to SAP and other applications with one password, boosting efficiency and security

  • Security optimization and compliance resources for SAP users

  • Recorded webinars with product information and best practices