SAP Business Data Cloud on Azure Switzerland: EU Access for Sovereign Analytics

  • Thread Author
SAP and Microsoft’s joint rollout of SAP Business Data Cloud on Microsoft Azure in Switzerland marks a practical next step in delivering EU Access options and data-sovereign cloud choices to enterprise customers, giving Swiss organizations the ability to combine SAP-governed business data with Azure analytics and AI while formally addressing regional compliance and sovereignty expectations.

Background / Overview​

SAP Business Data Cloud (BDC) is SAP’s cloud offering designed to bring business-context semantics, governance, and trusted metadata to enterprise data across SAP and non‑SAP sources. Deployed as part of SAP’s broader Business Technology Platform ecosystem, BDC aims to act as a semantic, governed layer that powers analytics, master data, and AI use cases without forcing wholesale migration of every dataset into a single system.
Microsoft’s announcement that BDC will be available on Microsoft Azure in Switzerland — with EU Access availability — is a continuation of a multi-year partnership between the two vendors. The move follows earlier launches and sovereignty-focused efforts in Germany and other regions, and it aligns with broader market trends: hyperscalers and enterprise SaaS vendors are delivering localized cloud options, EU‑bound processing controls, and contractual/technical measures intended to reassure regulated customers in finance, public sector, healthcare, and other sensitive industries.
In plain terms, Swiss customers can now provision SAP Business Data Cloud functionality in Azure regions that meet specific access and residency requirements, while consuming Azure-native analytics and AI services. That combination is meant to deliver three outcomes: customer choice over platform and tooling, maintained business semantics and trust in SAP-managed data, and the ability to build cross‑enterprise data and AI architectures tailored to workload needs.

What this availability actually delivers​

EU Access availability explained (practical implications)​

  • EU Access availability in this context refers to an operational configuration and contractual model that limits administrative and operational access to data and platform management to personnel and processes that fall within the EU/Swiss jurisdictional boundary or under SAP/Microsoft controlled processes that honor EU/Swiss data‑access commitments.
  • For organizations with strict sovereignty or compliance obligations, the key practical promises are: data residency (data at rest stored in the specified region), restricted administrative access and controls, and procedural commitments around how cross-border requests are handled.
  • It’s important to note that these models are not a single silver bullet: they typically combine technical boundaries (region-level deployments, specialized personnel access controls), contractual commitments (terms specifying where data is stored and who can access it), and operational arrangements (local engineers or local operator models, or special “EU‑only” access procedures).

Technical capabilities enabled by the on‑Azure deployment​

  • Customers can run SAP Business Data Cloud components on Azure infrastructure in Swiss Azure regions, while integrating with Azure analytics and GenAI tooling for consumption and advanced analytics.
  • The offering supports scenarios where SAP-governed datasets retain business semantics and governance within BDC, while enterprise-level analytics and machine learning models can be built using Azure services — creating a hybrid model that avoids forcing a single technology stack for every use case.
  • Integrations commonly referenced with BDC include SAP Datasphere, SAP Analytics Cloud, and partner technologies such as Databricks. For Azure customers, that means easier alignment with Azure Synapse Analytics, Microsoft Fabric, Azure Databricks, and Azure AI services when appropriate.

Where Switzerland fits in the regional rollout​

  • Switzerland becomes the second European market explicitly called out for EU Access availability for SAP BDC on Azure, following earlier deployments and specialized sovereignty efforts in Germany.
  • This is consistent with both SAP and Microsoft expanding their localized cloud and sovereign-capability footprint to accommodate strict regulatory and public-sector requirements across Europe.

Why Swiss customers should care — benefits and business value​

1. Choice without losing trust​

Organizations can choose the platform that best suits a workload:
  • Keep SAP-centric workloads and governance close to SAP-controlled BDC for semantically accurate, governed datasets.
  • Use Azure services for broad enterprise analytics, AI model training, or interactive BI that benefits from Azure’s developer ecosystem.
This separation is valuable for enterprises that want to preserve enterprise-grade SAP semantics for core financial or operational datasets while using Azure’s ecosystem to accelerate analytics and AI innovation.

2. Data sovereignty and compliance​

Local deployment options and EU/Swiss‑focused access commitments help address regulatory concerns head‑on:
  • Public-sector bodies, regulated financial institutions, and health providers often require both residency and demonstrable controls over who can access data.
  • A Swiss Azure deployment with EU Access availability provides a more defensible posture for those customers than using only global, non-localized instances.

3. Faster AI and analytics adoption​

By enabling access to Azure analytics and AI stacks while preserving SAP semantics, teams can:
  • Prototype and iterate with Azure-native ML/AI frameworks.
  • Use governed, business-contextualized datasets from BDC for safer model training (reducing the risk of model drift and misinterpretation).
  • Accelerate time-to-insight by using the best tool for each job.

4. Operational continuity and enterprise-grade SLAs​

Large vendors typically pair these rollouts with clear SLAs, support pathways, and migration programs — all of which matter for mission-critical SAP landscapes.

Critical analysis: strengths, caveats, and practical risks​

Strengths worth noting​

  • Real-world customer flexibility. The approach recognizes that enterprises rarely want to replatform everything at once. The hybrid model embraces heterogeneity and practical migration patterns.
  • Improved sovereign posture. Localized deployments and EU Access constructs reduce friction for customers with strict data residency and governance mandates.
  • Ecosystem leverage. Combining SAP’s semantic layer with Azure’s AI and analytics can reduce time-to-value for data projects while preserving enterprise control.
  • Strategic vendor alignment. A deeper SAP–Microsoft partnership signals long-term joint engineering, which benefits customers through integrated tooling and clearer support pathways.

Risks, limitations, and what to watch for​

  • Sovereignty semantics vs. legal reality. Technical controls and contractual promises reduce exposure but do not negate national or extraterritorial legal orders (e.g., law enforcement or intelligence agency requests). Customers must evaluate legal risk for their jurisdiction and sector in addition to the technical claims vendors make.
  • Operational complexity. Running governed SAP data in BDC while consuming it in Azure introduces architecture and operational complexity: cross‑system metadata management, identity federation, lineage and audit continuity, and latency considerations.
  • Hidden costs. Data egress, inter-region replication, multi-vendor integration, and specialized managed services can increase total cost of ownership. Proof-of-concept budgets often underestimate governance and integration effort.
  • Vendor control and lock‑in nuance. The phrase “customer choice” is meaningful but nuanced. While you can choose where to consume data, switching major platform components later still requires data migration, re-certification of models, and re-establishing governance flows.
  • Governance gaps at edges. If all governance and semantics live in BDC but downstream Azure processes lack adequate enforcement, model drift, data leakage, and compliance gaps are still possible. Governance must be enforced across the entire data lifecycle.
  • Supply chain and geopolitical risks. Dependence on any hyperscaler still exposes customers to global supply chain and geopolitical dynamics (regional outages, sanctions, legal regimes). Contingency planning is essential.

Implementation guidance for IT and architecture teams​

If your organization is evaluating or planning to adopt SAP Business Data Cloud on Azure in Switzerland, consider these practical steps.

Technical design checklist​

  • Map data residency and processing constraints. Classify datasets by regulatory sensitivity, residency constraints, and permissible processing locations.
  • Define where semantics live. Choose which datasets remain governed in BDC and which will be exported or replicated to Azure for analytical workloads.
  • Design identity and access controls. Federate identity across SAP and Azure with strict role definitions and administrative separation where required.
  • Plan data movement and minimal copies. Favor virtualization or low‑latency access patterns where possible to reduce duplication and governance surface area.
  • Standardize lineage and audit. Ensure every data access and transformation is traceable across BDC and Azure components for compliance and model explainability.
  • Account for network and performance. Benchmark expected latency and throughput for analytics workloads that span BDC and Azure compute.
  • Validate backup and DR strategies. Confirm that SLAs and disaster recovery plans meet your regulatory and business continuity needs across providers.

Security, compliance, and legal due diligence​

  • Request explicit contractual terms on access, cross‑border data requests, and the provider’s obligation to notify and contest non‑compliant requests where allowed.
  • Conduct a legal counsel review of CLOUD Act and other extraterritorial access implications relative to your industry and data types.
  • Perform third‑party audits and penetration tests on any integrated solution to validate controls and boundaries.
  • Use encryption by default, including encryption in transit and at rest, and consider customer-managed keys with localized key stores where legally advantageous.

Governance and operational readiness​

  • Create a cross-functional governance body that includes IT, security, legal, data science, and line-of-business stakeholders.
  • Operationalize policies for data retention, access approvals, and model lifecycle management.
  • Invest in staff skilling and runbooks to manage a hybrid, multi-cloud environment — operational gaps are often people and process problems, not just technology.

Commercial and cost considerations​

  • Cost transparency is critical. Get pricing for region-specific provisioning, managed services, data egress, and any specialized sovereignty features. Model different scenarios (development, testing, production).
  • Negotiate support and escalation paths. For sovereign deployments, ensure there are well-defined local escalation channels and SLAs for incident response.
  • Evaluate third-party partners. Systems integrators with proven SAP + Azure experience can accelerate adoption and reduce risk; verify their Swiss-specific experience for compliance-oriented deployments.

How this fits into larger enterprise data and AI strategies​

A pragmatic path for enterprise modernization​

The hybrid approach — governed semantics in SAP BDC + Azure analytics/AI for consumption — supports a pragmatic modernization road map:
  • Stage 1: Governed ingestion and normalization in BDC; minimal replication to Azure for analytics.
  • Stage 2: Expand Azure-based models and analytics while preserving BDC as the semantic source of truth.
  • Stage 3: Mature a governed model lifecycle with continuous monitoring, retraining, and explainability integrated across platforms.
This phased approach allows organizations to pilot AI with trusted data, then scale while controlling risk.

Not an either/or decision​

The offering acknowledges a reality many enterprises face: some workloads are best kept close to the ERP/transactional layer, while others benefit from the agility and broad ecosystem of a hyperscaler’s analytics and AI services. This model acknowledges the need for heterogeneous tooling — and seeks to make that heterogeneity manageable.

Questions CIOs and data leaders should ask vendors and partners​

  • Precisely what does EU Access availability mean in contractual and operational terms for my data and accounts?
  • Who will have administrative access to my data and metadata — and under what conditions?
  • Where will encryption keys reside and who controls key revocation?
  • What are the mechanics and costs for data egress, replication, and cross-region failover?
  • How will you ensure consistent lineage, semantic integrity, and auditability across BDC and Azure?
  • Can you provide customer references for Swiss deployments in my industry?
  • What are the escalation procedures and local support options for regulated incidents?
  • How do you handle law‑enforcement or government access requests that cross jurisdictions?
These questions move assessments from marketing promises to provable, auditable commitments.

The bigger picture: market impact and vendor dynamics​

This Swiss availability reflects broader market dynamics:
  • Hyperscalers and enterprise software vendors are increasingly offering localized, sovereignty‑aware variants of their cloud services to win regulated workloads.
  • Partnerships (SAP + Microsoft, and in some cases with third parties) are now engineered to reduce friction for enterprises that must balance governance and innovation.
  • The real competitive battleground is no longer only features or performance; it’s the vendor’s ability to demonstrate trustworthy governance, resilient operations, and legally defensible access models.
For Swiss and pan‑European customers, this trend lowers the barrier to experimenting with advanced analytics and GenAI on enterprise data — but it also raises the bar for proper governance and legal diligence.

Final assessment and practical verdict​

SAP Business Data Cloud on Azure in Switzerland is a meaningful, pragmatic offering for enterprises that want to:
  • Preserve SAP‑level semantics, governance, and trust for critical datasets;
  • Leverage Azure’s analytics and AI capabilities where they make sense; and
  • Demonstrate a stronger sovereign posture through regionally constrained access commitments.
However, achieving the advertised benefits requires careful execution. Organizations must not let vendor marketing shorthand — phrases like EU Access or data sovereignty — replace rigorous legal, security, and architectural validation.
If you are a Swiss CIO, head of data, or architect evaluating this path, treat the availability as an invitation to design a governed hybrid architecture — but insist on concrete contractual guarantees, third‑party validation, and a realistic budget for the integration and governance work that follows.
Adoption will succeed where governance is treated as a cross‑cutting engineering discipline, not an add‑on; where identity and lineage are federated end‑to‑end; and where legal counsel and cloud architects collaborate from the earliest design decisions. Only then will organizations convert the promise of choice and trusted data into safer, faster, and more valuable AI‑driven outcomes.

In short: the launch is a strategic win for customers who need both trust and innovation, but it is not a turnkey shortcut around the hard work of governance, compliance, and integrated operations that true multi‑cloud data architectures require.

Source: Microsoft Source SAP Business Data Cloud available on Microsoft Azure Data Centre in Switzerland - Source EMEA
 
SAP’s Business Data Cloud will be available on Microsoft Azure in Switzerland in the coming weeks, delivered with an EU Access deployment model that stores and processes customer data within the European Economic Area and Switzerland and restricts administrative access to personnel operating inside those jurisdictions — a move that extends SAP and Microsoft’s joint sovereignty-focused architecture beyond Germany and gives Swiss and pan‑European customers a new localized option for combining governed SAP data with Azure analytics and AI services.

Background / Overview​

SAP Business Data Cloud (BDC) is positioned as SAP’s semantic and governance layer for enterprise data — a platform that brings together capabilities such as SAP Datasphere and SAP Analytics Cloud to create governed, business‑contextualized datasets for analytics, reporting, and model training. The Switzerland deplolone SAP data center but a regional availability of the BDC product running on Microsoft Azure infrastructure with contractual and operational guardrails that aim to meet European data‑residency and access requirements.
Microsoft’s and SAP’s public communications describe the arrangement as part of a broader push to give customers “in‑region” processing plus controlled administrative access, aligning with Microsoft’s EU Data Boundary and other sovereignty initiatives that route support and administrative activities into EU/EFTA geographies where required. For organizations in regulated sectors — public sector, financial services, healthcare — the appeal is that they can keep SAP’s governed data layer in an EU/EFTA/Swiss footprint while using Azure compute and AI in the same local cloud fabric.

Why the Swiss deployment matters​

Sovereignty without monoliths​

The Swiss availability highlights a dominant pattern in enterprise data strategy: sovereignty through layered architecture rather than through fully nationalized stacks. Organizations increasingly separate where governance and semantics live (the “trusted” data layer) from where heavy compute and model training run (hyperscale cloud)enterprises preserve regulatory and business semantics in SAP while taking advantage of Azure’s scale for analytics and AI.

Practical benefits for Swiss and European customers​

  • Data residency and administrative limits: Data at rest and primary processing remain in‑region under the EU Access construct, and administrative operations are contractually and operationally constrained to EU/EFTA/Swiss personnel.
  • Faster path to AI/analytics: Teams can iterate on models using Azure’s AI services and combine SAP‑governed datasets with non‑SAP sources hosted and processed in the same Azure region.
  • Reduced procurement friction: For regulated procurements, offering explicit in‑region availability reduces legal and audit impediments that often block cloud projects in the public sector and critical industries.
These are concrete advantages — but they come with non‑trivial architectural, contractual and operational caveats (detailed below).

The technical and contractual mechanics of “EU Access”​

What EU Access typically promises​

EU Access (the nomenclature varies by vendor) is a combined operational and contractual model intended to achieve three principal objectives:
  • Residency: Ensure data is stored and processed in specified countries/regions (EEA + Switzerland).
  • Operational controls: Limit who — both human and automated admin processes — can access that data to personnel and systems operating within the region.
  • Contractual guarantees and auditability: Include contractual commitments, audit evidence and reporting obligations that back up marketing claims.
These measures typically combine technical boundaries (region‑specific deployment and access control), contractual provisions (data‑processing addenda, access‑control clauses), and operational arrangements (local operator models, restricted support channels, or EU‑only access procedures).

What this looks like for SAP BDC on Azure in Switzerland​

  • The BDC services — including metadata and semantic layers — will run in Swiss Azure regions, leveraging Azure’s local infrastructure and platform services.
  • Administrative access to platform controls and support data is limited by contractual commitments and procedural controls to personnel and systems within the EU/EFTA or Switzerland.
  • Integration patterns are explicitly designed for hybrid consumption: SAP keeps semantics and governance in the BDC layer, while analytics, ML training and interactive reporting can run on Azure’s compute and AI stacks co‑located in the Swiss cloud region.

Cross‑vendor context: Microsoft, SAP and the sovereign cloud trend​

Microsoft’s platform posture​

Microsoft has built a set of European‑facing controls (the EU Data Boundary, Microsoft Cloud for Sovereignty primitives and expanded in‑country processing for Microsoft 365/Copilot) intended to give customers contractual and technical mechanisms to keep processing inside Europe. The company also operates dozens of Azure regions across Europe, and Microsoft publicly states Azure has over 70 regions globally with more than 400 datacenters — a scale that enables vendors to offer localized deployments while still using hyperscaler scale economics.

SAP’s sovereignty playbook​

SAP now offers a mix of deployment choices: hyperscaler‑hosted localized instances (like the Azure Swiss tenancy), SAP‑operated Cloud Infrastructure regions, and country‑specific sovereign platforms such as Delos Cloud in Germany. Germany has been an early testbed for EU Access and sovereign offerings; the Swiss availability is the next step in broadening that footprint. SAP’s communications indicate the company is layering product governance and semantics (via SAP BDC, SAP Datasphere, etc.) on top of a mix of hyperscaler and SAP‑managed infrastructure to meet national and sectoral needs.

Verifying the claims: what is provable and what needs scrutiny​

Below I verify the key claims and provide independent corroboration.
  • Claim: SAP Business Data Cloud will be live on Azure in Switzerland with EU Access availability. Independent confirmation appears in Microsoft’s EMEA news announcement and SAP Switzerland communications that the product will go live in the coming weeks. These vendor announcements corroborate ERP Today’s reporting.
  • Claim: *Switzerland is the second European location after Germany for EU Access availAP’s prior sovereign and EU Access initiatives (Delos Cloud and SAP Cloud Infrastructure EU Access regions) have focused heavily on Germany; multiple SAP communications and community posts confirm Germany’s role as an earlier EU Access deployment location. The Swiss rollout follows that pattern and is described asgion.
  • Claim: Azure operates more than 70 cloud regions and hundreds of datacenters. Microsoft’s own technical pages and guidance for Azure state “over 70 regions” and public filings and documentation reference “400+ datacenters across 70 regions.” This supports the assertion that hyperscalers can deliver localized instances within a global cloud fabric. ([learn.microsoft.com] data center investment could reach roughly €176 billion by 2031.* This projection is reported in the European Data Centre Association (EUDCA) State of European Data Centres report and summarized by reputable industry outlets. Multiple independent publishers reference the €176 billion figure for cumulative investment between 2026 and 2031. While forecasts are inherently uncertain, the figure is traceable to EUDCA analysis and industry summaries.
Caveat: Vendor press releases and marketing statements are accurate for planned availability and contractual offers, but *oper(who actually accesses your data, where backups are kept, and how cross‑border legal requests are handled) remains an implementation detail that customers must verify contractually and technically. In short: the headline commitments are real, but proving compliance in practice requires tenant‑specific evidence (access logs, key custody arrangements, SOC/ISO reports).

Strengths of the SAP on Azure (Switzerland) model​

  • Pragmatic separation of responsibilities. SAP delivers the governed data and semantic layer; Microsoft provides compute, availability zones and AI infraation lets each vendor focus on areas where they have scale and expertise.
  • Lower procurement friction for regulated workloads. For public‑sector and regulated commercial organizations, in‑region availability backed by contractual EU Access commitments can materially reduce legal and audit barriers that otherwise delay cloud adoption.
  • Ecosystem leverage for analytics and AI. Running BDC on Azure in Switzerland allows customers to use Azure Synapse, Microsoft Fabric, Azure Databricks and Azure AI while keeping SAP‑governed semantics as the authoritative layer for critical business data. That lowers integration overhead for many analytics programs.
  • Repeatable architecture for pan‑European rollouts. The model scales to additional countries: preserve local governance while using ponded hyperscaler compute. It’s a practical blueprint for nations or industries that require local control without losing hyperscaler innovation.

Risks, limitations and things that CIOs should demand​

The legal and geopolitical blind spots​

Technical guards and contractual terms do not fully eliminate legal exposure to extraterritorial orders or government requests. The so‑called “CLOUD Act” and similar regimes can create legal obligations that require careful legal review. Customers must obtain explicit contractual terms describing notification, contesting procedures, and technical mitigations (e.g., in‑region key custody).

Operational complexity and governance gaps​

ayer in SAP while running analytics on Azure introduces operational complexity:
  • Federated identity, consistent access control, and auditability across both platforms must be designed up front.
  • Lineage and model traceability become harder when data moves between governed and general compute layers.
  • Latency and egress costs can become material if architectures are not well optimized.
These are not theoretical: real projects under‑budget governance, identity federation, and migration complexity all the time.

Hidden costs and exit friction​

  • Data egress, cross‑region replication and localized managed services add to total cost of ownership in sovereignty deployments.
  • Vendor and region lcopying data and governance artifacts out of a sovereign tenant is often harder than it first appears. Procurement teams must negotiate exit and export clauses.

Practical implementation guidance — a checklist for IT leaders​

If you are evaluating SAP Business Data Cloud on Azure in Switzerland, follow these steps:
  • Map sensitive workloads and residency constraints. Classify data and choose which datasets must remain governed inside BDC vs. those that can be exposed to Azure analytics.
  • Demand tenant‑specific proof of controls. Ask for SOC/ISO reports, tenant‑level penetration tests, detailed key‑management documentation and access‑log sampling for the Swiss tenancy.
  • Design identity federation and RBAC. Implement strict role separation for administrative duties; federate identity between SAP and Azure with minimal privilege principles.
  • Minimize copies where possible. Favor virtualization, federated queries and virtualization layers to reduce duplicate datasets and governance surface area.
  • Benchmark performance. Validate latency and throughput for cross‑platform queries, and confirm DR/backup geography and SLAs.
  • Model total cost of ownership. Include region pricing, egress, replication, and specialized managed services, and negotiate commercial terms with exit scenarios in mind.
  • Run a pilot with full auditability. Deploy a demonstrator workload that exercises governance, lineage and support processes end‑to‑end and subject it to an external audit before production roll‑out.

Questions to ask vendors before signing​

  • Precisely which classes of data will be guaranteed to remain in‑region? Are backups included?
  • Where are encryption keys held and do you support customer‑managed keys (CMKs) in local key vaults?
  • What is the exact process and SLA for cross‑border administrative access or emergency access requests?
  • Can you provide tenant‑specific audit evidence (SOC 2, ISO 27001) for the Swiss tenancy and recent penetration test summaries?
  • How is cross‑platform lineage and model provenance captured and exported for audit?
  • What are the exit, export and migration terms? Are there penalties or operational blockers for moving data out of the sovereign tenancy?

How this fits broader market dynamics​

The Swiss SAP BDC availability is emblematic of a larger market dynamic: sovereign cloud is not a binary choice between “national stack” and “global hyperscaler.” Instead, operators and vendors are building layered models that retain governance locally while using hyperscaler compute for scale. That pattern is now visible across vendors and geographies: Microsoft’s EU Data Boundary, SAP’s Delos Cloud in Germany, and hyperscaler sovereign initiatives all reflect the same strategic pivot. Customers who can articulate governance needs, oidence, and build robust identity and lineage practices will extract real value; those who rely solely on marketing language risk regulatory gaps.

Final assessment: pragmatic opportunity, conditional on proof​

SAP Business Data Cloud’s Swiss deployment on Microsoft Azure with EU Access is a meaningful and pragmatic option for enterprises and public bodies that need both strong governance and access to hyperscaler AI and analytics. The offering checks many boxes: in‑region data processing, restricted administrative access, and a clear technocratic pathway to combine SAP semantics with Azure compute.
However, the value is conditional: the promised sovereignty and governance outcomes must be demonstrable in tenant‑specific evidence, not just in marketing materials. CIOs, CDOs and legal teams should treat the availability as the opening move in a procurement and technical validation game — require:
  • Tenant‑level audit artifacts and penetration tests
  • Contractual guarantees for access, notification, and key custody
  • A clear operational model for end‑to‑end lineage, model governance and incident response
  • A realistic budget for integration, governance tooling, and runbook development
Done well, the hybrid model lets organizations protect core semantics inside SAP while accelerating analytics and AI on Azure. Done poorly, it creates a governance surface that is harder to manage than a single consolidated stack. The technical and regulatory promise is real; turning it into durable protection and business value requires the disciplined architecture, legal rigor, and operational execution that large‑scale SAP landscapes are known to demand.
Conclusion: the Switzerland availability is a credible next step in a multi‑vendor, multi‑jurisdiction approach to sovereign enterprise cloud — one that will reduce procurement friction for many regulated projects, but which also raises the bar for what counts as provable data sovereignty. Organizations that insist on tenant‑level proof, negotiate concrete access and egress terms, and invest in federated governance capabilities will benefit the most.

Source: ERP Today SAP Business Data Cloud Expands to Azure Switzerland with EU Access Controls