Ivan Mans

SAP Debugger

SAP Debugger, powerful yet dangerous! 

The SAP Debugger, also known as the ABAP Debugger, is one of the most important development tools offered by SAP. An ABAP developer or a technical SAP consultant uses it to analyze problems or to simulate program flows. Usually, the debugger is simply used to understand a certain behavior in SAP ERP and to identify or understand customizing options.

Microsoft Azure for SAP

3 reasons why Microsoft Azure is attractive for SAP customers

Azure is a hyper-scaler like Amazon AWS or Google Cloud. These big three have recognized the opportunity to offer computing power for the computer-intensive business applications of SAP. SAP virtualization is now easier in the cloud than in your own data center.

SAP Threat Intelligence

What is SAP Threat Intelligence? 

Threat Intelligence is as follows: Threat intelligence is evidence-based information about cyber-attacks organized and analyzed by cyber security experts. This is also valid for SAP but must be specifically refined.

SAP Supply Chain Attack

What is a Supply chain attack vulnerability using the SAP Transport Management System? SAP transport content can be adjusted after being exported and passing through test deployment and QA processes. Learn why it is crucial to protect your SAP digital backbone.

One small step for man, one giant leap for SAP Security

  • Ivan Mans 

What Neil Armstrong once said when putting down his first foot on the moon is now true for SAP Security: One small step for man, one giant leap for SAP Security. With release 5.80 we published another major product release for our user community.

Inline Risk Management & how it helps to detect deviation

Organizations by now must have realized that they are swimming with sharks when it comes to cyber-security. Awareness and acceptance of the risk can put you in a stronger position than you have thought. Keeping a close eye on any deviation of risk is vital to understand whether a new threat scenario exists that demands your action.

Security Operation Center

Why CISA strongly recommends monitoring SAP?

The Cybersecurity and Infrastructure Security Agency (CISA) strongly recommends organizations immediately apply patches, and in situations where patches cannot be applied, CISA recommends “closely monitoring your SAP NetWeaver AS for anomalous activity”.

SAP Identity Theft

SAP Identity Theft is when someone steals your account details and then uses them to execute unauthorized transactions on your behalf. Identity theft is one of the fastest-growing crimes in the world today. Enterprises should educate their users with some basic rules to help protect their identities.