Key Insights Blog
Read the latest insights from our experts on Cybersecurity and Risk management for SAP.
July 13, 2020
#2fa, #compliance, #gdpr, #sapsecurity
Gear up your SAP Logon process using 2 factor authentification. 2FA, typically demands two components to co-exist, in the same place, at the time of login. In practice, this typically means the end-user has a physical device such as a SmartCard, and a memorized PIN number.
Category: Security News
July 7, 2020
#audit, #compliance, #gdpr, #sox
In information technology, compliance and security are inseparable. For SAP systems, this relatively simple relationship between compliance and security becomes a little bit more complicated, read more to learn about the reasons.
Category: Security News
July 1, 2020
#s4hana, #sapsecurity
Selecting a specialized solution for each security area, however, has some limitations. A holistic approach offers additional benefit that is required to gain insight into potential risks and to offer full transparency of the security posture.
Category: Product Feature
June 18, 2020
#interface, #rfc, #sapsecurity
Latest addition to the SecurityBridge suite is a fully integrated interface monitor, which visualizes RFC interface connectivity across your SAP landscape. Through a bird’s eye view security critical traffic and vulnerable interfaces can easily be spotted.
Category: Product Feature
June 16, 2020
#patch, #sapsecurity
On the 9th of June 2020 the SAP Product Security Response Team released 18 patches out of which 1 contains an update from a previous release. Every second Tuesday of the month the team publishes corrections and recommendations, which fix known vulnerabilities discovered within SAP products.
Category: SAP Patchday
June 16, 2020
#rfc, #sapsecurity
Over and over again we see attackers who have gained unauthorized access to a system by spending a significant amount of time spying out relevant SAP data, unnoticed by the victim organization. In a recent incident, we identified a large number of information gathering and data collection activities carried out by a threat actor prior to the exfiltration of sensitive data - which, if leaked, would inevitably lead to reputation and/or financial loss for the organization.
Category: Security News
June 16, 2020
#patch, #sapsecurity
SAP Identity Theft is when someone steals your account details and then uses them to execute unauthorized transactions on your behalf. Identity theft is one of the fastest-growing crimes in the world today. Enterprises should educate their users with some basic rules to help protect their identities.
Category: SAP Patchday
Find recent Security Advisories for SAP©
You like it?
Share it!
Share on linkedin
Share on twitter
Share on whatsapp
Share on email
SAP Sicherheit auf dem Prüfstand – Ein ganzheitlicher Ansatz
#ITOK21 | IT-Onlinekonferenz.de | Helge Sanden und Christoph Nagy
Ständig hört man von Cyberangriffen und die meisten Unternehmen haben bereits …
Ständig hört man von Cyberangriffen und die meisten Unternehmen haben bereits …