Skip to content

Next-generation application security for SAP

Organizations are looking for easy to maintain, integrated, and scalable system architectures that provide a high level of protection against internal and external threats. Combining perimeter security and critical application security is a natural evolution and defines the next-generation of application security.

SAP Solutions process and store some of the world’s most sensitive data, making it imperative for organizations to protect it with a high level of defense against internal and external threats.

Fortinet

Fortinet and SecurityBridge have combined forces to deliver the next generation of application security with a unified solution that integrates network security with SAP application security

and is available on-prem, in the cloud, and hybrid environments. It is easy to maintain, and scalable, and provides end-to-end protection to enterprises SAP systems, from the perimeter of the network to the application layer. 

Join experts from Fortinet and SecurityBridge to learn how speed-to-security and adequate response capabilities can become key actions in your defense again SAP cyber-attacks.  

Key Takeaways:

  • Architecture of SAP perimeter security and explanation of an attack scenario
  • Live demo of the integrative detection and response approach
  • Understand the end-point monitoring and attack analysis capabilities for SAP
  • Product management outlook and future benefits

Date & Time

On-Demand

Event Details

Date

On-Demand
Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
hacking
In SAP’s patch round of February 2022, an SAP Security Note was released with a CVSS score of 10/10 named, “Request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher”. This particular type of vulnerability is not common in SAP systems and therefore interesting to look at. As patching the SAP kernel executables is often not done promptly, we can expect this vulnerability present in the customer’s systems for quite some time.
code pc
In one of our recent articles, we pointed out the use of Access Control Lists (ACLs) to better manage access control. Below, we will show a practical example of how this can be done for inbound HTTP communication with the ‘Internet Communication Manager’ (ICM) component of an SAP system.
SAP Security Patch Tuesday 2024
For February 2024, 13 new Security Notes have been released and 3 have been updated. Lets look at some highlights, starting with the ‘HowNews’ notes.