TRENDING TAGS
Cybersecurity and application security is a trend-driven field. While attackers continue to improve their attack techniques, defenders need to pay attention to these new trends. Follow our trending tags for information on specific topics.
- #s4hana
Interfaces: a major concern for SAP S4/HANA transformations
SAP S4/HANA is the latest generation of SAP Business Application based on the HANA database. May organizations are in the migration or planning to perform a migration to SAP S4/HANA. The prerequisite for an effective S4/HANA migration phase is a clean and well-prepared environment.
- #s4hana, #sapsecurity
3 Benefits of an integrated and holistic SAP security platform
Selecting a specialized solution for each security area, however, has some limitations. A holistic approach offers additional benefit that is required to gain insight into potential risks and to offer full transparency of the security posture.
- #s4hana, #sapsecurity
SAP security for S/4HANA®: the challenges
Quite a few SAP customers are currently migrating their systems to the new S/4HANA platform. This represents a great opportunity to re-think SAP security and harden S/4HANA right from the outset. However, there are several challenges to SAP security with S/4HANA. Despite sharing numerous settings with the “old” SAP Business Suite, some things are fundamentally different in S/4HANA.
Latest Resources
- White Paper
How SecurityBridge Supports NIST CSF in SAP Environments
Download the White Paper "Bridging the Gap - How SecurityBridge Supports NIST CSF in SAP Environments". Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
- White Paper
Which cybersecurity framework is the best fit for SAP application security?
Download the White Paper "Which cybersecurity framework is the best fit for SAP application security?" to learn more about the available frameworks, the challenges when adopting a framework, and more.
- White Paper
Your Road to SAP Security
Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.
- White Paper
Top mistakes to avoid in SAP security
Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.
- Report
SAP Security Product Comparison Report
Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.
- Video
How remote working affects your SAP security posture
Remote work is posing new challenges to companies' SAP security posture. In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.