SAST WEBINARS: live and on demand

Abb_WebinareOur webinars offer you a forum in which you can get the answers to your specific questions about the latest topics in SAP Security & Compliance without having to invest a lot of time.

Are you unable to attend a live webinar? Our webinar archive allows you to individually schedule when you want to take advantage of our recommendations.

Check out our current topics.

SAP compliance: the benefits of an automated audit rules at HellermannTyton

SAST Blog: SAP Compliance: the benefits of an automated audit rules at HellermannTytonWherever electricity is flowing through a cable or data is being transmitted over a fiber optics cable, HellermannTyton products are never far away. Over the last 85 years, the company has developed into a leading global provider of cable management solutions and is on track to continue this growth both nationally and internationally. This expansion is also reflected in its SAP systems and authorizations, which have grown alongside its success. Today, systems with this level of complexity are expected – internally and externally – to comply with strict requirements.

Continue reading

Improve security by redesigning your SAP authorizations – the right role template can save you time and money

SAST Blog: Improve security by redesigning your SAP authorizations – the right role template can save you time and moneyThe authorization structures at many companies have grown organically. Over the course of time, users have often been granted wider authorization privileges than they actually need for their everyday work. As a result, data availability and integrity, as well as system availability, can be critically endangered. Authorization managers see an increasing need for action to minimize the risk of SAP security incidents. After all, many more IT incidents still remain unreported compared to published cases.

Continue reading

Get your SAP S/4HANA migration into high gear with a sound security strategy

SAST Blog: Get your SAP S/4HANA migration into high gear with a sound security strategy.Seize the opportunity to take your SAP S/4HANA migration to a new level with a cleanly designed, holistically planned security and compliance strategy. After all, having structured plans from the start will reduce the workload in the long term. That’s why you should ultimately see this challenge as an opportunity as well: to improve the security of your SAP systems, streamline your role concepts, and enable use of the new system with all its benefits.

Continue reading

Comprehensive SAP S/4HANA security strategy reduces additional downstream costs

Expert talk of IT-Onlinemagazin with SASTSchott AG is considering its SAP S/4HANA transformation from all aspects, from code and processes, down to authorizations for its SAP S/4HANA migration.

In this interview, Thomas Frey (SAP Authorizations Consultant, SAST SOLUTIONS) explains the requirements you need to keep track of when rolling out SAP S/4HANA – and what you must avoid at all costs.

Continue reading

Takeda trusts in the SAST SUITE to reduce SoD conflicts in their heterogeneous SAP landscape

AST Blog: Takeda trusts in the SAST SUITE to reduce SoD conflicts in their heterogeneous SAP landscapeTakeda, Japan’s largest pharmaceuticals company, manages its business processes in a global, heterogeneous IT landscape. From SAP ERP to SAP Cloud applications, employees work at a variety of levels, depending on their involvement in processes, and therefore need access to a number of systems. As a result, the company has to constantly review conflicting authorizations to meet strict compliance requirements, such as segregation of duties (SoD). Most standard software solutions on the market only monitor SoD conflicts and risks in a single system, however, which led the company to search for an end-to-end solution.

Continue reading

Secure your SAP systems worldwide: Best practice recommendations for successful national and international rollouts with the SAST SUITE

SAST Blog: Secure your SAP systems worldwide: Best practice recommendations for successful national and international rollouts with the SAST SUITE.Companies all over the world rely on SAP as their central enterprise software suite. That’s why it’s becoming ever more important for them to protect these SAP systems, along with the enterprise values they contain, with a professional cybersecurity and access governance strategy. Many international companies already trust the SAST SUITE to help them manage their international rollouts, and for good reason.

Continue reading

Why your SAP security and compliance strategy can’t wait for an SAP S/4HANA migration

SAST Blog: Why your SAP security and compliance strategy can’t wait for an SAP S/4HANA migration.Companies have been sensitized to the risks: According to a recent report by consulting firm Ernst & Young, 97 percent of the surveyed executives expect that they will face an even greater risk of cyberattacks and data leaks in the future. And they also know that they can hardly keep up with the rapid advances. That’s why we recommend that you give thought to end-to-end protection of your SAP systems now – no matter whether you’re still using SAP ERP or have already migrated to SAP S/4HANA. The sooner you start with an end-to-end strategy, the better you’ll protect yourself against threats – both internal and external.

Continue reading

Role adjustments for technical SAP users – how to handle authorizations safely and effectively

SAST Blog: Role adjustments for technical SAP users – how to handle authorizations safely and effectively.Technical SAP users that have extensive authorizations like SAP_ALL pose a heightened security risk. Vulnerabilities can endanger interfaces and paralyze processes. As such, external auditors are intensifying their focus on authorization management. One of our customers – a company in the energy sector – recently faced the challenge of having to restrict the authorizations of its technical users (batch processing/RFC interfaces).

Continue reading

Don’t lose track of the big picture – a security dashboard provides transparency for all your SAP systems

SAST Blog: Don’t lose track of the big picture – a security dashboard provides transparency for all your SAP systemsThe lack of SAP security management dashboards is discussed often by the Security & Vulnerability Working Group at DSAG, the German-speaking SAP User Group. The Working Group sees such tools an essential prerequisite for developing and monitoring the improved security concepts that are urgently needed. Yet a majority of companies has yet to implement the dashboard technology although now would be a particularly good time to implement this efficient tool for mitigating attacks in light of the increasing threat level posed by malware and ransomware.

Continue reading