SAP Security & Compliance: Challenges in the Context of S/4HANA, Code Security, and the Cloud

SAST DAYSThey say that major events cast a shadow that portends their arrival. In SAP environments, this applies in particular to the transition to S/4HANA, which companies will need to make before maintenance for SAP ERP expires in 2025.

As we covered this pending migration from various perspectives at our SAST DAYS 2019 event, interest in the topics of authorizations and code security was especially high. Let’s take a look back at those exciting days, which presented a balanced mix of current challenges and assorted solutions.

Continue reading

Authorizations for batch processing in NetWeaver and S/4HANA environments

SAST_SAP_User-Access-ManagementDespite the increasing use of web interfaces in the context of S/4HANA, batch processing is still required for mass data. However, our experience in customer projects has shown that very few administrators know how manage authorizations properly in such scenarios. SAP OSS Note 101146 offers a good overview in this regard. In this blog post, we want to provide a condensed explanation of how the practical aspects interrelate.

Continue reading

Cut down on critical SAP authorizations without interrupting operations

SAP Authorizations, SAP Security & ComplianceCompanies that operate SAP systems are subject to an annual audit by an auditor. Often, SAP authorizations are also examined. The audits check for separation of duties (SoD) and critical authorizations, in particular where SAP Basis Administration is concerned. Read this blog to learn how you can quickly reduce critical SAP authorizations (auditor findings).

Continue reading

One step at a time: How to secure and harden your SAP Gateway

SAST SUITE: INTERFACE MANAGEMENTThe Gateway is a central communication component of an SAP system. As such, it is an attractive target for hacker attacks – and should receive corresponding protections. If the Gateway protections fall short, hacking it becomes child’s play. Despite this, system interfaces are often left out when securing IT systems. Should a cyberattack occur, this will give the perpetrators direct access to your sensitive SAP systems.

Continue reading

Study shows SAP systems especially prone to insider attacks

SAST BLOG: Study shows SAP systems especially prone to insider attacksAfter many years working in the field of SAP security, I am still regularly surprised to discover how much Hollywood has contributed to the discussion on cybersecurity. The common perception is that of a hacker sitting at home in front of several screens and using cryptic commands to hack into corporate networks. The recently published “Insider Threat 2018 Report” however, shows that insider attacks represent a much more serious threat. As far as the security of SAP systems is concerned, insider attacks are by far the greater problem. Why that is the case and what the main risks are is the subject of this post. Continue reading

Why passwords are pricey – and how you can still keep costs down

SAST Password Reset for SAPA password is both a blessing and a curse. The blessing is that it permits relatively secure authentication. The curse is that because the complex passwords required for secure login are often too hard to remember, even for those with good memories. A forgotten password is annoying for users. It also costs a lot of money. Read more to learn just how high the costs can be and how you can avoid them.

Continue reading

Awarded as “Top 10 Cyber Security Company in Europe”

Top10 CyberSecurity Companies Europe 2018

In cooperation with Enterprise Security Magazine, a distinguished panel of experts, professionals, and technology leaders has selected AKQUINET and their SAST SOLUTIONS into the list of the “Top 10 Cyber Security Companies in Europe”.

In the cover story of the magazine , Ralf Kempf (Technical Managing Director) reports what makes SAST SOLUTIONS special and why the topic of cyber security for SAP systems is up-to-date and will remain in future. Read the November edition of Enterprise Security Magazine now.