Monitoring SAP system settings centrally – how LINDE keeps an eye on all its SAP systems simultaneously

SAST Blog: Monitoring SAP system settings centrally – how LINDE keeps an eye on all its SAP systems simultaneouslyIncorrect parameter settings in the SAP system, operating system, or database often result in serious security deficiencies. Numerous companies using a central auditing policy developed as a document are up against the same challenges. Typically, parameter values are compared manually with the target requirements, which of course is time consuming. This a lot of effort even just for one single system. As you might imagine, making the comparisons on system-landscape level is that much more complicated. By centralizing monitoring with an automated solution, you can use resources more efficiently while boosting your IT security.

Continue reading

Cut your costs: deactivate inactive users and reduce your SAP license fees

SAST Blog: Cut your costs: deactivate inactive users and reduce your SAP license fees.A municipal utility company recently implemented a new authorization concept to optimize maintenance, transparency, and user access. The implementation process included an assessment of whether all the existing user master records were really necessary. A major project like implementing a new authorization concept often pays for itself when inactive user master records are classified and restricted, reducing license fees as a result.

Continue reading

Hacker attack on Düsseldorf University Hospital – cyber criminals got in through the VPN interface

SAST Blog: Hacker attack on Düsseldorf University Hospital – cyber criminals got in through the VPN interfaceIn September 2020, the attack made headlines:

  • Hackers responsible for IT disruption at Düsseldorf University Hospital.
  • Hackers under investigation: Woman dead after attack on University Hospital.
  • Hacker attack on Düsseldorf University Hospital: Investigation into involuntary homicide opened.

A hacker attack can be fatal. Data, goods and assets aren’t the only things to consider: Human lives are at stake where public spaces, in particular public health, is concerned.

Continue reading

Starting a migration project? Consider these things when converting SAP ERP authorizations to SAP S/4HANA

SAST Blog: Starting a Migration Project? Consider These Things when Converting SAP ERP Authorizations to SAP S/4HANA.The upgrade from SAP ERP to SAP S/4HANA also involves a changeover to a new technology. This offers new possibilities thanks, to the increased speed of the SAP HANA in-memory database, as well as an improved user experience through the new FIORI UI. At the same time, however, the implementation of SAP S/4HANA also presents many enterprises with the difficult challenge of planning and executing their migration projects correctly: existing processes and role concepts have to be reconsidered.

Continue reading

How to master the increasing complexity of SAP S/4HANA security

SAST Blog: How to master the increasing complexity of SAP S/4HANA SecurityThe SAP S/4HANA software suite represents a cutting-edge cornerstone for the digitalization of enterprises and is increasingly being used by both SMEs and large corporations. However, the implementation of and migration to SAP S/4HANA also entail increasing complexity in system administration and management. Our specialized software tools enable you to master this project successfully.

Continue reading

The importance of reliably monitoring transactions in SAP systems

SAST Blog: The importance of reliably monitoring transactions in SAP systemsSAP systems contain numerous transactions that enable applications to be accessed quickly. However, transactions can also be used to access sensitive business processes and confidential information. This is why events relevant to security have to be filtered out of a sea of data and placed in the proper context. This means that in order to evaluate and analyze conspicuous events, intelligent management is required. 

Continue reading

Adapting authorization management in a central hub SAP S/4HANA system – save valuable time with the right strategy and the right administration tool

SAST Blog: Adapting authorization management in a central hub SAP S/4HANA system When setting up an SAP S/4HANA system landscape, you have the option of establishing a front-end system as the central, superordinate system that accesses different back-end systems. To do this, you have to consider and logically design many factors in advance. In addition to the technical prerequisites, the role and authorization concepts have to be revised. But how can you adapt authorization management in an SAP S/4HANA system with little effort?

Continue reading