SAP security through virus protection: practical significance for the operation of SAP systems

SAST Blog: SAP Security Through Virus Protection: Practical Significance for the Operation of SAP SystemsIt is well known that SAP systems present an attractive target for hackers and manipulators. After all, SAP systems gather all the sensitive company data in one place, making it all the more important to protect them against unauthorized access. In addition to conventional measures for improving SAP security and compliance, this includes extensive anti-virus protection adapted specifically to the requirements of SAP systems.

Continue reading

SAP authorization management put to the test at Berliner Wasserbetriebe

SAP Authorization Management put to the test (©Berliner Wasserbetriebe)Berliner Wasserbetriebe, Berlin’s water supply and wastewater disposal company, is a public institution and is therefore subject to special legal requirements. High security standards apply to both business processes and its IT operations. As a consequence, setting up transparent SAP authorization management company-wide to meet all of these requirements was one of the water company’s most critical tasks.

Continue reading

SNC encryption made easy: SAP security even without SSO

SAST Blog: SNC encryption made easy: SAP security even without SSOTo secure and encrypt customer networks, SAP offers the SNC (Secure Network Communications) interface with which users can log in to SAP systems without having to enter a user name or password. In the standard system, SAP login credentials are transmitted in clear text. The SNC interface routes calls through the SAP Cryptographic Library, to encrypt all communications between the SAP GUI and the SAP server. This enables secure individual logins for SAP.

Continue reading

The most important elements of a Cybersecurity Strategy

SAST BLOG: The Most Important Elements of a Cybersecurity StrategyToday, cyberattacks on companies can easily cause damage in eight or even nine figures. Such attacks often take the form of spam e-mail, written with perfect spelling and grammar, that appears to have been sent by a colleague or a friend. The recipient is usually instructed to click a link or enter a password. And then it’s already too late: The malware spreads throughout the company. With the right cybersecurity strategy, on the other hand, you are well prepared.

Continue reading

SAP Security: five ways to make sure you’ll be hacked

Hacker attacks threaten SAP security: All alarmist nonsense?(A guide of the less serious sort.)
Let’s be honest right off the bat: There’s a lot of hype in the media about IT security in general and SAP security in special these days. But is there really anything behind it? Those headlines about millions of data records going missing always affect someone else – whether it’s Equifax across the pond or the big tech companies that have been infiltrated by organized groups of Chinese hackers. It’s all alarmist nonsense!

Continue reading