The most important elements of a Cybersecurity Strategy

SAST BLOG: The Most Important Elements of a Cybersecurity StrategyToday, cyberattacks on companies can easily cause damage in eight or even nine figures. Such attacks often take the form of spam e-mail, written with perfect spelling and grammar, that appears to have been sent by a colleague or a friend. The recipient is usually instructed to click a link or enter a password. And then it’s already too late: The malware spreads throughout the company. With the right cybersecurity strategy, on the other hand, you are well prepared.

Continue reading

Detect and Eliminate Vulnerabilities in SAP Systems – Thanks to Security Audit and RFC Interface Analysis

SAST System Security ValidationSAP systems require special attention when it comes to their security and this is no longer news to anyone. More often than not, the ERP systems supplied from Walldorf in Baden-Württemberg store some of the most crucial and sensitive company data. That said, what is the best approach to achieving the optimum level of security? A security audit would fit the bill!

Continue reading

Managed Service: The Booster for your SAP Security & Compliance

SAST MANAGED SERVICESChecking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only reliable way to ensure SAP system security. Dedicated efforts to safeguard SAP environments, however, are both technically complex and contingent upon having a great deal of time and personnel. That’s why a managed service presents an attractive alternative.

Gunar Funke, head of SAP Manages Services SAST SOLUTIONS at AKQUINET, recently sat down with us to talk about why a managed service solution makes particular sense in the context of SAP security and what’s involved with regard to SAST SUITE.

Continue reading

SAP Security and Hosting: Hacking 40 SAP Systems in One Fell Swoop

SAP Security and HostingIn spite of the hype surrounding the cloud, the on-premise model in which customers run their own SAP software is still the norm. However, that doesn’t rule out a service provider handling part of the operations; indeed, hosting is a widely used model, particularly among SMEs. While the roles at hand are usually clearly assigned in a hosting model like this, the same unfortunately doesn’t always apply to SAP system security.

Continue reading

One step at a time: How to secure and harden your SAP Gateway

SAST SUITE: INTERFACE MANAGEMENTThe Gateway is a central communication component of an SAP system. As such, it is an attractive target for hacker attacks – and should receive corresponding protections. If the Gateway protections fall short, hacking it becomes child’s play. Despite this, system interfaces are often left out when securing IT systems. Should a cyberattack occur, this will give the perpetrators direct access to your sensitive SAP systems.

Continue reading

Awarded as “Top 10 Cyber Security Company in Europe”

Top10 CyberSecurity Companies Europe 2018

In cooperation with Enterprise Security Magazine, a distinguished panel of experts, professionals, and technology leaders has selected AKQUINET and their SAST SOLUTIONS into the list of the “Top 10 Cyber Security Companies in Europe”.

In the cover story of the magazine , Ralf Kempf (Technical Managing Director) reports what makes SAST SOLUTIONS special and why the topic of cyber security for SAP systems is up-to-date and will remain in future. Read the November edition of Enterprise Security Magazine now.