Application security: SAST SOLUTIONS is now a global player with the Pathlock Group

SAST Blog: Application security: SAST SOLUTIONS is now a global player with the Pathlock GroupSAST SOLUTIONS, your Hamburg-based specialist for SAP Security and Access Governance, is now part of the new Pathlock Group, a one-of-a-kind alliance of international providers of access governance and application security solutions. The alliance’s objective is to lift the understanding and scope of end-to-end security to a new level. Our CEO Bodo Kahl and CTO Ralf Kempf talk about the perspectives that will be opening up to SAST SOLUTIONS and its customers.

Continue reading

SAP patch day: How an identified vulnerability paves the way for a patch

SAST Blog Security-AlertEvery month, SAP publishes a collection of new and updated SAP Notes involving vulnerabilities in the SAP software on patch day. It’s a key date in the calendar for everyone concerned about security and the subsequent system patching is often very work-intensive and time-consuming. But where do the reports come from and how does SAP find out about them? Does the software vendor intentionally search for vulnerabilities to correct?

Continue reading

Business partners and the sneaky back door of the F4 search help: How to protect your sensitive data

SAST Blog: Business partners and the sneaky back door of the F4 search help: How to protect your sensitive dataSAP offers a consolidated data object, the business partner, to simplify the management of sensitive master data for customers, suppliers, and employees. This simplification also poses dangers, however. Therefore, all companies that plan to migrate to SAP S/4HANA should familiarize themselves with the business partner concept ahead of time.

Continue reading

Interview with Ralf Kempf about winning the “Top Identity and Access Management Solution Provider in Europe 2021” award

SAST Blog: Award win: Top IAM Solution Provider in Europe 2021.Last year came to a very pleasant end, as we won the award for “Top Identity and Access Management Solution Provider in Europe 2021”. The December issue of Enterprise Security Magazine reported extensively on our IAM solution and about the innovative features that make our software so unique. We interviewed Mr. Kempf to find out more about the software solution and the current technology trends.

Continue reading

SAP February patch day: Highly critical vulnerability in core component threatens central SAP products (key word: ICMAD) – act immediately!

SAST Blog: Act immediately to remedy the Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Knowledge Management!A major security vulnerability, which has been assigned a top severity rating, threatens SAP ERP 6.0, S/4HANA, NetWeaver, and Web Dispatcher, among others. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has issued an alert warning of potential attacks on SAP products. Patch your SAP systems IMMEDIATELY!

Continue reading

SAST SOLUTIONS receives the award “Top Identity and Access Management Solution Provider in Europe 2021”

SAST Blog: Award win: Top IAM Solution Provider in Europe 2021.The december issue of Enterprise Security Magazine focuses on IAM solution providers in Europe. It aims to identify the emerging players in the IAM space and showcase their expertise in solving impediments and overcoming market complexities. We are delighted to have won with the topic “Real-Time Identity and Access Management for SAP Systems” the award for “Top IAM Solution Provider in Europe 2021” in this context!

Continue reading

SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems

SAST Blog: SAP Cyber Security: Five questions and answers about effectively monitoring SAP systemsDo companies need a comprehensive security strategy for their SAP systems? The objective should be the integration into the bigger picture. Due to the lack of structures for overall security, however, security measures on a smaller scale are frequently omitted. It is therefore necessary to optimize internal control systems and – particularly for securing SAP systems – and to establish comprehensive monitoring. Learn more open the interplay of point in time and time frame of the security monitoring.

Continue reading

Rectify your top findings before the external auditors arrive!

Rectify your top findings before the external auditors arrive!Once a year, as every SAP administrator and security manager knows, the annual external audit is a given. Despite this, the current risk situation of the SAP systems is often uncertain. Have all the vulnerabilities from the last audit really been taken care of? Have new risks arisen in the meantime? If you don’t take active countermeasures, you might end up in the same situation again and again.

Continue reading