Takeda’s twin objectives were to accelerate and simplify its authorization assignment process while deploying a tool that was simultaneously capable of providing vulnerability monitoring for its SAP backend worldwide. Continue reading
Threat Detection
WITH HEADER LINE – it’s not simply obsolete; it’s a risk.
The addition “WITH HEADER LINE” has technically been unnecessary going back several SAP versions now. This is because the statement declares both internal tables and an additional data object – the header line.
There are a large number of notes that spread awareness that the use of this statement causes various content problems. Among other things, the use of the same name means that it is not immediately apparent as to whether you are working on a table or a header line.
However, what the notes typically do not warn you about is that this kind of programming goes hand in hand with security problems for your SAP systems.
Do Security Notes Live Up to Their Name?
On every second Tuesday of each month, SAP releases new Security Notes. Many SAP administrators install these patches relatively quickly – but are they putting too much faith in the security they provide?
Very few customers know that security gaps can still be exploited.
What does the new SAST Suite 5.0 offer?
GRC tools, IT vulnerability analysis, authorization management, SIEM management – these are four of the top five topics cited by IT decision-makers when asked which current and future technologies are of vital importance to them. *
This means that the new release of GRC Suite SAST from AKQUINET – couldn’t have arrived at a better time to offer answers on some of the subjects that are on the minds of these managers right now. In this interview, Lars Henning (product manager for the SAST SUITE) presents the highlights of the latest version, along with some helpful tips.
SAP Security and Compliance – make or buy? It’s your choise!
The topic of IT security is ranked # 1 in market trends *. However, securing complex IT landscapes effectively is a big challenge for many companies: there is often a lack of trained IT staff and even more of the necessary security know-how.
Gunar Funke, Head of Services SAP Security at AKQUINET, describes his experiences and presents possible solutions.
Favored target for cyber attacks: SAP archive systems.
Checklist to secure your SAP systems.
Do you know at any time who accesses the sensitive data of your SAP archive servers? In our penetration tests we experiencing it again and again: attacks on SAP archive systems are mostly successful, not recognized and therefore not logged and reported.
Minol prevent unwanted downloads with SAST
Minol stored millions of sensitive information of private and business customers in its complex SAP system landscape. Therefore it was important for Minol to prevent unrequested downloads and to protect the data from possible data theft.
Do you still rely on “Inspector Chance” when identifying cyberattacks?
SAP protection in real-time with the SAST SECURITY RADAR.
We show you how easy it is to respond in an emergency with the AKQUINET SAST SECURITY RADAR. In the area of corporate crime, more and more companies are coming to realize they still have work to do when it comes to prevention and response.
Unprotected interfaces are attractive Targets for attackers.
Analyze the RFC interfaces of your SAP Systems.
SAP interfaces are often not considered when SAP systems are protected. Therefore, they remain unprotected and provide attractive targets for attackers.
Experience from numerous SAP security audits and penetration tests for SAP systems shows repeatedly that, in almost every SAP system checked, unprotected interfaces exist that could allow attackers direct access to your SAP Systems.
SAST SECURITY RADAR scores to marks again in the IT Innovation prize 2016.
The SAST solution convinces and receive the “BEST OF” Award.
“Initiative Mittelstand” Awards the IT innovations prize to companies with innovative IT solutions an a high usage value für small an mid-sized companies. AKQUINET also appeared under the critial eyes of the Jury one more and was rewarded again. Of all applications received, AKQUINET’s security solution was particularly convincing, and is therefore in the top group once again.