{"id":1380,"date":"2020-09-23T10:45:04","date_gmt":"2020-09-23T08:45:04","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1380"},"modified":"2020-09-23T10:45:04","modified_gmt":"2020-09-23T08:45:04","slug":"sap-security-rest-easy-with-a-threat-intelligence-solution","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/","title":{"rendered":"SAP security: Rest easy with a threat intelligence solution"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1381 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit-300x168.png\" alt=\"SAST Blog: SAP security: Rest easy with a threat intelligence solution\" width=\"300\" height=\"168\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit-300x168.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit-768x429.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The transition of the business world to SAP S\/4HANA is picking up speed: that\u2019s why every company should start preparing an end-to-end migration strategy for the new SAP system. It is essential that this strategy consider security aspects, as well, to avoid ending up sitting on millions in subsequent costs. The solution is Threat Intelligence.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>\u201cSignificant unplanned costs can be incurred very quickly \u2013 firstly due to expensive follow-on measures when new vulnerabilities arise due to the migration or existing vulnerabilities that remained open, and secondly by a failure to clean up the source code during the migration process,\u201d reports Ralf Kempf (CTO SAST SOLUTIONS).<\/p>\n<p>We\u2019ve identified the recent increase in cyberattack threat levels as a particular challenge. Faced with increasing system complexity, constant internal and external threats, and the pending changeover to SAP S\/4HANA, companies have to pay special attention to SAP security in the current situation.<\/p>\n<p>With a comprehensive security solution like the <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a>, you can provide end-to-end coverage with real-time monitoring, to counter these current trends. \u201cOur security audits show that every system is vulnerable,\u201d explains Ralf Kempf. \u201cBut our strategy, a two-prong approach of consulting and software, can significantly reduce the probability of successful attacks \u2013 that means you\u2019re making yourself a more time-consuming attack target, and if someone tries anyway, you can detect critical situations immediately and react without delay.\u201d<\/p>\n<h2><strong>How can companies confront the new threat level?<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1383 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Threat-Detection-300x169.jpg\" alt=\"SAST Blog: SAP security: Rest easy with a threat intelligence solution\" width=\"300\" height=\"169\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Threat-Detection-300x169.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Threat-Detection-768x432.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Threat-Detection.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>We recommend a targeted approach, specifically one involving threat intelligence software with an early-warning system like the SAST SUITE. And to apply it end-to-end as part of a migration to SAP S\/4HANA, we recommend an incremental procedure.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Threat detection in five steps: From identify to recover<\/strong><\/h2>\n<p><strong>1. Identify<\/strong><\/p>\n<ul>\n<li>Identify vulnerabilities before the changeover to SAP S\/4HANA<\/li>\n<li>Clear assignment of responsibilities<\/li>\n<li>Preparation and documentation of risk management<\/li>\n<li>An audit automation solution like the <strong>SAST SUITE<\/strong> to enable fast, qualified decisions<\/li>\n<\/ul>\n<p><strong>2. Protect<\/strong><\/p>\n<ul>\n<li>Protect the systems<\/li>\n<li>System hardening in general and awareness training for employees<\/li>\n<li>The <strong>SAST SUITE<\/strong> serves as an additional tool to analyze and identify vulnerabilities at all levels and across all systems at the touch of a button<\/li>\n<\/ul>\n<p><strong>3. Detect<\/strong><\/p>\n<ul>\n<li>Detect anomalies and attacks<\/li>\n<li>Continuous security management<\/li>\n<li>The <strong>SAST SUITE<\/strong> monitors the system constantly, analyzes log sources, detects threats by applying the matching patterns, and provides real-time notification<\/li>\n<\/ul>\n<p><strong>4. Respond<\/strong><\/p>\n<ul>\n<li>Security Response, the answer to all threats to SAP systems<\/li>\n<li>Definition of responsibilities and reporting channels<\/li>\n<li>Execution of continuous analyses, to implement risk mitigation measures<\/li>\n<li>The <strong>SAST SUITE <\/strong>supports you here by recommending specific actions to remedy critical situation<\/li>\n<\/ul>\n<p><strong>5. Recover<\/strong><\/p>\n<ul>\n<li>Recovery plan<\/li>\n<li>Learn from critical situations, implement improvements in the systems, and hone the communication and reporting channels<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1382\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Grafik_Threat-Detection-Vorgehensweise-1024x457.jpg\" alt=\"SAST Blog: SAP security: Rest easy with a threat intelligence solution\" width=\"764\" height=\"341\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Grafik_Threat-Detection-Vorgehensweise-1024x457.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Grafik_Threat-Detection-Vorgehensweise-300x134.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Grafik_Threat-Detection-Vorgehensweise-768x343.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Grafik_Threat-Detection-Vorgehensweise.jpg 1287w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p>If you\u2019d like to find out more about our threat intelligence solutions, follow our partner presentation \u201c<strong>SAP Threat Intelligence: Optimal protection against cyberattacks.\u201d <\/strong>at the <a href=\"https:\/\/dsaglive.plazz.net\" target=\"_blank\" rel=\"noopener noreferrer\">DSAGLIVE event<\/a> on October 14, 2020, or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">simply write us<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg\" alt=\"Rald Kempf, CTO SAST SOLUTIONS\" width=\"300\" height=\"210\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\nRalf Kempf (CTO SAST SOLUTIONS)<\/p>\n<p>&nbsp;<\/p>\n<h2>Further posts on the topic:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/01\/07\/sap-s-4hana-how-to-ensure-a-secure-s-4hana-migration\/\">SAP S\/4HANA: How to ensure a secure S\/4HANA migration<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/11\/21\/important-elements-of-a-cybersecurity-strategy\/\">The most important elements of a cybersecurity strategy<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The transition of the business world to SAP S\/4HANA is picking up speed: that\u2019s why every company should start preparing an end-to-end migration strategy for the new SAP system. It is essential that this strategy consider security aspects, as well, to avoid ending up sitting on millions in subsequent costs. The solution is Threat Intelligence.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,156,58,163,114],"class_list":["post-1380","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-cyber-security","tag-real-time-monitoring","tag-s4hana-migration","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to rest easy with a threat intelligence solution - SAP security<\/title>\n<meta name=\"description\" content=\"Start now and prepare for the new SAP S\/4HANA system with a end-to-end migration strategy. We help you with our Threat Intelligence solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to rest easy with a threat intelligence solution - SAP security\" \/>\n<meta property=\"og:description\" content=\"Start now and prepare for the new SAP S\/4HANA system with a end-to-end migration strategy. We help you with our Threat Intelligence solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-23T08:45:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"559\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to rest easy with a threat intelligence solution - SAP security\" \/>\n<meta name=\"twitter:description\" content=\"Start now and prepare for the new SAP S\/4HANA system with a end-to-end migration strategy. We help you with our Threat Intelligence solutions.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAP security: Rest easy with a threat intelligence solution\",\"datePublished\":\"2020-09-23T08:45:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/\"},\"wordCount\":521,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Motiv_SAST-Relax-Sicherheit-300x168.png\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Real-time monitoring\",\"S\\\/4HANA Migration\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/\",\"name\":\"How to rest easy with a threat intelligence solution - SAP security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Motiv_SAST-Relax-Sicherheit-300x168.png\",\"datePublished\":\"2020-09-23T08:45:04+00:00\",\"description\":\"Start now and prepare for the new SAP S\\\/4HANA system with a end-to-end migration strategy. We help you with our Threat Intelligence solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Motiv_SAST-Relax-Sicherheit-300x168.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Motiv_SAST-Relax-Sicherheit-300x168.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/23\\\/sap-security-rest-easy-with-a-threat-intelligence-solution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP security: Rest easy with a threat intelligence solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to rest easy with a threat intelligence solution - SAP security","description":"Start now and prepare for the new SAP S\/4HANA system with a end-to-end migration strategy. We help you with our Threat Intelligence solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/","og_locale":"en_US","og_type":"article","og_title":"How to rest easy with a threat intelligence solution - SAP security","og_description":"Start now and prepare for the new SAP S\/4HANA system with a end-to-end migration strategy. We help you with our Threat Intelligence solutions.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/","og_site_name":"SAST BLOG","article_published_time":"2020-09-23T08:45:04+00:00","og_image":[{"width":1000,"height":559,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit.png","type":"image\/png"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"How to rest easy with a threat intelligence solution - SAP security","twitter_description":"Start now and prepare for the new SAP S\/4HANA system with a end-to-end migration strategy. We help you with our Threat Intelligence solutions.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit.png","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAP security: Rest easy with a threat intelligence solution","datePublished":"2020-09-23T08:45:04+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/"},"wordCount":521,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit-300x168.png","keywords":["Cyber Attack","Cyber Security","Real-time monitoring","S\/4HANA Migration","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/","name":"How to rest easy with a threat intelligence solution - SAP security","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit-300x168.png","datePublished":"2020-09-23T08:45:04+00:00","description":"Start now and prepare for the new SAP S\/4HANA system with a end-to-end migration strategy. We help you with our Threat Intelligence solutions.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit-300x168.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Relax-Sicherheit-300x168.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAP security: Rest easy with a threat intelligence solution"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1380"}],"version-history":[{"count":5,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1380\/revisions"}],"predecessor-version":[{"id":1388,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1380\/revisions\/1388"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}