{"id":1406,"date":"2020-10-06T09:30:25","date_gmt":"2020-10-06T07:30:25","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1406"},"modified":"2020-10-06T09:31:43","modified_gmt":"2020-10-06T07:31:43","slug":"interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/","title":{"rendered":"Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1407 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto-300x200.jpg\" alt=\"SAST Blog: Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Ralf Kempf, CTO SAST SOLUTIONS, and his team have already guided many enterprises through their migration to SAP S\/4HANA. He talked about his recipes for success in an interview with Ulrich Parthier, publisher of it management magazine.<\/p>\n<p>Excerpts from the interview are provided below.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Ulrich Parthier: The crucial question when it comes to changing over to SAP S\/4HANA is how can you manage the transition? Should I start the implementation from scratch or can I migrate existing processes?<\/strong><\/em><\/p>\n<p><strong>Ralf Kempf:<\/strong> The ideal method for a given enterprise is always an individual consideration. Does it make the most sense to trim all the accumulated \u201cprocess fat\u201d and start over in a greenfield approach? Or is your highest priority to minimize costs, so you choose a brownfield approach instead? And, of course, there is the middle ground: the selective data approach, which enables you to migrate good processes and redesign obsolete ones.<\/p>\n<p>All of these approaches have one thing in common: all too often, we see that the persons responsible aren\u2019t really aware of the challenges they face at the start of a project. This not only costs time later, but also frequently incurs significant additional costs.<\/p>\n<p><em><strong>Ulrich Parthier: The area of security is a real Sword of Damocles. How can a good strategy help you avoid security vulnerabilities in SAP S\/4HANA?<\/strong><\/em><\/p>\n<p><strong>Ralf Kempf:<\/strong> It\u2019s a fact that nearly half of the enterprises that plan a migration to SAP S\/4HANA neglect to safeguard the new systems. But ignoring security aspects can result in significant economic harm, despite the fact that a migration project also gives you the opportunity to take your SAP IT migration to a new level, with a cleanly designed, holistically planned security and compliance strategy for safeguarding the IT systems.<\/p>\n<p><em><strong>Ulrich Parthier: In your experience, what are other common mistakes made on migration projects to SAP S\/4HANA?<\/strong><\/em><\/p>\n<p><strong>Ralf Kempf:<\/strong> One frequent misconception is that Fiori \u2013 the new user interface with SAP apps \u2013 is a solution for nearly everything. But Fiori isn\u2019t even comprehensive on SAP\u2019s side yet; many processes aren\u2019t supported. That\u2019s why we recommend only using Fiori where it truly adds value and simplifies things.<\/p>\n<p>Another mistake that we unfortunately encounter all too often are \u201clegacy burdens\u201d that are essentially migrated to the new system inadvertently \u2013 the source code is a specific example here. Instead of analyzing things beforehand to determine what they really need, they simply copy everything on a 1:1 basis. The consequence: All the vulnerabilities are transferred as well, along with source code that is no longer even used, yet still opens up popular back doors for cybercriminals. The costs of such negligence can reach the millions.<\/p>\n<p>Damage like this is absolutely avoidable by devising an end-to-end strategy for SAP S\/4HANA security from the start.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1408\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/10\/itmanagement_Cover-211x300.jpg\" alt=\"SAST Blog: Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA\" width=\"211\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/10\/itmanagement_Cover-211x300.jpg 211w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/10\/itmanagement_Cover.jpg 452w\" sizes=\"auto, (max-width: 211px) 100vw, 211px\" \/><br \/>\nRead the full interview online (in German) in the October 2020 issue of <a href=\"https:\/\/www.it-daily.net\/leser-service\" target=\"_blank\" rel=\"noopener noreferrer\">it management<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Also interesting for you:<\/h2>\n<div><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/02\/06\/sap-s-4hana-authorizations-choice-brownfield-or-greenfield\/\">SAP S\/4HANA authorizations \u2013 it\u2019s your choice: brownfield or greenfield<\/a><\/div>\n<div><\/div>\n<div><\/div>\n<div><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/01\/07\/sap-s-4hana-how-to-ensure-a-secure-s-4hana-migration\/\">SAP S\/4HANA: How to ensure a secure S\/4HANA migration<\/a><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ralf Kempf, CTO SAST SOLUTIONS, and his team have already guided many enterprises through their migration to SAP S\/4HANA. He talked about his recipes for success in an interview with Ulrich Parthier, publisher of it management magazine. Excerpts from the interview are provided below.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[153,163,80,114,117],"class_list":["post-1406","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-s-4hana","tag-s4hana-migration","tag-sap-security","tag-threat-detection","tag-vulnerability-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA<\/title>\n<meta name=\"description\" content=\"SAP security: How to changing over to SAP S\/4HANA and how can a good strategy help you avoid security vulnerabilities in SAP S\/4HANA. Read more about it!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA\" \/>\n<meta property=\"og:description\" content=\"SAP security: How to changing over to SAP S\/4HANA and how can a good strategy help you avoid security vulnerabilities in SAP S\/4HANA. Read more about it!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-06T07:30:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-06T07:31:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA\" \/>\n<meta name=\"twitter:description\" content=\"SAP security: How to changing over to SAP S\/4HANA and how can a good strategy help you avoid security vulnerabilities in SAP S\/4HANA. Read more about it!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Interview with Ralf Kempf: Secure transformation to SAP S\\\/4HANA\",\"datePublished\":\"2020-10-06T07:30:25+00:00\",\"dateModified\":\"2020-10-06T07:31:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/\"},\"wordCount\":525,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/RalfKempf_Coverfoto-300x200.jpg\",\"keywords\":[\"S\\\/4HANA\",\"S\\\/4HANA Migration\",\"SAP Security\",\"Threat Detection\",\"Vulnerability Assessment\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/\",\"name\":\"Interview with Ralf Kempf: Secure transformation to SAP S\\\/4HANA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/RalfKempf_Coverfoto-300x200.jpg\",\"datePublished\":\"2020-10-06T07:30:25+00:00\",\"dateModified\":\"2020-10-06T07:31:43+00:00\",\"description\":\"SAP security: How to changing over to SAP S\\\/4HANA and how can a good strategy help you avoid security vulnerabilities in SAP S\\\/4HANA. Read more about it!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/RalfKempf_Coverfoto-300x200.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/RalfKempf_Coverfoto-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/10\\\/06\\\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interview with Ralf Kempf: Secure transformation to SAP S\\\/4HANA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA","description":"SAP security: How to changing over to SAP S\/4HANA and how can a good strategy help you avoid security vulnerabilities in SAP S\/4HANA. Read more about it!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/","og_locale":"en_US","og_type":"article","og_title":"Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA","og_description":"SAP security: How to changing over to SAP S\/4HANA and how can a good strategy help you avoid security vulnerabilities in SAP S\/4HANA. Read more about it!","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/","og_site_name":"SAST BLOG","article_published_time":"2020-10-06T07:30:25+00:00","article_modified_time":"2020-10-06T07:31:43+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA","twitter_description":"SAP security: How to changing over to SAP S\/4HANA and how can a good strategy help you avoid security vulnerabilities in SAP S\/4HANA. Read more about it!","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA","datePublished":"2020-10-06T07:30:25+00:00","dateModified":"2020-10-06T07:31:43+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/"},"wordCount":525,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto-300x200.jpg","keywords":["S\/4HANA","S\/4HANA Migration","SAP Security","Threat Detection","Vulnerability Assessment"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/","name":"Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto-300x200.jpg","datePublished":"2020-10-06T07:30:25+00:00","dateModified":"2020-10-06T07:31:43+00:00","description":"SAP security: How to changing over to SAP S\/4HANA and how can a good strategy help you avoid security vulnerabilities in SAP S\/4HANA. Read more about it!","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto-300x200.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/10\/RalfKempf_Coverfoto-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/10\/06\/interview-with-ralf-kempf-secure-transformation-to-sap-s-4hana\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Interview with Ralf Kempf: Secure transformation to SAP S\/4HANA"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1406"}],"version-history":[{"count":11,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1406\/revisions"}],"predecessor-version":[{"id":1419,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1406\/revisions\/1419"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}