{"id":1477,"date":"2020-11-05T08:47:24","date_gmt":"2020-11-05T07:47:24","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1477"},"modified":"2020-11-05T11:19:44","modified_gmt":"2020-11-05T10:19:44","slug":"security-dashboard-provides-transparency-for-all-sap-systems","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/","title":{"rendered":"Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1478 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg\" alt=\"SAST Blog: Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems\" width=\"300\" height=\"199\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard-1024x681.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard-768x510.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard.jpg 1127w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The lack of SAP security management dashboards is discussed often by the Security &amp; Vulnerability Working Group at DSAG, the German-speaking SAP User Group. The Working Group sees such tools an essential prerequisite for developing and monitoring the improved security concepts that are urgently needed. Yet a majority of companies has yet to implement the dashboard technology although now would be a particularly good time to implement this efficient tool for mitigating attacks in light of the increasing threat level posed by malware and ransomware.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>It is difficult for a security company like ourselves to understand this reluctance, because there are many benefits to using a security dashboard \u2013 for both effective, real-time monitoring and conserving internal IT resources. In the early stages, IT managers often want to achieve the greatest possible transparency and end-to-end monitoring in real time. Due to the particular complexity of the SAP systems in combination with many internal company needs, the implementation of a security dashboard demands detailed knowledge of the internal processes and responsibilities. Internal expertise is often insufficient in these areas. As SAP security experts, we are the ideal partner to compensate for these deficits.<\/p>\n<h2><strong>Dashboard: a mere buzzword or a true help in meeting an enterprise\u2019s day-to-day security needs?<\/strong><\/h2>\n<p>We admit that the term \u201cdashboard\u201d is an overused buzzword. Many security tools that merely offer static monitoring in an attractive GUI call themselves \u201csecurity dashboards\u201d. The strength of a true security dashboard, however, is its ability to adapt to unforeseen developments, such as the current threat level.<\/p>\n<p>A good security dashboard visualizes the information reflecting the diversity of the different systems and responsibilities for specific user groups, indicating deviations and enabling a top-down perspective of the security and compliance standard currently achieved.<\/p>\n<p>Some SAP customers, for example, have to monitor the results of 2,000 individual check processes from 300 SAP systems daily in practice and identify both critical deviations in configuration and authorizations and potential attacks on the systems. The <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a> enables you to do all this simply and in real time. Its dashboard lets you navigate through the different levels down to the details of a specific alert notification.<\/p>\n<h2><strong>Enterprises have lofty expectations<\/strong><\/h2>\n<p>Enterprises need a security monitoring and analysis solution that gives them a high level of transparency with the lowest possible implementation effort. They expect a security dashboard to support forensic analyses as well. What\u2019s more, the solution not only has to show them where such problems exist, but also provide recommendations for eliminating them.<\/p>\n<h2><strong>Success factors: system flexibility and simplified display <\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1479 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/11\/Systemdarstellung_Sec.Dashboard-300x171.jpg\" alt=\"SAST Blog: Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems\" width=\"300\" height=\"171\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Systemdarstellung_Sec.Dashboard-300x171.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Systemdarstellung_Sec.Dashboard.jpg 756w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>A modern security dashboard should enable you to consolidate the data for a given situation, regardless of which area. In addition, the dashboards must provide reporting for both the IT security department and for the system owners. System owners, in particular, need a simple overview with just two status values at the top level: one for the \u201cconfiguration and authorizations\u201d area and the other for \u201cSIEM\/real-time monitoring\u201d. The system owners then know immediately where they need to take action and can get specific recommendations by clicking the area in question \u2013 all in real time.<\/p>\n<h2><strong>The results are impressive: real-time response to threats and conservation of internal resources<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1480 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/11\/Grafik_Sec-Dashboards_Funnel_en-300x259.jpg\" alt=\"SAST Blog: Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems\" width=\"300\" height=\"259\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Grafik_Sec-Dashboards_Funnel_en-300x259.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Grafik_Sec-Dashboards_Funnel_en.jpg 666w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>A security dashboard that has been tailored to your enterprise\u2019s specific needs delivers two decisive benefits in day-to-day use: firstly, the possibility to react to critical situations in real time, and secondly the conservation of internal resources. Practice shows that customers can monitor several hundred SAP systems with just a few employees, worldwide and in real time, when they use an effective dashboard like the one provided in the SAST SUITE.<\/p>\n<h2><strong>Benefits of a security dashboard for your SAP systems:<\/strong><\/h2>\n<ul>\n<li>High-quality information at the touch of a button<\/li>\n<li>Identification of vulnerabilities using an intuitive user interface<\/li>\n<li>Information on the causes of identified vulnerabilities<\/li>\n<li>Option to display all data \u2013 from aggregated risk key figures down to the detailed level<\/li>\n<li>Option to display trends over time<\/li>\n<li>Save IT department resources<\/li>\n<\/ul>\n<p>Would you like to find out more? Visit our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">just get in touch<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg\" alt=\"Rald Kempf, CTO SAST SOLUTIONS\" width=\"300\" height=\"210\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Ralf Kempf, CTO SAST SOLUTIONS<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More articles on the topic:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/06\/18\/monitoring-transactions-in-sap-systems\/\">The importance of reliably monitoring transactions in SAP systems<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/\">Rethinking real-time monitoring for IT security with the Internet of Things<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The lack of SAP security management dashboards is discussed often by the Security &amp; Vulnerability Working Group at DSAG, the German-speaking SAP User Group. The Working Group sees such tools an essential prerequisite for developing and monitoring the improved security concepts that are urgently needed. Yet a majority of companies has yet to implement the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,156,58,170,114],"class_list":["post-1477","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-cyber-security","tag-real-time-monitoring","tag-security-monitoring","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A security dashboard provides transparency for all SAP systems<\/title>\n<meta name=\"description\" content=\"A security dashboard is a very efficient tool for developing and monitoring the improved security concepts and for mitigating attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A security dashboard provides transparency for all SAP systems\" \/>\n<meta property=\"og:description\" content=\"Das Security-Dashboard ist ein sehr effizientes Tool, um Angriffe zu vermeiden, bessere Sicherheitskonzepte zu entwickeln und zu \u00fcberwachen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-05T07:47:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-05T10:19:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1127\" \/>\n\t<meta property=\"og:image:height\" content=\"749\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"A security dashboard provides transparency for all SAP systems\" \/>\n<meta name=\"twitter:description\" content=\"Das Security-Dashboard ist ein sehr effizientes Tool, um Angriffe zu vermeiden, bessere Sicherheitskonzepte zu entwickeln und zu \u00fcberwachen.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems\",\"datePublished\":\"2020-11-05T07:47:24+00:00\",\"dateModified\":\"2020-11-05T10:19:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/\"},\"wordCount\":728,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Real-time monitoring\",\"Security Monitoring\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/\",\"name\":\"A security dashboard provides transparency for all SAP systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg\",\"datePublished\":\"2020-11-05T07:47:24+00:00\",\"dateModified\":\"2020-11-05T10:19:44+00:00\",\"description\":\"A security dashboard is a very efficient tool for developing and monitoring the improved security concepts and for mitigating attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/11\\\/05\\\/security-dashboard-provides-transparency-for-all-sap-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A security dashboard provides transparency for all SAP systems","description":"A security dashboard is a very efficient tool for developing and monitoring the improved security concepts and for mitigating attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/","og_locale":"en_US","og_type":"article","og_title":"A security dashboard provides transparency for all SAP systems","og_description":"Das Security-Dashboard ist ein sehr effizientes Tool, um Angriffe zu vermeiden, bessere Sicherheitskonzepte zu entwickeln und zu \u00fcberwachen.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/","og_site_name":"SAST BLOG","article_published_time":"2020-11-05T07:47:24+00:00","article_modified_time":"2020-11-05T10:19:44+00:00","og_image":[{"width":1127,"height":749,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"A security dashboard provides transparency for all SAP systems","twitter_description":"Das Security-Dashboard ist ein sehr effizientes Tool, um Angriffe zu vermeiden, bessere Sicherheitskonzepte zu entwickeln und zu \u00fcberwachen.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems","datePublished":"2020-11-05T07:47:24+00:00","dateModified":"2020-11-05T10:19:44+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/"},"wordCount":728,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg","keywords":["Cyber Attack","Cyber Security","Real-time monitoring","Security Monitoring","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/","name":"A security dashboard provides transparency for all SAP systems","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg","datePublished":"2020-11-05T07:47:24+00:00","dateModified":"2020-11-05T10:19:44+00:00","description":"A security dashboard is a very efficient tool for developing and monitoring the improved security concepts and for mitigating attacks.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/11\/Motiv_SAST-Fernglas_Sec-Dashboard-300x199.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1477"}],"version-history":[{"count":5,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1477\/revisions"}],"predecessor-version":[{"id":1485,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1477\/revisions\/1485"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}