{"id":1592,"date":"2021-03-11T13:52:00","date_gmt":"2021-03-11T12:52:00","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1592"},"modified":"2021-04-06T14:43:44","modified_gmt":"2021-04-06T12:43:44","slug":"security-dashboards-just-buzzword-or-true-help-with-daily-security-routine","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/","title":{"rendered":"Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-964 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg\" alt=\"Expert talk of IT-Onlinemagazin with SAST\" width=\"267\" height=\"200\" \/>Companies that use SAP software, as well as the German-speaking SAP User Group (DSAG), are demanding security dashboards to provide for greater transparency and indicate necessary activities. The most critical risks, however, are those that arise as a combination of other events, which are not critical in and of themselves. After all, even the best dashboards aren\u2019t able to display this kind of unidentified security incident.<\/p>\n<p><!--more--><\/p>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<p><strong><em>The following interview between Helge Sanden (Editor in Chief of IT-Onlinemagazin) and Ralf Kempf (CTO SAST SOLUTIONS) was published in<\/em> <a href=\"https:\/\/it-onlinemagazin.de\/sap-security-dashboards-buzzword-oder-hilfe-im-alltag\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>IT-Onlinemagazin<\/em><\/a><\/strong> <strong><em>on March 2, 2021 (in German).<\/em><\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>Mr. Kempf, what trends have you observed regarding vulnerabilities that can be exploited to attack SAP systems?<\/strong><\/h2>\n<p>The much more interesting thing is that the major vulnerabilities of SAP systems have remained unchanged for years, but many companies haven\u2019t fixed them yet. There\u2019s incorrect system configuration, for one thing, which leaves too many loopholes for attackers to exploit. Then there\u2019s the abuse of user roles and authorizations, and the third factor is unintended behavior by users in the system that results in internal security incidents.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1594\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/Security-Keyfacts_Grafik_en.png\" alt=\"SAST Blog: Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?\" width=\"530\" height=\"511\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/Security-Keyfacts_Grafik_en.png 302w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/Security-Keyfacts_Grafik_en-300x289.png 300w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/p>\n<h2><strong>What misconceptions about this do you see at companies?<\/strong><\/h2>\n<p>Investments that companies successfully make in authorization and user management are often put at risk by the careless handling of the most fundamental security measures. In other words, companies have frequently made strides in authentication, user management, and authorizations, but they neglect two other crucial elements for comprehensive protection: The first is protecting the IT systems and the infrastructure itself; the second is a company-wide consolidation of all security settings through analyses and reports.<\/p>\n<p>Many companies are still particularly undecided when it comes to implementing modern security dashboards for SAP landscapes. A popular cause of this seems to be apprehension about the effort needed, which contrasts with the decision-makers\u2019 desire to achieve the greatest possible transparency and have an end-to-end overview in real time. But given the high efficiency of a security dashboard, these reservations are unwise and \u2013 in light of current threat levels \u2013 even dangerous. Using them delivers benefits for both effective real-time monitoring and the conservation of valuable internal IT resources.<\/p>\n<p>And to continue to meet the challenges posed by the increasingly complex requirements of SAP security, dashboards are simply essential for a transparent overview. No company that runs SAP systems should miss out on these benefits because its nature as standard software means that the requirements for security, transparency, and monitoring are ultimately identical for everyone.<\/p>\n<h2><strong>How can the detection rate for critical attacks be increased?<\/strong><\/h2>\n<p>\u201cDashboard\u201d has become a trendy buzzword in the interim and is often used far and wide to describe even products that merely combine static monitoring with a graphical user interface for the application. Products like this can hardly be adjusted or fine-tuned, however, even though the strength of a true end-to-end security dashboard is its very ability to adapt to unforeseen developments such as the current threat level.<\/p>\n<p>A true security dashboard visualizes the information reflecting the diversity of the different systems and responsibilities for specific user groups, enabling a top-down perspective of the security and compliance standard currently achieved \u2013 all in real time. In addition, the solution not only has to show where such problems exist, but also provide recommendations for eliminating them.<\/p>\n<p>Due to the particular complexity of the SAP systems in combination with the many internal company needs, the implementation of a security dashboard demands detailed knowledge of the internal processes and responsibilities of the persons responsible, including profound SAP security expertise. This is what is missing at many companies.<\/p>\n<h2><strong>What characterizes a good security dashboard?<\/strong><\/h2>\n<p>A security dashboard must make it possible to combine the data for each situation, regardless of its source, and to visualize reporting for the IT security department and for system owners.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1593\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg\" alt=\"SAST Blog: Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?\" width=\"996\" height=\"564\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg 996w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-300x170.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-768x435.jpg 768w\" sizes=\"auto, (max-width: 996px) 100vw, 996px\" \/><\/p>\n<p>System owners, in particular, need a simple overview with just two traffic lights at the top level: One for the \u201cconfiguration and authorizations\u201d area and the other for \u201cSIEM\/real-time monitoring\u201d. Through this approach, system owners know immediately where they have to take action and can retrieve details of the incidents and appropriate recommendations for action in real time.<\/p>\n<p>Some SAP customers have to monitor the results of around 2,000 individual check processes from 300 SAP systems daily in practice to identify vulnerabilities caused by critical configurations and conspicuous user behavior. The only way to do this easily and in real time is with a security dashboard that lets you navigate through different levels, down to the details of a specific alert message.<\/p>\n<h2><strong>Are there typical early warning signs of an attempted attack?<\/strong><\/h2>\n<p>There aren\u2019t any really \u201ctypical\u201d early warning indicators, because the vulnerabilities and attack vectors are simply too diverse \u2013 and also change constantly.<\/p>\n<p>But there are warning signals, of course, which too many companies unfortunately ignore. Negative results from a security audit come to mind, for example. It\u2019s almost alarming how many companies are aware of certain vulnerabilities but have not eliminated them yet. Such findings often lie hidden in desk drawers. We lack a healthy culture of learning from our mistakes, where the only relevant points are creating transparency and bringing errors to light, and not concentrating on the misconduct of employees \u2013 which might not even be intentional.<\/p>\n<p>Therefore, one of our most important recommendations always says, react immediately, assess vulnerabilities based on their criticality, and don\u2019t procrastinate when it comes to correcting them. After all, time is the decisive factor when a relevant attack occurs.<\/p>\n<h2><strong>What can you do if you identify an attack in progress?<\/strong><\/h2>\n<p>Here, as well, there\u2019s no patent remedy that cures all ills, because the best reaction is highly dependent on the respective attempted attack. But what all responses have in common is that they require a clearly organized risk management structure at the company, with defined processes on how to proceed through risk scenarios. The procedure models from ISO2700x, BSI, or NIST can help here, for example.<\/p>\n<h2><strong>What will you be talking about at the IT online conference 2021?<\/strong><\/h2>\n<p>In the <a href=\"https:\/\/register.gotowebinar.com\/register\/4922126942178656784\">SAST Expert Talk<\/a>, Andreas Feistl from Linde will provide insights into his company\u2019s SAP security strategy and show how integrating the <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a> in their SIEM monitoring enables them to detect critical and complex SAP security incidents in real time.<\/p>\n<p>In addition, we\u2019ll talk about our day-to-day practices, for example, the requirements of a security information center and how dashboards can help to round out the continuous monitoring of SAP systems. After all, the important thing is to detect and assess incidents as quickly as possible, to introduce counter-measures with the least possible delay.<\/p>\n<h2><strong>What do you expect the dominating topic in SAP security to be in 2021?<\/strong><\/h2>\n<p>It\u2019s quite noticeable that people are increasingly asking us about cloud computing. My tip: Do not save sensitive data outside your own area of control. Accordingly, companies should implement security solutions and dashboards on premise, and preferably not in the cloud.<\/p>\n<h2><strong>Thank you for the interview.<\/strong><\/h2>\n<p><em>Helge Sanden, Editor in Chief of IT-Onlinemagazin, asked the questions.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-33\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg\" alt=\"Rald Kempf, CTO SAST SOLUTIONS\" width=\"300\" height=\"210\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Ralf Kempf <\/strong><strong>(CTO SAST SOLUTIONS)<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-788\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458-300x200.jpg\" alt=\"Helge Sanden IT-Onlinemagazin\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458-768x512.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/02\/Helge-Sanden-IT-Onlinemagazin-6458.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Helge Sanden <\/strong><strong>(Editor in Chief of IT-Onlinemagazin)<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>More articles about real-time monitoring:<\/strong><\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"y3zYT4UZmF\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/\">Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Don\u2019t lose track of the big picture \u2013 a security dashboard provides transparency for all your SAP systems&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/11\/05\/security-dashboard-provides-transparency-for-all-sap-systems\/embed\/#?secret=y3zYT4UZmF\" data-secret=\"y3zYT4UZmF\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"OwwjgEtAfF\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/\">SAP security: Rest easy with a threat intelligence solution<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;SAP security: Rest easy with a threat intelligence solution&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/embed\/#?secret=OwwjgEtAfF\" data-secret=\"OwwjgEtAfF\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies that use SAP software, as well as the German-speaking SAP User Group (DSAG), are demanding security dashboards to provide for greater transparency and indicate necessary activities. The most critical risks, however, are those that arise as a combination of other events, which are not critical in and of themselves. After all, even the best [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[156,58,170,114,117],"class_list":["post-1592","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-security","tag-real-time-monitoring","tag-security-monitoring","tag-threat-detection","tag-vulnerability-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are security dashboards a true help with the daily security routine?<\/title>\n<meta name=\"description\" content=\"Even the best security dashboards are hardly able to display undetected security incidents. We therefore offer real-time monitoring for your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are security dashboards a true help with the daily security routine?\" \/>\n<meta property=\"og:description\" content=\"Even the best security dashboards are hardly able to display undetected security incidents. We therefore offer real-time monitoring for your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-11T12:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-06T12:43:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"267\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Are security dashboards a true help with the daily security routine?\" \/>\n<meta name=\"twitter:description\" content=\"Even the best security dashboards are hardly able to display undetected security incidents. We therefore offer real-time monitoring for your SAP systems.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?\",\"datePublished\":\"2021-03-11T12:52:00+00:00\",\"dateModified\":\"2021-04-06T12:43:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/\"},\"wordCount\":1210,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"keywords\":[\"Cyber Security\",\"Real-time monitoring\",\"Security Monitoring\",\"Threat Detection\",\"Vulnerability Assessment\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/\",\"name\":\"Are security dashboards a true help with the daily security routine?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"datePublished\":\"2021-03-11T12:52:00+00:00\",\"dateModified\":\"2021-04-06T12:43:44+00:00\",\"description\":\"Even the best security dashboards are hardly able to display undetected security incidents. We therefore offer real-time monitoring for your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Expert-Talk_Logo_mitSAST_200px.jpg\",\"width\":267,\"height\":200,\"caption\":\"Expert talk of IT-Onlinemagazin with SAST\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/03\\\/11\\\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are security dashboards a true help with the daily security routine?","description":"Even the best security dashboards are hardly able to display undetected security incidents. We therefore offer real-time monitoring for your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/","og_locale":"en_US","og_type":"article","og_title":"Are security dashboards a true help with the daily security routine?","og_description":"Even the best security dashboards are hardly able to display undetected security incidents. We therefore offer real-time monitoring for your SAP systems.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/","og_site_name":"SAST BLOG","article_published_time":"2021-03-11T12:52:00+00:00","article_modified_time":"2021-04-06T12:43:44+00:00","og_image":[{"width":267,"height":200,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Are security dashboards a true help with the daily security routine?","twitter_description":"Even the best security dashboards are hardly able to display undetected security incidents. We therefore offer real-time monitoring for your SAP systems.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?","datePublished":"2021-03-11T12:52:00+00:00","dateModified":"2021-04-06T12:43:44+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/"},"wordCount":1210,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","keywords":["Cyber Security","Real-time monitoring","Security Monitoring","Threat Detection","Vulnerability Assessment"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/","name":"Are security dashboards a true help with the daily security routine?","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","datePublished":"2021-03-11T12:52:00+00:00","dateModified":"2021-04-06T12:43:44+00:00","description":"Even the best security dashboards are hardly able to display undetected security incidents. We therefore offer real-time monitoring for your SAP systems.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/01\/Expert-Talk_Logo_mitSAST_200px.jpg","width":267,"height":200,"caption":"Expert talk of IT-Onlinemagazin with SAST"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1592"}],"version-history":[{"count":11,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1592\/revisions"}],"predecessor-version":[{"id":1630,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1592\/revisions\/1630"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}