{"id":1753,"date":"2021-10-15T08:42:41","date_gmt":"2021-10-15T06:42:41","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1753"},"modified":"2021-10-15T08:42:41","modified_gmt":"2021-10-15T06:42:41","slug":"full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/","title":{"rendered":"Full transparency thanks to security dashboard &#8211; how D\u00dcRR IT Service GmbH protects its SAP systems in real time"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1593 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-300x170.jpg\" alt=\"SAST Blog: Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?\" width=\"300\" height=\"170\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-300x170.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-768x435.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg 996w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Do you run multiple SAP systems in a hybrid landscape? Are you worried about how you can protect them in real time above and beyond the authorization level? A variety of challenges can arise in such situations, because the implementation of security-relevant measures is time and resource-intensive.<\/p>\n<p><!--more--><\/p>\n<h2><\/h2>\n<p>&nbsp;<\/p>\n<h2><strong>Keeping track of the big picture takes effort<\/strong><\/h2>\n<p>When it comes to protecting multiple SAP systems, you need to have a continuous overview of the security status of the involved system landscapes. Various lists in a variety of media have to be reconciled, complex analyses of log files with security-relevant content have to be documented, and last but not least, other projects that are running alongside day-to-day business\u00a0\u2013 such as SAP rollouts\u00a0\u2013 also vie for attention. Accordingly, sufficient staff capacity has to be available to assess and implement security measures.<\/p>\n<h2><strong>Full transparency and monitoring in real time for D\u00dcRR IT Service GmbH<\/strong><\/h2>\n<p>After commissioning an independent audit of its SAP systems to determine the current state of its system landscape, D\u00dcRR IT Service GmbH faced these exact challenges. The D\u00dcRR Group consists of three group divisions with some 16,500 employees in 116 locations around the world. The SAP Basis team is responsible for around 60 SAP systems in three individual system landscapes.<\/p>\n<p>The company aimed to procure a tool that supported the hardening of the system landscapes through policies, while still allowing individual adjustments. The primary factors for D\u00dcRR:<\/p>\n<ul>\n<li>Real-time monitoring of log files with immediate alerting of the persons responsible when potentially critical activities are detected<\/li>\n<li>Direct forwarding of the log files to an existing SIEM tool<\/li>\n<li>The possibility to conduct regular system audits and to analyze security trends<\/li>\n<li>Transparent portrayal of all incoming and outgoing connections in the SAP system landscape; the tool in question would serve as the central starting point and provide an overview of the full system security<\/li>\n<li>The company also wanted simple, intuitive usability<\/li>\n<\/ul>\n<h2><strong>Implementing the requirements with support from the SAST SUITE<\/strong><\/h2>\n<p>To achieve these goals, our project team implemented two components: a cyclical audit plan that detects vulnerabilities in the system and in the authorization area and real-time monitoring that identifies attacks in progress and alerts the persons responsible, who can then take the appropriate countermeasures.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1754\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik1_Dashboard_Durr_en-1024x477.jpg\" alt=\"SAST Blog: How D\u00dcRR IT Service GmbH implements real-time protection of its SAP systems\" width=\"764\" height=\"356\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik1_Dashboard_Durr_en-1024x477.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik1_Dashboard_Durr_en-300x140.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik1_Dashboard_Durr_en-768x357.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik1_Dashboard_Durr_en.jpg 1126w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p>The <a href=\"https:\/\/sast-solutions.com\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener\">SAST Security Information Center<\/a> shows the security status of all SAP systems at a glance. The current data is displayed at all times, in line with your individual audit strategy. The trend analysis lets you determine whether hardening your SAP systems will result in reduced risks and shows you where additional changes should be made.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1755\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik2_Dashboard_Durr_en.jpg\" alt=\"SAST Blog: How D\u00dcRR IT Service GmbH implements real-time protection of its SAP systems\" width=\"864\" height=\"381\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik2_Dashboard_Durr_en.jpg 864w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik2_Dashboard_Durr_en-300x132.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik2_Dashboard_Durr_en-768x339.jpg 768w\" sizes=\"auto, (max-width: 864px) 100vw, 864px\" \/><\/p>\n<p>All risks are classified by their criticality and the many filter options make it easy for you to identify and eliminate individual vulnerabilities. The risks can be displayed by area and thanks to the tool\u2019s transparency, you not only see how many critical risks exist, but also how many of your users are affected. The displays in the SAST Security Information Center are also user friendly and can be customized to your individual needs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1757\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik3_Dashboard_Durr_en.jpg\" alt=\"SAST Blog: How D\u00dcRR IT Service GmbH implements real-time protection of its SAP systems\" width=\"901\" height=\"415\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik3_Dashboard_Durr_en.jpg 957w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik3_Dashboard_Durr_en-300x138.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/10\/Grafik3_Dashboard_Durr_en-768x354.jpg 768w\" sizes=\"auto, (max-width: 901px) 100vw, 901px\" \/><\/p>\n<p>In the <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener\">SAST SUITE<\/a>, D\u00dcRR IT Service GmbH found a software tool that provides a central overview of the status of their SAP system landscape, enables them to identify trends, and thanks to its ease of use, is suitable for both specialized teams and management.<\/p>\n<p>Alexander Wirth from D\u00dcRR IT Service GmbH commented on the successful project:<\/p>\n<p><em>\u201cThanks to the SAST SUITE, the security status of our system is transparent and plausible at all times. The combination of central system overview and documentation reduces our workload and frees up more time to implement truly relevant measures. In turn, the SAST SUITE lets us clearly identify the success of these new measures, showing it transparently and documented over time. Through real-time monitoring and the alerting options, we can now spot potentially critical behavior proactively and act immediately, instead of simply reacting subsequently.\u201d<\/em><\/p>\n<p>If you\u2019re looking for a reliable partner for the real-time protection of your SAP systems, or have any other questions about the SAST SUITE, <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener\">contact us<\/a> or visit our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener\">website<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1730\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/09\/Foto_Richard_kleiner-278x300.jpg\" alt=\"Richard Hildebrandt (SAST SOLUTIONS)\" width=\"278\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/09\/Foto_Richard_kleiner-278x300.jpg 278w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/09\/Foto_Richard_kleiner.jpg 303w\" sizes=\"auto, (max-width: 278px) 100vw, 278px\" \/><br \/>\n<strong>Richard Hildebrandt (Junior SAP Consultant, SAST SOLUTIONS)<\/strong><\/p>\n<p><strong>Tip: <\/strong>For more information about this topic, watch the recording of our <strong>webinar \u201cA look at SAP security today: Full transparency with security dashboards\u201d. <\/strong>We\u2019ll be happy to send you the <a href=\"https:\/\/sast-solutions.com\/webinars-on-demand-en.html\" target=\"_blank\" rel=\"noopener\">access link<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>More about security dashboards:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"aOHJpllnJT\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/\">Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Security dashboards \u2013 Just a buzzword or a true help with the daily security routine?&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/03\/11\/security-dashboards-just-buzzword-or-true-help-with-daily-security-routine\/embed\/#?secret=aOHJpllnJT\" data-secret=\"aOHJpllnJT\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"NtTmZfDdJC\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/07\/06\/sap-security-siem-doesnt-spot-everything-how-you-can-draw-attention-sap-incidents\/\">SAP security: Why SIEM doesn\u2019t spot everything and how you can draw attention to SAP incidents nonetheless<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;SAP security: Why SIEM doesn\u2019t spot everything and how you can draw attention to SAP incidents nonetheless&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/07\/06\/sap-security-siem-doesnt-spot-everything-how-you-can-draw-attention-sap-incidents\/embed\/#?secret=NtTmZfDdJC\" data-secret=\"NtTmZfDdJC\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you run multiple SAP systems in a hybrid landscape? Are you worried about how you can protect them in real time above and beyond the authorization level? A variety of challenges can arise in such situations, because the implementation of security-relevant measures is time and resource-intensive.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[25,156,58,80,114],"class_list":["post-1753","post","type-post","status-publish","format-standard","hentry","category-references-best-cases","tag-cyber-attack","tag-cyber-security","tag-real-time-monitoring","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Full transparency and monitoring in real time for D\u00dcRR IT Service GmbH<\/title>\n<meta name=\"description\" content=\"With the help of our security dashboard, a central overview of the status of the entire SAP system landscape is created, in real-time!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Full transparency and monitoring in real time for D\u00dcRR IT Service GmbH\" \/>\n<meta property=\"og:description\" content=\"With the help of our security dashboard, a central overview of the status of the entire SAP system landscape is created, in real-time!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-15T06:42:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"996\" \/>\n\t<meta property=\"og:image:height\" content=\"564\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Full transparency and monitoring in real time for D\u00dcRR IT Service GmbH\" \/>\n<meta name=\"twitter:description\" content=\"With the help of our security dashboard, a central overview of the status of the entire SAP system landscape is created, in real-time!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Full transparency thanks to security dashboard &#8211; how D\u00dcRR IT Service GmbH protects its SAP systems in real time\",\"datePublished\":\"2021-10-15T06:42:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/\"},\"wordCount\":755,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/SAST-Security-Dashboard_Teaserbild-300x170.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Real-time monitoring\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"References &amp; Best Cases\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/\",\"name\":\"Full transparency and monitoring in real time for D\u00dcRR IT Service GmbH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/SAST-Security-Dashboard_Teaserbild-300x170.jpg\",\"datePublished\":\"2021-10-15T06:42:41+00:00\",\"description\":\"With the help of our security dashboard, a central overview of the status of the entire SAP system landscape is created, in real-time!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/SAST-Security-Dashboard_Teaserbild.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/SAST-Security-Dashboard_Teaserbild.jpg\",\"width\":996,\"height\":564,\"caption\":\"SAST Blog: Security dashboards\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/10\\\/15\\\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Full transparency thanks to security dashboard &#8211; how D\u00dcRR IT Service GmbH protects its SAP systems in real time\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Full transparency and monitoring in real time for D\u00dcRR IT Service GmbH","description":"With the help of our security dashboard, a central overview of the status of the entire SAP system landscape is created, in real-time!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/","og_locale":"en_US","og_type":"article","og_title":"Full transparency and monitoring in real time for D\u00dcRR IT Service GmbH","og_description":"With the help of our security dashboard, a central overview of the status of the entire SAP system landscape is created, in real-time!","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/","og_site_name":"SAST BLOG","article_published_time":"2021-10-15T06:42:41+00:00","og_image":[{"width":996,"height":564,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Full transparency and monitoring in real time for D\u00dcRR IT Service GmbH","twitter_description":"With the help of our security dashboard, a central overview of the status of the entire SAP system landscape is created, in real-time!","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Full transparency thanks to security dashboard &#8211; how D\u00dcRR IT Service GmbH protects its SAP systems in real time","datePublished":"2021-10-15T06:42:41+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/"},"wordCount":755,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-300x170.jpg","keywords":["Cyber Attack","Cyber Security","Real-time monitoring","SAP Security","Threat Detection"],"articleSection":["References &amp; Best Cases"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/","name":"Full transparency and monitoring in real time for D\u00dcRR IT Service GmbH","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild-300x170.jpg","datePublished":"2021-10-15T06:42:41+00:00","description":"With the help of our security dashboard, a central overview of the status of the entire SAP system landscape is created, in real-time!","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/SAST-Security-Dashboard_Teaserbild.jpg","width":996,"height":564,"caption":"SAST Blog: Security dashboards"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Full transparency thanks to security dashboard &#8211; how D\u00dcRR IT Service GmbH protects its SAP systems in real time"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1753"}],"version-history":[{"count":9,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1753\/revisions"}],"predecessor-version":[{"id":1766,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1753\/revisions\/1766"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}