{"id":1782,"date":"2021-12-14T14:08:51","date_gmt":"2021-12-14T13:08:51","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1782"},"modified":"2021-12-14T14:08:51","modified_gmt":"2021-12-14T13:08:51","slug":"sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/","title":{"rendered":"SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1785 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021-300x189.jpg\" alt=\"SAST Blog: SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems\" width=\"300\" height=\"189\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021-300x189.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021.jpg 636w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Do companies need a comprehensive security strategy for their SAP systems? The objective should be the integration into the bigger picture. Due to the lack of structures for overall security, however, security measures on a smaller scale are frequently omitted. It is therefore necessary to optimize internal control systems and \u2013 particularly for securing SAP systems \u2013 and to establish comprehensive monitoring. Learn more open the interplay of point in time and time frame of the security monitoring.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Our Product Manager presents five questions on cyber-security topics that are often asked by those responsible for SAP:<\/p>\n<h2>What are the most common mistakes regarding SAP security?<\/h2>\n<p>When securing SAP systems, companies often focus on user management, authorizations and user IDs. In addition to a sound authorization concept, which is doubtlessly important, the security of the systems and infrastructure as well as centralized and standardized reporting are equally essential. This makes it possible to address risks in a targeted manner. For this purpose, a comprehensive cooperation of all those involved is necessary \u2013 from the SAP Basis to the user and role management \u2013 coordinated by a security officer. Our <a href=\"https:\/\/sast-solutions.com\/sast-consulting.html\" target=\"_blank\" rel=\"noopener\">SAP Security Experts<\/a> support you precisely in this area, when it comes to developing a comprehensive security strategy for your SAP systems.<\/p>\n<h2>Which measures are effective in the implementation of comprehensive security solutions?<\/h2>\n<p>For comprehensive security monitoring, it is necessary for the central offices to be knowledgeable regarding all of the circumstances regarding the security of your system landscape. In addition to threat assessments in real time, this also includes regular internal audits for the support of internal control systems.\u00a0 Checks based on the point in time and time frame should be provided centrally and implemented hand in hand. For this purpose, the <a href=\"https:\/\/sast-solutions.com\/sast-suite.html\" target=\"_blank\" rel=\"noopener\">SAST SUITE<\/a> offers the <a href=\"https:\/\/sast-solutions.com\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener\">SAST Security Information Center<\/a>.<\/p>\n<h2>What is meant by monitoring based on the point in time?<\/h2>\n<p>Monitoring based on the point in time is periodically recurring, automated control for checking the system properties, role conflicts and the like. The scope of the check for this, meaning the subject of the check as well as the checks applied, are predefined along with the point in time of implementation.<\/p>\n<h2>What is meant by monitoring based on the time frame?<\/h2>\n<p>Monitoring based on time frame is a continuous monitoring of critical activities for unexpected occurrences, including the change of system parameters or calling of unwanted and critical transactions. The scope of the check for monitoring based on time frame is likewise predefined. The checks are carried out continuously, however, rather than solely at fixed points in time.<\/p>\n<h2>How does the monitoring based on the point in time work with the monitoring based on time frame?<\/h2>\n<p>Regular checks for the analysis of system stability or the authorization structure provide an overview of the conceptual stability of systems. Rounded off by real-time monitoring, changes to the system that have taken place between two or more point-in-time checks can also be detected. Conversely, such deviations can only be detected if sound statements on the security configuration on the system are available beforehand. The SAP security only becomes fully transparent through the interplay of the two areas.<\/p>\n<p><strong>For this reason, we offer the following tip: Take advantage of a tool-supported, comprehensive solution for SAP Threat Detection and Access Governance.<\/strong><\/p>\n<p>Take the initiative and round out your spot checks with automated real-time monitoring. Stop limiting your view of SAP security analyses to a single point in time and instead identify risks comprehensively, over freely definable periods of time.<\/p>\n<p>In our webinar called <strong>\u201cHow SAP Cyber Security works effectively \u2013 the difference between point in time and time frame,\u201d<\/strong> we\u2019ll show you the possibilities and describe how the SAST SUITE can help you optimize your internal control systems, while at the same time establishing reliable real-time monitoring of your SAP systems. We are happy to provide you with the<a href=\"https:\/\/sast-solutions.com\/webinars-on-demand-en.html\" target=\"_blank\" rel=\"noopener\"> recording<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1783\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/rkelbert_jpg-300x300.jpg\" alt=\"Raphael Kelbert (SAST SOLUTIONS)\" width=\"300\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/rkelbert_jpg-300x300.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/rkelbert_jpg-150x150.jpg 150w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/rkelbert_jpg.jpg 480w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<strong>Raphael Kelbert (Product Manager, SAST SUITE)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Further articles on cyber security:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"MvrYda9jdT\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/\">Why your SAP security and compliance strategy can\u2019t wait for an SAP S\/4HANA migration<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Why your SAP security and compliance strategy can\u2019t wait for an SAP S\/4HANA migration&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2020\/12\/03\/sap-security-compliance-strategy-cant-wait-for-sap-s4hana-migration\/embed\/#?secret=MvrYda9jdT\" data-secret=\"MvrYda9jdT\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"AhsYzaXbkN\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/\">Full transparency thanks to security dashboard &#8211; how D\u00dcRR IT Service GmbH protects its SAP systems in real time<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Full transparency thanks to security dashboard &#8211; how D\u00dcRR IT Service GmbH protects its SAP systems in real time&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2021\/10\/15\/full-transparency-security-dashboard-how-durr-implements-real-time-protection-of-sap-systems\/embed\/#?secret=AhsYzaXbkN\" data-secret=\"AhsYzaXbkN\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do companies need a comprehensive security strategy for their SAP systems? The objective should be the integration into the bigger picture. Due to the lack of structures for overall security, however, security measures on a smaller scale are frequently omitted. It is therefore necessary to optimize internal control systems and \u2013 particularly for securing SAP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[156,58,68,80,114],"class_list":["post-1782","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-security","tag-real-time-monitoring","tag-sap-authorizations","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security: 5 questions about effective monitoring of SAP systems<\/title>\n<meta name=\"description\" content=\"Our product manager answers five frequently asked questions from SAP managers on the subject of cyber security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security: 5 questions about effective monitoring of SAP systems\" \/>\n<meta property=\"og:description\" content=\"Our product manager answers five frequently asked questions from SAP managers on the subject of cyber security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-14T13:08:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"636\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber Security: 5 questions about effective monitoring of SAP systems\" \/>\n<meta name=\"twitter:description\" content=\"Our product manager answers five frequently asked questions from SAP managers on the subject of cyber security.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems\",\"datePublished\":\"2021-12-14T13:08:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/\"},\"wordCount\":679,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021-300x189.jpg\",\"keywords\":[\"Cyber Security\",\"Real-time monitoring\",\"SAP Authorizations\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/\",\"name\":\"Cyber Security: 5 questions about effective monitoring of SAP systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021-300x189.jpg\",\"datePublished\":\"2021-12-14T13:08:51+00:00\",\"description\":\"Our product manager answers five frequently asked questions from SAP managers on the subject of cyber security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021.jpg\",\"width\":636,\"height\":401,\"caption\":\"SAST Blog: SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/12\\\/14\\\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security: 5 questions about effective monitoring of SAP systems","description":"Our product manager answers five frequently asked questions from SAP managers on the subject of cyber security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security: 5 questions about effective monitoring of SAP systems","og_description":"Our product manager answers five frequently asked questions from SAP managers on the subject of cyber security.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/","og_site_name":"SAST BLOG","article_published_time":"2021-12-14T13:08:51+00:00","og_image":[{"width":636,"height":401,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Cyber Security: 5 questions about effective monitoring of SAP systems","twitter_description":"Our product manager answers five frequently asked questions from SAP managers on the subject of cyber security.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems","datePublished":"2021-12-14T13:08:51+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/"},"wordCount":679,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021-300x189.jpg","keywords":["Cyber Security","Real-time monitoring","SAP Authorizations","SAP Security","Threat Detection"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/","name":"Cyber Security: 5 questions about effective monitoring of SAP systems","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021-300x189.jpg","datePublished":"2021-12-14T13:08:51+00:00","description":"Our product manager answers five frequently asked questions from SAP managers on the subject of cyber security.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021.jpg","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/12\/Webinar-Motiv_Sicherheitsvorfalle-erkennen_2021.jpg","width":636,"height":401,"caption":"SAST Blog: SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/12\/14\/sap-cyber-security-five-questions-answers-about-effectively-monitoring-sap-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAP Cyber Security: Five questions and answers about effectively monitoring SAP systems"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1782"}],"version-history":[{"count":4,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1782\/revisions"}],"predecessor-version":[{"id":1789,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1782\/revisions\/1789"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}