{"id":556,"date":"2018-08-20T16:53:30","date_gmt":"2018-08-20T14:53:30","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=556"},"modified":"2020-07-07T11:35:28","modified_gmt":"2020-07-07T09:35:28","slug":"it-security-for-sap-landscapes-with-managed-services","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/","title":{"rendered":"IT security for SAP landscapes with managed services"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-558 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/keyvisual_sast-managed-services-300x176.png\" alt=\"sast-managed services\" width=\"300\" height=\"176\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/keyvisual_sast-managed-services-300x176.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/08\/keyvisual_sast-managed-services.png 361w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>As the years pass by, companies are increasingly facing the oft-lamented lack of experts. Bright minds thinking about information technology and how to implement it, maintain it and, especially, secure it, are far and few between. And the risks grow in line with the increasingly complex IT environment. Most IT departments are simply in over their heads in the face of this challenge. For this reason, security for systems and storage of critical company data is often pushed to the bottom of the to-do list.<br \/>\nConsider this: <a href=\"https:\/\/sast-solutions.de\/Managed-Services\/Managed-Services\/index-2.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Managed services<\/a> offer quick, and most importantly, secure solutions.<br \/>\n<!--more--><\/p>\n<p><strong>Managed service by AKQUINET \u2013 make or buy?<\/strong><\/p>\n<p>There are many benefits to choosing an external option for handling IT security. Involving a service provider means that your day-to-day business can continue without interruption because your internal IT experts can remain fully focused on your core business. Another advantage is that system and authorization security can be implemented quickly \u2013 AKQUINET can do it within just a few days. By contrast to outsourcing, your company retains sovereignty and control over this task. The service provider simply acts as a consultant, providing support for the requested scope as needed or helping with setup within the department.<\/p>\n<p>\u201cFinding qualified experts in the IT sector is like looking for a needle in a haystack. We provide an all-around solution to companies: We secure your IT systems and provide qualified specialists whose main focus is on handling SAP landscape security,\u201d explains Ralf Kempf, CTO \u201cSAST SOLUTIONS\u201d at akquinet AG.<\/p>\n<p><strong>SAST Managed Services: Platform security and identity and user access management<\/strong><\/p>\n<p>Our <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/sap-platform-security\/index.jsp\">platform security<\/a> offering includes the following:<\/p>\n<ul>\n<li>SAP system hardening and ongoing health checks<\/li>\n<li>Continuous monitoring of critical system configurations<\/li>\n<li>Continuous threat analyses and scans for vulnerabilities<\/li>\n<li>Prevention of critical transactions and reports, system modifications, and more<\/li>\n<li>Logging of unwanted downloads from systems<\/li>\n<\/ul>\n<p>In <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/identity-user-access-management\/index.jsp\">identity and user access management<\/a>, we cover the following services:<\/p>\n<ul>\n<li>Ongoing support in authorization management<\/li>\n<li>User request and change workflows \/ Prevention of SoD conflicts<\/li>\n<\/ul>\n<p>Support in structuring roles and partially automating role management using extensive role templates for any industry (with absolutely no SoD issues)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-582\" src=\"https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=764\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" srcset=\"https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=764 764w, https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=1528 1528w, https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=150 150w, https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=300 300w, https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=768 768w, https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=1024 1024w\" alt=\"SAST Managed Services\" width=\"764\" height=\"435\" data-attachment-id=\"582\" data-permalink=\"https:\/\/akquinet-security-en.blog\/grafik_sast-managed-services_neu_1807\/\" data-orig-file=\"https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=764\" data-orig-size=\"2055,1169\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"SAST Managed Services\" data-image-description=\"\" data-medium-file=\"https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=764?w=300\" data-large-file=\"https:\/\/akquinetsecurityen.files.wordpress.com\/2018\/07\/grafik_sast-managed-services_neu_1807.jpg?w=764?w=764\" \/><strong>Securing SAP systems: real-life experiences of today and tomorrow<\/strong><\/p>\n<p>Due to a lack of internal resources and a sophisticated SAP system landscape, Linde turned to AKQUINET for a managed service solution. In addition to achieving security with the SAST GRC Suite, the main concern of the decision makers was to manage risks quickly and successfully without impacting day-to-day business. (See our Linde Success Story <a href=\"https:\/\/sast-solutions.com\/files\/SAST\/Dokumente\/sast-success-story-linde-risk-management-SAP-managed-services.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.)<\/p>\n<p>Currently, AKQUINET is developing a managed service solution for a global players in the financial services sector and aims to handle monitoring, assessment, implementation and hardening of security requirements in SAP operations for Authority and Security. After commissioning the AKQUINET <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/index.jsp\">SAST SUITE<\/a> and its <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/sap-security-intelligence\/index.jsp\">Security Radar<\/a>, the plan was to assign a qualified partner company to handle operating responsibilities as a managed service. The objective behind this was to outsource the continuous adjustments in line with needs as well as evaluations and optimizations. It becomes necessary, especially in the context of the increasing number of PEN tests in the SAP environment, to remedy any vulnerabilities detected and to monitor compliance with processes and configurations via integrated reporting.<\/p>\n<p>Going forward, AKQUINET will therefore be providing the following managed services:<\/p>\n<ul>\n<li><strong>Security audit report<\/strong> (cyclical monitoring for system configuration and critical authorizations): The SAP Security Administration has developed a SAST SEC report to monitor sensitive SAP vectors by checking SAP systems daily, weekly and quarterly.<\/li>\n<li><strong>360-degree SAP Security real-time monitoring with SAST SSR<\/strong>: As the number of ways to attack SAP systems rises, real-time monitoring of all SAP systems must be established.<\/li>\n<\/ul>\n<p>The services offered include the following:<\/p>\n<ul>\n<li>Health check: Monitor the availability of the monitoring systems<\/li>\n<li>Use tool-based approach to remotely monitor SAP systems<\/li>\n<li>Evaluate and assess deviations from company policies<\/li>\n<li>Alarm and report service (daily and monthly reports)<\/li>\n<li>Evaluate and check content of the alarms\/reports and clarifies them with the user implementing them<\/li>\n<li>Adjust parameter settings \u2013 recommendations for hardening or system\/application changes (e.g. different parameter settings, users with critical authorizations and source code)<\/li>\n<li>Update the verification policy based on recommendations of SAP, the German Federal Office for Information Security (BSI) and the German-speaking SAP user group (DSAG).<\/li>\n<li>Share coordination information and knowledge each month (remotely or locally), also available in a management cockpit dashboard<\/li>\n<\/ul>\n<p><strong>At a glance: How you\u2019ll benefit from a managed service solution from AKQUINET:<\/strong><\/p>\n<ol>\n<li><strong>Unparalleled security <\/strong>All of our security consultants have plenty of experience and our tools are certified by SAP.<\/li>\n<li><strong>Resource optimization <\/strong>Our experts will start helping to carry the load in no time, and you\u2019ll see the first results within just a few days.<\/li>\n<li><strong>Real-time monitoring <\/strong>We\u2019ll contact you immediately when we identify a vulnerability or detect an attack.<\/li>\n<li><strong>Always up to date <\/strong>We use security configurations and threat databases that are updated on an ongoing basis.<\/li>\n<li><strong>Reduced costs <\/strong>Lower your operating and personnel costs No separate licensing agreements for using the security tools<\/li>\n<li><strong>No cryptic incident reports <\/strong>We\u2019ll provide you with contextual information and recommendations on what to do.<\/li>\n<\/ol>\n<h6><img loading=\"lazy\" decoding=\"async\" width=\"104\" height=\"125\" class=\" size-full wp-image-367 alignnone\" src=\"https:\/\/akquinetsecurityen.files.wordpress.com\/2017\/03\/funke_gunar.png?w=764\" alt=\"Funke_Gunar\" data-attachment-id=\"367\" data-permalink=\"https:\/\/akquinet-security-en.blog\/2017\/11\/01\/sap-security-and-compliance-make-or-buy\/funke_gunar\/\" data-orig-file=\"https:\/\/akquinetsecurityen.files.wordpress.com\/2017\/03\/funke_gunar.png?w=764\" data-orig-size=\"104,125\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Funke_Gunar\" data-image-description=\"\" data-medium-file=\"https:\/\/akquinetsecurityen.files.wordpress.com\/2017\/03\/funke_gunar.png?w=764?w=104\" data-large-file=\"https:\/\/akquinetsecurityen.files.wordpress.com\/2017\/03\/funke_gunar.png?w=764?w=104\" \/><br \/>\nGunar Funke, Head of SAP Security Services at AKQUINET<\/h6>\n<p>Are you interested in learning more about <a href=\"https:\/\/www.sast-solutions.de\/Managed-Services\/Managed-Services\/index-2.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST Managed Services<\/a>? Check out our home page and send us an e-mail at <a href=\"mailto:knowhow@akquinet.de\">knowhow@akquinet.de<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the years pass by, companies are increasingly facing the oft-lamented lack of experts. Bright minds thinking about information technology and how to implement it, maintain it and, especially, secure it, are far and few between. And the risks grow in line with the increasingly complex IT environment. Most IT departments are simply in over [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[156,44,68,80],"class_list":["post-556","post","type-post","status-publish","format-standard","hentry","category-sap-managed-services","tag-cyber-security","tag-managed-services","tag-sap-authorizations","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT security for SAP landscapes with managed services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT security for SAP landscapes with managed services\" \/>\n<meta property=\"og:description\" content=\"As the years pass by, companies are increasingly facing the oft-lamented lack of experts. Bright minds thinking about information technology and how to implement it, maintain it and, especially, secure it, are far and few between. And the risks grow in line with the increasingly complex IT environment. Most IT departments are simply in over [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-20T14:53:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-07T09:35:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/keyvisual_sast-managed-services-300x176.png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"IT security for SAP landscapes with managed services\",\"datePublished\":\"2018-08-20T14:53:30+00:00\",\"dateModified\":\"2020-07-07T09:35:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/\"},\"wordCount\":888,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/keyvisual_sast-managed-services-300x176.png\",\"keywords\":[\"Cyber Security\",\"Managed Services\",\"SAP Authorizations\",\"SAP Security\"],\"articleSection\":[\"SAP Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/\",\"name\":\"IT security for SAP landscapes with managed services\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/keyvisual_sast-managed-services-300x176.png\",\"datePublished\":\"2018-08-20T14:53:30+00:00\",\"dateModified\":\"2020-07-07T09:35:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/keyvisual_sast-managed-services-300x176.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/keyvisual_sast-managed-services-300x176.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/08\\\/20\\\/it-security-for-sap-landscapes-with-managed-services\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT security for SAP landscapes with managed services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT security for SAP landscapes with managed services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/","og_locale":"en_US","og_type":"article","og_title":"IT security for SAP landscapes with managed services","og_description":"As the years pass by, companies are increasingly facing the oft-lamented lack of experts. Bright minds thinking about information technology and how to implement it, maintain it and, especially, secure it, are far and few between. And the risks grow in line with the increasingly complex IT environment. Most IT departments are simply in over [&hellip;]","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/","og_site_name":"SAST BLOG","article_published_time":"2018-08-20T14:53:30+00:00","article_modified_time":"2020-07-07T09:35:28+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/keyvisual_sast-managed-services-300x176.png","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"IT security for SAP landscapes with managed services","datePublished":"2018-08-20T14:53:30+00:00","dateModified":"2020-07-07T09:35:28+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/"},"wordCount":888,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/keyvisual_sast-managed-services-300x176.png","keywords":["Cyber Security","Managed Services","SAP Authorizations","SAP Security"],"articleSection":["SAP Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/","name":"IT security for SAP landscapes with managed services","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/keyvisual_sast-managed-services-300x176.png","datePublished":"2018-08-20T14:53:30+00:00","dateModified":"2020-07-07T09:35:28+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/keyvisual_sast-managed-services-300x176.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/08\/keyvisual_sast-managed-services-300x176.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/08\/20\/it-security-for-sap-landscapes-with-managed-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"IT security for SAP landscapes with managed services"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=556"}],"version-history":[{"count":4,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/556\/revisions"}],"predecessor-version":[{"id":1219,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/556\/revisions\/1219"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}