Were you unable to attend a live webinar? Or did a colleague just recommend a topic to you from our SAST SOLUTIONS portfolio? Our webinar archive allows you to individually schedule when you want to take advantage of the recommendations of our SAP security and compliance experts. The migration to S/4HANA, effective code management or a trouble-free authorization redesign? Here you will find our webinars sorted by topics.

SAP Cyber Security

Safety first! How to avoid pitfalls during your SAP S/4HANA conversion.

In this webinar we share our experiences from S/4HANA migration projects, show you where common pitfalls lie and provide you with insights into structured project planning.

We repeatedly encounter companies that unnecessarily repeat mistakes from the SAP R/3 migration process or put off securing the new SAP Systems on the back burner. This can become a significant risk to the entire project.

With our practical examples, we support you in achieving optimum preparation for your SAP S/4HANA conversion: including tool-supported reduction of your ABAP source code, to the sense and nonsense of Fiori workflows, and capturing the full intended performance gains in your SAP HANA database.

Topics of focus:

  • Common pitfalls during SAP S/4HANA conversion
  • Learnings of other companies by examples
  • Tips for a structured and secure migration

>> Request access link

Insecure SAP system interfaces: An underestimated risk.

How confident are you that your SAP systems are sufficiently protected against cyberattacks? In our experience, it's far too often the case that companies fail to pay the requisite attention to analyzing and securing their SAP system interfaces. These include RFC connections, SAP Gateway, and extended ST01 traces, along with considerations of their relevance, criticality, and potential defects.

As you take the steps necessary to secure your landscape, the suite module SAST Interface Management can provide you with optimal support. It's capable of evaluating multiple systems, creating a comprehensive interface overview in graphical or tabular format, and categorizing the flaws it finds.

Topics of focus:

  • How to use the module to find out what's really going on with your RFC connections
  • How to identify RFCs that are improperly configured or not in use in your systems
  • How to secure your SAP Gateway using SAST SUITE
  • Practical tips you can use to protect your landscape in the most effective ways

>> Request access link

Security for the SAP cloud and S/4HANA: How to take initiative.

Companies are increasingly choosing cloud technologies - now also for SAP. However, this progress is not without risk, as protection of most SAP systems is inadequate. Mitigation in the cloud opens new vulnerabilities and stricter conditions for SAP security and compliance, especially with regard to authorizations and SoD analyses. The solution? Risk management for the cloud.

In our webinar, we will show you how you can optimize security in your SAP landscape in the cloud and how to organize your authorizations - even after migration to S/4HANA - in a way that is both role-based and compliant. What preparations are needed before migration? Which migration strategy is right for you? Which steps must come first? Plan to mitigate risks on the SAP Cloud Platform at all relevant checkpoints and take advantage of our expertise: Our experts will present their experiences from a pilot project, respond to all your questions and optimally prepare you for the digital future.

  • Secure your SAP landscapes - in the cloud, too
  • Develop the right cloud - and S/4HANA - strategy and master the first steps
  • Easily, simply transport existing SoD matrices
  • Benefit from our pilot project experiences

>> Request access link

SAP Authorization Management

How to manage users, roles and rights in S/4HANA systems audit compliant.

Administrating a large number of user accounts often presents companies with serious challenges. Especially when you consider how complicated most of the available standard tools are. The effort is hardly manageable if user identities also need to be maintained in several systems, directory services, or databases.

The lack of an option to manage user IDs and authorizations across multiple systems in a transparent way, not only leads to insufficient clarity and SoD conflicts; it also requires more effort to address those issues.

We will demonstrate how you can manage the identities, roles and authorizations of your SAP users efficiently and also on a shared S/4HANA system landscape.

Topics of focus:

  • Challenges of Identity Management in SAP S/4HANA systems
  • Reduction of effort due to automated authorization requests
  • Real time risk assessment of critical authorizations
  • Advantages of the SAST User Access Management
  • Best practice tips

>> Request access link

Tips for the secure conversion of your SAP ERP roles to S/4HANA.

When transforming authorization roles from your ERP system, there are many points to consider in parallel: For which transactions are there comparable counterparts, which must be exchanged, and which are even obsolete? To do this, you need to select the appropriate Fiori Apps for the new roles and, of course, you also need to adhere to your SAP authorization concept. This requires some preparatory work and analyses, especially if you plan to implement this work manually.

In this webinar we will show you how we can support you, shorten the migration period and at the same time greatly improve the quality and security of your roles. After all, it will be more expensive to clean up legacy issues only after migration - not to mention the damage caused by security holes that have been transferred.

Topics of focus:

  • Challenges and necessary questions before project start
  • Our project procedure at a glance
  • Tips for identifying and eliminating risks in your SAP roles
  • Advantages of the SAST Role Conversion Service

>> Request access link

Fiori and S/4 authorizations: What are the biggest challenges, and where do the risks lie?

Many SAP customers are currently planning to implement SAP S/4HANA or are already making the transition. Besides the extensive new architectural aspects involved, implementing S/4HANA and Fiori also changes quite a few longstanding rules in the area of SAP authorizations.

A number of transactions - some of which veteran SAP ERP users have come to hold dear - have either been integrated into other transactions, replaced by Fiori apps, or simply eliminated. Meanwhile, the consistent use of OData services in the context of Fiori has resulted in a variety of ramifications with regard to security design in both the front and back end.

Topics of focus:

  • S/4HANA and Fiori: Which areas of the SAP security architecture are affected?
  • In light of the ramifications for authorization concepts, should you revise yours or redesign it completely?
  • Potential pitfalls during implementation
  • Implications for your SoD rules
  • How the SAST team's experience makes S/4HANA security design fast, efficient, and cost-effective
  • Special feature: insights into ideal scenarios

>> Request access link

SAP HANA & S/4HANA: Securing your first steps into the future of SAP.

Following the arrival of SAP's new S/4HANA business suite, intuitive SAP Fiori user interfaces, and the SAP HANA in-memory platform for big data analysis, there's nothing left standing between you and the next generation of business software. Or is there...?

For virtually every company, making the move to SAP HANA involves a platform transition with many important security aspects to consider. New installations of HANA aren't inherently secure, after all; in fact, some releases contain open vulnerabilities that need to be identified and addressed.

The transition to S/4HANA, meanwhile, requires you (at minimum) to migrate or redesign your authorizations. This is because its new processes have made some transactions obsolete while adding new variants. In SAST SUITE, we offer a holistic solution that's designed to support your approach to risk analysis and role creation. It also includes an audit-compliant role template and a framework of S/4HANA rules that can aid you in addressing risks and SoD conflicts.

Topics of focus:

  • Security flaws to watch out for in new HANA installations
  • The solution approach that's right for you in migrating your previous ERP roles
  • How our auditing approach highlights risks and provides an ideal basis for the necessary hardening
  • How SAST SUITE can support your projects
  • What you can learn from our experience and best-practice examples

>> Request access link

Towards new shores with cross-system SoD analyses.

In order to maintain compliance in SAP systems, a well-established authorization management and a well-founded analysis of the separation of functions is necessary. This becomes all the more complex the more non-system solutions are available in your SAP ERP or S/4HANA landscape, because such systems usually have their own authorization structures.

It is therefore necessary to think about a reliable, cross-system authorization management in good time so that roles and authorizations are synchronized across all your SAP and non-SAP applications.

In this webinar, we will show you how to master comprehensive SoD analyses, business process analyses and the identification of authorization conflicts in the future – tool-supported and with a feasible administrative effort.

Topics of focus:

  • SoD analysis for SAP and non-SAP systems
  • Cross-system authorization management with a central identity
  • Evaluation of assigned roles and rights
  • Advantages of the SAST User Access Management
  • Best practice tips

>> Request access link

Using SAST Safe Go-Live Management to prevent disruptions in authorization design.

Whether it's after an audit or during an S/4HANA project, companies' requirements regarding quality, the time involved, and of course, their project budget often differ greatly when it comes to planning authorization redesigns.

No matter what your own priorities are in authorization projects, AKQUINET offers solutions designed to meet every requirement to the letter. And the best part? Thanks to SAST Safe Go-Live Management methodology, your project won't cause any disruptions in your everyday business.

Topics of focus:

  • How to find the solution that matches your exact requirements
  • How to carry out your project up to 70% faster
  • What you can learn from our experience and best-practice examples

>> Request access link

SAP Threat Intelligence

The most important elements of a cybersecurity strategy.

It's a question we're asked again and again: "How can I harden my SAP systems against cyberattacks?" In light of recent events, all companies have realized that they can become the target of an attack at any time. And when that happens, the damage caused can easily reach seven – or even nine – figures. Companies that fail to follow the basic rules of IT security can end up paying a heavy price for their mistakes.

In this webinar, we share our experiences with you, describe typical attack vectors, and illustrate why investments in the security of your SAP systems will pay off. We also show you the most important steps involved in safeguarding your systems – including hardening the hardware at all levels, sensible network zoning, and establishing a monitoring system to detect potential vulnerabilities in your system early on. That lets you remain calm when faced by an attack.

Topics of focus:

  • Challenges, tools, and reliable methods
  • What does a reliable security monitoring system need
  • Step-by-step instructions for protecting against attacks
  • Benefits of managed services for the security of your SAP systems

>> Request access link

Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed.

It has long been no secret that cyber criminals particularly like to attack SAP systems. After all, they are perfectly suited as a backdoor for a company's highly sensitive data, and there is no better way to make money.

You can't prevent attacks, but with the right cyber threat detection strategy, you can be prepared, detect anomalies immediately and respond to security incidents immediately.

In this webinar, we'll show you how to properly assess threats, identify and neutralize real cyber-attacks before they can cause serious damage.

Topics of Focus:

  • Building an SAP cyber security strategy you can trust
  • Protection of your SAP systems on platform and authorization level
  • Identification of weak points in real time
  • Importance of security dashboards to analyze suspicious user activity
  • Advantages of the SAST SUITE for your SAP Threat Detection measures

>> Request access link

SAP Security & Compliance Audits: Find your vulnerabilities before you get hurt.

Our audits are designed to help you determine your SAP landscape's actual risk exposure and pinpoint areas that are open to potential attacks. They include everything from your infrastructure and SAP system parameters to individual component configurations and authorizations.

Also if your company's migration to SAP HANA or S/4HANA is right around the corner. An audit offers an ideal solution for safeguarding your systems and taking all the necessary security measures before you start your transition.

Our approach is based on SAP's security guidelines, the recommendations of the German Federal Office for Information Security (BSI), and the information security standard DIN ISO 27001. 

Topics of focus:

  • Challenges, tools and proven methods
  • Advantages of a root cause analysis and of the resulting risks for your company
  • Quick check vs. audit vs. penetrationtest
  • Our project approach at a glance
  • Recommendations for the follow-up of an Audit

>> Request access link

SAST Threat Detection: What you stand to gain from intelligent, SAP real-time monitoring.

Your efforts to protect your SAP systems won't be complete until you have reliable way to keep a constant eye on your transactions and applications. When you detect critical incidents right when they occur, you'll be able take immediate action in response. When you're under attack, your reaction time has a significant impact on the level of damage you can expect. It's not hard to see how a real-time solution like AKQUINET's SAST Security Radar pays for itself in short order.

Detecting attacks based on log files and analyzing network traffic requires in-depth knowledge of the potential paths and patterns such incursions can follow. This is because events relevant to security have to be filtered out of a sea of data and placed in the proper context.

Topics of focus:

  • Why authorization concepts alone are not enough.
  • Step-by-step to comprehensive, real-time protection with SAST.
  • How to achieve a reliable security management process.
  • Opportunities for integration into a cross-SIEM solution.

>> Request access link

Gain complete transparency with security dashboards for SAP.

The maxim “Trust is good, but control is better" definitely applies to SAP systems, which constitute the core of many companies' IT landscapes. The current security status of such systems should be known to more than just the SAP experts involved; indeed, this information is becoming relevant to more and more contacts at companies. As a result, it's all the more important that analyses be intuitive and user-friendly.

SAST Management Dashboard enables you to assess the security of your SAP systems at a glance. It analyzes key risks and presents the results in a visual format while also depicting trends over time.

At the press of a button, SAST Management Dashboard can provide you with a current status report based on risk KPIs you define in advance and reveal the causes of security flaws. The benefits are clear: You'll have constant access to high-quality information regarding your present risk situation. In this webinar, we'll show you how quick and easy it can be to take your security to the next level.

Topics of focus:

  • Identify security flaws in a clear and simple manner
  • Learn how to drill down from aggregated risk indicators to the details with just a few clicks
  • Integrating the SAST module into a central SIEM solution

>> Request access link

SAP Managed Services & Hosting

The choice is yours: a make or buy approach to SAP security and compliance?

Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security. However, efforts like these are technically complex, which is why they require so much time and personnel. Decision-makers thus face a fundamental question: Should they "make" or “"buy" their way to SAP security and compliance?

Our managed services offer a holistic solution that can assist you in both on-site and remote environments.

Topics of focus:

  • How you'll benefit from a managed service solution.
  • How to achieve greater security while keeping an eye on your budget and other resources.
  • Why the ability to respond to critical incidents in a matter of minutes is crucial.
  • How to drive an effort to secure systems and fine-tune authorization management in just days.
  • How to ensure holistic system security now and in the future.

>> Request access link

Hacking 40 SAP systems at once - why your hosting provider isn't as secure as you might think.

Picture a building with no windows, cameras on every corner, and a barbed wire fence one meter high. Trying to break into a hosting company's data center doesn't seem like a good idea, does it? Meanwhile, firewalls, intrusion detection systems, and other measures are also in place to thwart virtual intrusions. Hosted SAP systems are another matter, however. In our experience, responsibilities related to SAP system security are often not clearly defined between hosts and their customers, which leaves a number of doors wide open for attackers.

Topics of focus:

  • How frighteningly easy it can be to penetrate SAP systems.
  • Why responsibilities are often undefined in the case of SAP systems in particular.
  • What you need to keep in mind to safeguard your hosted SAP systems.

>> Request access link

Best Practice Cases

How can managed services improve your SAP security and compliance? We show you, based on specific customer cases.

Although managed services are becoming a firm fixture in more and more IT areas, companies are still hesitant when it comes to SAP – even though almost all of them face similar challenges, including the specialized domain of SAP security and authorizations.

There is a shortage of specialist staff capable of ensuring GDPR-compliant monitoring of SAP systems, especially the sensitive personnel data they manage. Although they would like to monitor highly critical transactions, they often lack both the internal expertise and the suitable tools. Last but not least, although some companies monitor their IT systems in real time, the response times to alerts in the SAP environment are far too long to support a rapid response to identified threats.

Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security, however. With the SAST Managed Service, we can take care of all this for you, no matter whether your company is already playing in the Champions League of security or are only just starting out. We offer custom-tailored security and compliance solutions for both SAP ERP and SAP S/4HANA.

Topics of focus:

  • The right managed service solution for every company
  • How to achieve better SAP security and compliance – even with a small IT budget
  • Practical examples from customers who use our SAST Managed Service
  • Special offer: our new "Starter Package"

>> Request access link

RENK AG tests out SAST's fat-burner for SAP roles.

As anyone who works in the field of SAP Basis services will tell you, there's always something to optimize when it comes to user authorizations. What these efforts fail to do far too often, however, is remove transactions that are no longer in use from the respective roles. This leads to preventable risks with regard to the segregation of duties and unnecessary resource consumption in administration.

After conducting various tests on intelligent ways to streamline role profiles, RENK AG settled on one solution: the new Self-Adjusting Authorizations module of SAST SUITE. During authorization projects, it's not uncommon for our experts to find users with up to 500 SAP authorizations - only 25% of which they actually utilize.

This new tool promises benefits to both midsize businesses with relatively few security and compliance specialists and larger companies that need to keep their countless authorizations up-to-date at all times. With SAST Self-Adjusting Authorizations, you can implement tailored, fully streamlined roles without putting any restrictions on your day-to-day business - which is also the best way to prepare for your next SAP license audit.

Topics of focus:

  • Learn about the benefits of a lean authorization concept
  • Achieve greater security with less work

>> Request access link

Our webinars on demand for you

SAP Cyber Security

SAP Authorization Management

SAP Threat Intelligence

SAP Managed Services & Hosting

Best Practice Cases

Up-to-date

* Required field

By clicking the “Send” button, I hereby grant my consent that AKQUINET is allowed to store and use the information I have provided to contact me and organizing the event. More information please refer to our privacy policy
Copyright akquinet AG. All Rights Reserved.