SlideShare a Scribd company logo
1 of 4
Download to read offline
Visit www.protect4s.com or call +31 3178 42 646.
Protect4S – Control the risk of your SAP Platform
Here is something you don’t want to hear: your business-critical SAP systems are
probably not as safe as you think they are.
KNOW THE VULNERABILITIES OF YOUR SAP PLATFORM
Despite a variety of regularly-updated safety tools, most systems are vulnerable
to data breaches or hacks. Contrary to popular belief, being compliant to standard
safety regulations does not mean your systems are fully protected. The biggest risk
is in not knowing you may be at risk.
The consequences of a data breach are far reaching. Not only is it damaging for your brand
reputation, breaches also have a great financial impact. Moreover, the European Union is
changing its Data Protection Directive, which means you may be fined for not complying
with the new regulations.
Visit www.protect4s.com or call +31 3178 42 646.
You simply can’t afford not to protect
your SAP systems and your data
PROTECT4S MONITORS ALL THE RISKS
Data safety is a pressing issue that requires much
attention. Protect4S is a uniquely-comprehensive
security solution which regularly runs security scans
and offers insight into the vulnerabilities that exist in
your systems.
Protect4S scans your entire SAP landscape.
It doesn’t only scan the application level, but also
includes the operating system and database.
The data is analysed and vulnerabilities are
categorised according to their associated risk levels.
An automatically-generated mitigation report lists the
vulnerabilities in order of highest risk level combined
with the least time and effort required to resolve the
problem. This guarantees the most cost-effective
approach to securing your SAP systems.
Protect4S enables you to stay in control of your
systems’ safety!
NO ADDITIONAL HARDWARE
Protect4S runs from the centre of your SAP
landscape. It is an application which is installed on
your SAP Solution Manager. It therefore requires no
additional dedicated hardware and has recognisable
functionalities. Moreover, it also functions on
SAP HANA.
USER FRIENDLY
Protect4S is ready for its first scan within one hour of
the start of the setup. Once in use, the solution does
not require any specialist security skills. It creates
easy-to-understand reports that any technical SAP
consultant can work with.
SAP
BI
SAP
GRC
SAP
APO
SAP
CRM
......
SAP
PORTAL
SAP
PI
SAP
SOLUTION
MANAGER
Protect4S
Visit www.protect4s.com or call +31 3178 42 646.
Protect4S - Business Benefits
Many business-critical SAP systems are vulnerable and open
to attacks and exploitation from malicious third parties.
Using a standarised and automated,
vulnerability assessment process you:
•	 Minimise risk for hacks and data breaches
•	 Enable continious improvement of the security
of your SAP system landscape
•	 Reduce costs to keep your SAP system
landscape secure
SCAN
MITIGATE ANALYSE
Continuous
Improvement
Visit www.protect4s.com or call +31 3178 42 646.
AFFORDABLE SOFTWARE LICENCES
Protect4S is available as a renewable software
licence. The price of the licence is determined by
its length and the number of SAP systems you
connect to the solution. The size of the systems or
the number of users do not affect the price.
RELIABLE PARTNER
Protect4S is a product of ERP-SEC, an SAP
Development Partner. The company was founded
in 2010 and its founders have more than 20 years
combined experience in cyber security and SAP
products.
CONTACT US
This and other information can be found
on our website www.protect4s.com
For information and orders, please
call +31 3178 42 646
The most cost-effective approach
to securing your SAP systems
PROTECT4S IN SUMMARY
• Scans your entire 3-level SAP landscape
• Easy-to-understand reports
• HANA-support
• Runs from SAP Solution Manager
• 1-hour setup
• Affordable licence
“I want a secure SAP
platform for every user.”
Joris van de Vis, ERP-SEC
Co-Founder and SAP Platform
Security Specialist
Full support & Frequent updates
1 year
licence
2 year
licence
> 80
systems
€ 2.500
/system
/year
€ 2.000
/system
/year
available
on
request

More Related Content

What's hot

Realities of Data Security
Realities of Data SecurityRealities of Data Security
Realities of Data SecurityPriyanka Aash
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...gemmarie1
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus pptDipak Bamugade
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewSymantec
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCipherCloud
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaPrime Infoserv
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionBlue Coat
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)Anton Chuvakin
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020Anton Chuvakin
 
RSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud SecurityRSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud SecurityScott Carlson
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016Teri Radichel
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsBitglass
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextAlgoSec
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass
 

What's hot (20)

Realities of Data Security
Realities of Data SecurityRealities of Data Security
Realities of Data Security
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
RSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud SecurityRSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud Security
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business context
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 

Similar to protect4s-product-sheet

Protect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPProtect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPTomas Martinez
 
SAP Inside Track Frankfurt 2018 #Sitfra 2018
SAP Inside Track Frankfurt 2018 #Sitfra 2018SAP Inside Track Frankfurt 2018 #Sitfra 2018
SAP Inside Track Frankfurt 2018 #Sitfra 2018jvandevis
 
SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus. SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus. Micro Focus
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksSAP Customer Experience
 
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Symmetry™
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and GovernanceSAP Analytics
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...akquinet enterprise solutions GmbH
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP SystemsOnapsis Inc.
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...Tunde Ogunkoya
 
So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016Twan van den Broek
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)ERPScan
 
Practical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsPractical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsERPScan
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security ConfigurationsOnapsis Inc.
 
SAP Landscape Security
SAP Landscape SecuritySAP Landscape Security
SAP Landscape SecurityJoachim Kaland
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)ERPScan
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...akquinet enterprise solutions GmbH
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 

Similar to protect4s-product-sheet (20)

Protect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPProtect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAP
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
SAP Inside Track Frankfurt 2018 #Sitfra 2018
SAP Inside Track Frankfurt 2018 #Sitfra 2018SAP Inside Track Frankfurt 2018 #Sitfra 2018
SAP Inside Track Frankfurt 2018 #Sitfra 2018
 
SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus. SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus.
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
 
So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 
Practical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsPractical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applications
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
 
SAP Landscape Security
SAP Landscape SecuritySAP Landscape Security
SAP Landscape Security
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 

protect4s-product-sheet

  • 1. Visit www.protect4s.com or call +31 3178 42 646. Protect4S – Control the risk of your SAP Platform Here is something you don’t want to hear: your business-critical SAP systems are probably not as safe as you think they are. KNOW THE VULNERABILITIES OF YOUR SAP PLATFORM Despite a variety of regularly-updated safety tools, most systems are vulnerable to data breaches or hacks. Contrary to popular belief, being compliant to standard safety regulations does not mean your systems are fully protected. The biggest risk is in not knowing you may be at risk. The consequences of a data breach are far reaching. Not only is it damaging for your brand reputation, breaches also have a great financial impact. Moreover, the European Union is changing its Data Protection Directive, which means you may be fined for not complying with the new regulations.
  • 2. Visit www.protect4s.com or call +31 3178 42 646. You simply can’t afford not to protect your SAP systems and your data PROTECT4S MONITORS ALL THE RISKS Data safety is a pressing issue that requires much attention. Protect4S is a uniquely-comprehensive security solution which regularly runs security scans and offers insight into the vulnerabilities that exist in your systems. Protect4S scans your entire SAP landscape. It doesn’t only scan the application level, but also includes the operating system and database. The data is analysed and vulnerabilities are categorised according to their associated risk levels. An automatically-generated mitigation report lists the vulnerabilities in order of highest risk level combined with the least time and effort required to resolve the problem. This guarantees the most cost-effective approach to securing your SAP systems. Protect4S enables you to stay in control of your systems’ safety! NO ADDITIONAL HARDWARE Protect4S runs from the centre of your SAP landscape. It is an application which is installed on your SAP Solution Manager. It therefore requires no additional dedicated hardware and has recognisable functionalities. Moreover, it also functions on SAP HANA. USER FRIENDLY Protect4S is ready for its first scan within one hour of the start of the setup. Once in use, the solution does not require any specialist security skills. It creates easy-to-understand reports that any technical SAP consultant can work with. SAP BI SAP GRC SAP APO SAP CRM ...... SAP PORTAL SAP PI SAP SOLUTION MANAGER Protect4S
  • 3. Visit www.protect4s.com or call +31 3178 42 646. Protect4S - Business Benefits Many business-critical SAP systems are vulnerable and open to attacks and exploitation from malicious third parties. Using a standarised and automated, vulnerability assessment process you: • Minimise risk for hacks and data breaches • Enable continious improvement of the security of your SAP system landscape • Reduce costs to keep your SAP system landscape secure SCAN MITIGATE ANALYSE Continuous Improvement
  • 4. Visit www.protect4s.com or call +31 3178 42 646. AFFORDABLE SOFTWARE LICENCES Protect4S is available as a renewable software licence. The price of the licence is determined by its length and the number of SAP systems you connect to the solution. The size of the systems or the number of users do not affect the price. RELIABLE PARTNER Protect4S is a product of ERP-SEC, an SAP Development Partner. The company was founded in 2010 and its founders have more than 20 years combined experience in cyber security and SAP products. CONTACT US This and other information can be found on our website www.protect4s.com For information and orders, please call +31 3178 42 646 The most cost-effective approach to securing your SAP systems PROTECT4S IN SUMMARY • Scans your entire 3-level SAP landscape • Easy-to-understand reports • HANA-support • Runs from SAP Solution Manager • 1-hour setup • Affordable licence “I want a secure SAP platform for every user.” Joris van de Vis, ERP-SEC Co-Founder and SAP Platform Security Specialist Full support & Frequent updates 1 year licence 2 year licence > 80 systems € 2.500 /system /year € 2.000 /system /year available on request