SlideShare a Scribd company logo
1 of 23
© Panaya | An Infosys company PANAYA
Oracle EBS is vulnerable to security
breaches and hacking
Panaya Webinar
© Panaya | An Infosys company PANAYA
Eyal Diamant
Director, Oracle Product Management
Panaya
Rafi Kretchmer
Today’s SpeakersPANAYA WEBINAR
VP Marketing
Panaya
2
© Panaya | An Infosys company PANAYA
AgendaPANAYA WEBINAR
Challenges in organizations’ security1
Security risks in your Oracle EBS system2
Changing the paradigm3
3
© Panaya | An Infosys company PANAYA
All phone lines have been muted
Please use the Question Panel
There will be 3 short polls during the webinar
We are recording this webinar
Polls results and recording will be provided in a
follow-up email as well as any questions we
don’t have time to answer
HousekeepingPANAYA WEBINAR
4
© Panaya | An Infosys company PANAYA
= Average cost of
cyber crime incident for a US company
(Source: Ponemon Institute)
There were successful
cyber attacks in 2015
(Source: Ponemon Institute)
99
$15.4M
PANAYA5
© Panaya | An Infosys company PANAYA
ERP security risks –
are you
liable?
PANAYA6
© Panaya | An Infosys company PANAYA
PANAYA
POLL
1/3
PANAYA
© Panaya | An Infosys company PANAYA
70%
of EBS systems
are at risk
Is your EBS system secure?
PANAYA8
© Panaya | An Infosys company PANAYA9
Oracle EBS – Exposure to RiskPANAYA WEBINAR
© Panaya | An Infosys company PANAYA
When you see it,
it’s too late.
When you see it,
it’s too late.
PANAYA10
© Panaya | An Infosys company PANAYA
CPU Q3
2015
CVE-2015
4743
CVE-2015
4765
Safe
CPU Q3
2014
CVE-2014
4235
CVE-2014
4213
CPU Q4
2014
CVE-2014
6561
CVE-2014
6479
CPU Q1
2015
CVE-2014
0504
CVE-2014
0489
CPU Q2
2015
CVE-2015
0504
CVE-2015
0489
CVE=Common Vulnerabilities and Exposures
11
Org. 1 – Low Exposure to RiskPANAYA WEBINAR
© Panaya | An Infosys company PANAYA
CPU Q3
2015
CVE-2015
4743
CVE-2015
4765
CPU Q3
2014
CVE-2014
4235
CVE-2014
4213
CPU Q4
2014
CVE-2014
6561
CVE-2014
6479
CVE-2014
0504
CVE-2014
0489
CPU Q2
2015
CVE-2015
0504
CVE-2015
0489
CPU Q1
2015
CVE-2015-4743 Description :
Unspecified vulnerability in the Oracle Applications DBA component in Oracle E-Business Suite 12.2.3
allows remote authenticated users to affect confidentiality via unknown vectors related to AD Utilities.
Link to Bug :
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4743
Link to Source:
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
12
Org. 2 – High Exposure to RiskPANAYA WEBINAR
© Panaya | An Infosys company PANAYA
PANAYA
POLL
2/3
PANAYA
© Panaya | An Infosys company PANAYA
Modules you don’t use
are more vulnerable to
security breaches.
PANAYA14
© Panaya | An Infosys company PANAYA
Curious how you stand compared to
your industry benchmark?
15
© Panaya | An Infosys company PANAYA
Distribution of Oracle EBS customers according to Time-to-Patch
16
© Panaya | An Infosys company PANAYA
PANAYA
POLL
3/3
PANAYA
© Panaya | An Infosys company PANAYA
Evaluating the
industry standards
for MTTP of security
and compliance
patches
1 Analyzing your code, usage,
and patch level of your
current system and
defining your EBS risk level
2
Lists recommended
patches for external
risk reduction
No more guess work:
we will tell you which
patches you need to
install and their impact
3 4
PANAYA
How Panaya helps reduce your risk level
18
© Panaya | An Infosys company PANAYA
RECOMMENDATIONS
YOU
THE
MARKET
THE
VENDOR
How do we do it?Panaya patch recommendation engine
19
© Panaya | An Infosys company PANAYA
Q&A
20
© Panaya | An Infosys company PANAYA
Summary – How Panaya Helps You
PANAYA
Constantly analyzes the
latest security patches for
you – so you will know
exactly what you need to do
1 Builds a personalized risk base
test plan so you will know
exactly what will be the impact
of this patch on your system
2
Helps you to be more
proactive and reduces the
time your organization is at
risk – Improve MTTP
Gives visibility to your
executives how you reduce
company risk level without
adding additional resources
3 4
21
© Panaya | An Infosys company PANAYA
Curious how you stand compared to
your industry benchmark?
22
© Panaya | An Infosys company PANAYA
USA Germany Israel Japan Australia
23

More Related Content

What's hot

Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana Panaya
 
SAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA Webinar
SAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA WebinarSAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA Webinar
SAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA WebinarPanaya
 
Understanding the value of agility in the cloud
Understanding the value of agility in the cloud  Understanding the value of agility in the cloud
Understanding the value of agility in the cloud Panaya
 
S4 HANA Webinar
S4 HANA WebinarS4 HANA Webinar
S4 HANA WebinarPanaya
 
S4 hana introduction2
S4 hana introduction2S4 hana introduction2
S4 hana introduction2avigailm
 
SAP Certified Basis Monitoring
SAP Certified Basis MonitoringSAP Certified Basis Monitoring
SAP Certified Basis MonitoringAndrew Asir
 
DPM Overview Soasta Partners.pptx
DPM Overview Soasta Partners.pptxDPM Overview Soasta Partners.pptx
DPM Overview Soasta Partners.pptxJennifer Finney
 
How to Enter the DataGenius Challenge
How to Enter the DataGenius ChallengeHow to Enter the DataGenius Challenge
How to Enter the DataGenius ChallengeSAP Analytics
 
Introduction to-erp next
Introduction to-erp nextIntroduction to-erp next
Introduction to-erp nextNafisurRahman7
 
Vendor management software
Vendor management softwareVendor management software
Vendor management softwareRrahul Sethi
 
Introduction to ERPNext (2015)
Introduction to ERPNext (2015)Introduction to ERPNext (2015)
Introduction to ERPNext (2015)rushabh_mehta
 

What's hot (12)

Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana Practical steps to a smooth transition to hana
Practical steps to a smooth transition to hana
 
SAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA Webinar
SAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA WebinarSAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA Webinar
SAP GVP Sven Denecken Kicks Off Premier Panaya-SAP S/4HANA Webinar
 
Understanding the value of agility in the cloud
Understanding the value of agility in the cloud  Understanding the value of agility in the cloud
Understanding the value of agility in the cloud
 
S4 HANA Webinar
S4 HANA WebinarS4 HANA Webinar
S4 HANA Webinar
 
S4 hana introduction2
S4 hana introduction2S4 hana introduction2
S4 hana introduction2
 
SAP Certified Basis Monitoring
SAP Certified Basis MonitoringSAP Certified Basis Monitoring
SAP Certified Basis Monitoring
 
DPM Overview Soasta Partners.pptx
DPM Overview Soasta Partners.pptxDPM Overview Soasta Partners.pptx
DPM Overview Soasta Partners.pptx
 
What is ERPNext?
What is ERPNext?What is ERPNext?
What is ERPNext?
 
How to Enter the DataGenius Challenge
How to Enter the DataGenius ChallengeHow to Enter the DataGenius Challenge
How to Enter the DataGenius Challenge
 
Introduction to-erp next
Introduction to-erp nextIntroduction to-erp next
Introduction to-erp next
 
Vendor management software
Vendor management softwareVendor management software
Vendor management software
 
Introduction to ERPNext (2015)
Introduction to ERPNext (2015)Introduction to ERPNext (2015)
Introduction to ERPNext (2015)
 

Viewers also liked

Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Digital Transformation in Higher Education - The Changing Student Relationship
Digital Transformation in Higher Education - The Changing Student RelationshipDigital Transformation in Higher Education - The Changing Student Relationship
Digital Transformation in Higher Education - The Changing Student RelationshipAndy Steer
 
Oracle on premises and oracle cloud - how to coexist webinar
Oracle on premises and oracle cloud  - how to coexist webinarOracle on premises and oracle cloud  - how to coexist webinar
Oracle on premises and oracle cloud - how to coexist webinarPanaya
 
Elevate to Postmodern ERP Testing
Elevate to Postmodern ERP TestingElevate to Postmodern ERP Testing
Elevate to Postmodern ERP TestingPanaya
 
SAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP SecuritySAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP SecurityPanaya
 
Panaya Test Center – Auf zu postmodernem ERP Testing
Panaya Test Center – Auf zu postmodernem ERP TestingPanaya Test Center – Auf zu postmodernem ERP Testing
Panaya Test Center – Auf zu postmodernem ERP TestingPanaya
 
11 Digital Transformation Quotes To Lead Change & Inspire Action
11 Digital Transformation Quotes To Lead Change & Inspire Action11 Digital Transformation Quotes To Lead Change & Inspire Action
11 Digital Transformation Quotes To Lead Change & Inspire Actionkintone
 
Panaya test center webinar ANZ
Panaya test center webinar ANZPanaya test center webinar ANZ
Panaya test center webinar ANZNoa Farber
 
Comment améliorer les tests de flux transverses à vos applications métiers ?
Comment améliorer les tests de flux transverses à vos applications métiers ?Comment améliorer les tests de flux transverses à vos applications métiers ?
Comment améliorer les tests de flux transverses à vos applications métiers ?Panaya
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 

Viewers also liked (11)

Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Digital Transformation in Higher Education - The Changing Student Relationship
Digital Transformation in Higher Education - The Changing Student RelationshipDigital Transformation in Higher Education - The Changing Student Relationship
Digital Transformation in Higher Education - The Changing Student Relationship
 
Oracle on premises and oracle cloud - how to coexist webinar
Oracle on premises and oracle cloud  - how to coexist webinarOracle on premises and oracle cloud  - how to coexist webinar
Oracle on premises and oracle cloud - how to coexist webinar
 
Elevate to Postmodern ERP Testing
Elevate to Postmodern ERP TestingElevate to Postmodern ERP Testing
Elevate to Postmodern ERP Testing
 
SAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP SecuritySAP Security Chat Tips to Improve SAP ERP Security
SAP Security Chat Tips to Improve SAP ERP Security
 
Panaya Test Center – Auf zu postmodernem ERP Testing
Panaya Test Center – Auf zu postmodernem ERP TestingPanaya Test Center – Auf zu postmodernem ERP Testing
Panaya Test Center – Auf zu postmodernem ERP Testing
 
11 Digital Transformation Quotes To Lead Change & Inspire Action
11 Digital Transformation Quotes To Lead Change & Inspire Action11 Digital Transformation Quotes To Lead Change & Inspire Action
11 Digital Transformation Quotes To Lead Change & Inspire Action
 
Panaya test center webinar ANZ
Panaya test center webinar ANZPanaya test center webinar ANZ
Panaya test center webinar ANZ
 
Comment améliorer les tests de flux transverses à vos applications métiers ?
Comment améliorer les tests de flux transverses à vos applications métiers ?Comment améliorer les tests de flux transverses à vos applications métiers ?
Comment améliorer les tests de flux transverses à vos applications métiers ?
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 

Similar to Are you putting your organization at risk?

Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
Optimizing Your Application Security Program with Netsparker and ThreadFix
Optimizing Your Application Security Program with Netsparker and ThreadFixOptimizing Your Application Security Program with Netsparker and ThreadFix
Optimizing Your Application Security Program with Netsparker and ThreadFixDenim Group
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricRahul Neel Mani
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataEnterprise Management Associates
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...Tunde Ogunkoya
 
Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...Denim Group
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksSAP Customer Experience
 
S/4HANA Simple Finance - The C-Level Pleaser - UK Edition
S/4HANA Simple Finance - The C-Level Pleaser - UK EditionS/4HANA Simple Finance - The C-Level Pleaser - UK Edition
S/4HANA Simple Finance - The C-Level Pleaser - UK EditionPanaya
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and GovernanceSAP Analytics
 
APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...
APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...
APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...apidays
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudDr. Wilfred Lin (Ph.D.)
 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New ScopeThreatConnect
 
5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...Enterprise Management Associates
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityDistil Networks
 
TLV - MySQL Security overview
TLV - MySQL Security overviewTLV - MySQL Security overview
TLV - MySQL Security overviewMark Swarbrick
 
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...Denim Group
 

Similar to Are you putting your organization at risk? (20)

Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Optimizing Your Application Security Program with Netsparker and ThreadFix
Optimizing Your Application Security Program with Netsparker and ThreadFixOptimizing Your Application Security Program with Netsparker and ThreadFix
Optimizing Your Application Security Program with Netsparker and ThreadFix
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
 
Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
S/4HANA Simple Finance - The C-Level Pleaser - UK Edition
S/4HANA Simple Finance - The C-Level Pleaser - UK EditionS/4HANA Simple Finance - The C-Level Pleaser - UK Edition
S/4HANA Simple Finance - The C-Level Pleaser - UK Edition
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 
APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...
APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...
APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New Scope
 
5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
 
TLV - MySQL Security overview
TLV - MySQL Security overviewTLV - MySQL Security overview
TLV - MySQL Security overview
 
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
 

More from Panaya

Sap security webinar- dach
Sap security webinar- dachSap security webinar- dach
Sap security webinar- dachPanaya
 
Campaign overview (1)
Campaign overview (1)Campaign overview (1)
Campaign overview (1)Panaya
 
Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...
Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...
Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...Panaya
 
Webinar: Gartner Predicts New Challenges of SAP Change Management
Webinar: Gartner Predicts New Challenges of SAP Change ManagementWebinar: Gartner Predicts New Challenges of SAP Change Management
Webinar: Gartner Predicts New Challenges of SAP Change ManagementPanaya
 
SteveMo Webinar: Hit a Home Run with Formula & Analytics Tricks
SteveMo Webinar: Hit a Home Run with Formula & Analytics TricksSteveMo Webinar: Hit a Home Run with Formula & Analytics Tricks
SteveMo Webinar: Hit a Home Run with Formula & Analytics TricksPanaya
 
SAP Fiori:Value from Enabling Mobile Access to Common SAP Function
SAP Fiori:Value from Enabling Mobile Access to Common SAP FunctionSAP Fiori:Value from Enabling Mobile Access to Common SAP Function
SAP Fiori:Value from Enabling Mobile Access to Common SAP FunctionPanaya
 
SAP EHP7 how to avoid the pitfalls
SAP EHP7 how to avoid the pitfallsSAP EHP7 how to avoid the pitfalls
SAP EHP7 how to avoid the pitfallsPanaya
 
ABAP Webinar
ABAP WebinarABAP Webinar
ABAP WebinarPanaya
 

More from Panaya (8)

Sap security webinar- dach
Sap security webinar- dachSap security webinar- dach
Sap security webinar- dach
 
Campaign overview (1)
Campaign overview (1)Campaign overview (1)
Campaign overview (1)
 
Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...
Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...
Master S4/HANA Webinar Series – An in-depth look at the ERP pains S4/HANA add...
 
Webinar: Gartner Predicts New Challenges of SAP Change Management
Webinar: Gartner Predicts New Challenges of SAP Change ManagementWebinar: Gartner Predicts New Challenges of SAP Change Management
Webinar: Gartner Predicts New Challenges of SAP Change Management
 
SteveMo Webinar: Hit a Home Run with Formula & Analytics Tricks
SteveMo Webinar: Hit a Home Run with Formula & Analytics TricksSteveMo Webinar: Hit a Home Run with Formula & Analytics Tricks
SteveMo Webinar: Hit a Home Run with Formula & Analytics Tricks
 
SAP Fiori:Value from Enabling Mobile Access to Common SAP Function
SAP Fiori:Value from Enabling Mobile Access to Common SAP FunctionSAP Fiori:Value from Enabling Mobile Access to Common SAP Function
SAP Fiori:Value from Enabling Mobile Access to Common SAP Function
 
SAP EHP7 how to avoid the pitfalls
SAP EHP7 how to avoid the pitfallsSAP EHP7 how to avoid the pitfalls
SAP EHP7 how to avoid the pitfalls
 
ABAP Webinar
ABAP WebinarABAP Webinar
ABAP Webinar
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Are you putting your organization at risk?

  • 1. © Panaya | An Infosys company PANAYA Oracle EBS is vulnerable to security breaches and hacking Panaya Webinar
  • 2. © Panaya | An Infosys company PANAYA Eyal Diamant Director, Oracle Product Management Panaya Rafi Kretchmer Today’s SpeakersPANAYA WEBINAR VP Marketing Panaya 2
  • 3. © Panaya | An Infosys company PANAYA AgendaPANAYA WEBINAR Challenges in organizations’ security1 Security risks in your Oracle EBS system2 Changing the paradigm3 3
  • 4. © Panaya | An Infosys company PANAYA All phone lines have been muted Please use the Question Panel There will be 3 short polls during the webinar We are recording this webinar Polls results and recording will be provided in a follow-up email as well as any questions we don’t have time to answer HousekeepingPANAYA WEBINAR 4
  • 5. © Panaya | An Infosys company PANAYA = Average cost of cyber crime incident for a US company (Source: Ponemon Institute) There were successful cyber attacks in 2015 (Source: Ponemon Institute) 99 $15.4M PANAYA5
  • 6. © Panaya | An Infosys company PANAYA ERP security risks – are you liable? PANAYA6
  • 7. © Panaya | An Infosys company PANAYA PANAYA POLL 1/3 PANAYA
  • 8. © Panaya | An Infosys company PANAYA 70% of EBS systems are at risk Is your EBS system secure? PANAYA8
  • 9. © Panaya | An Infosys company PANAYA9 Oracle EBS – Exposure to RiskPANAYA WEBINAR
  • 10. © Panaya | An Infosys company PANAYA When you see it, it’s too late. When you see it, it’s too late. PANAYA10
  • 11. © Panaya | An Infosys company PANAYA CPU Q3 2015 CVE-2015 4743 CVE-2015 4765 Safe CPU Q3 2014 CVE-2014 4235 CVE-2014 4213 CPU Q4 2014 CVE-2014 6561 CVE-2014 6479 CPU Q1 2015 CVE-2014 0504 CVE-2014 0489 CPU Q2 2015 CVE-2015 0504 CVE-2015 0489 CVE=Common Vulnerabilities and Exposures 11 Org. 1 – Low Exposure to RiskPANAYA WEBINAR
  • 12. © Panaya | An Infosys company PANAYA CPU Q3 2015 CVE-2015 4743 CVE-2015 4765 CPU Q3 2014 CVE-2014 4235 CVE-2014 4213 CPU Q4 2014 CVE-2014 6561 CVE-2014 6479 CVE-2014 0504 CVE-2014 0489 CPU Q2 2015 CVE-2015 0504 CVE-2015 0489 CPU Q1 2015 CVE-2015-4743 Description : Unspecified vulnerability in the Oracle Applications DBA component in Oracle E-Business Suite 12.2.3 allows remote authenticated users to affect confidentiality via unknown vectors related to AD Utilities. Link to Bug : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4743 Link to Source: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html 12 Org. 2 – High Exposure to RiskPANAYA WEBINAR
  • 13. © Panaya | An Infosys company PANAYA PANAYA POLL 2/3 PANAYA
  • 14. © Panaya | An Infosys company PANAYA Modules you don’t use are more vulnerable to security breaches. PANAYA14
  • 15. © Panaya | An Infosys company PANAYA Curious how you stand compared to your industry benchmark? 15
  • 16. © Panaya | An Infosys company PANAYA Distribution of Oracle EBS customers according to Time-to-Patch 16
  • 17. © Panaya | An Infosys company PANAYA PANAYA POLL 3/3 PANAYA
  • 18. © Panaya | An Infosys company PANAYA Evaluating the industry standards for MTTP of security and compliance patches 1 Analyzing your code, usage, and patch level of your current system and defining your EBS risk level 2 Lists recommended patches for external risk reduction No more guess work: we will tell you which patches you need to install and their impact 3 4 PANAYA How Panaya helps reduce your risk level 18
  • 19. © Panaya | An Infosys company PANAYA RECOMMENDATIONS YOU THE MARKET THE VENDOR How do we do it?Panaya patch recommendation engine 19
  • 20. © Panaya | An Infosys company PANAYA Q&A 20
  • 21. © Panaya | An Infosys company PANAYA Summary – How Panaya Helps You PANAYA Constantly analyzes the latest security patches for you – so you will know exactly what you need to do 1 Builds a personalized risk base test plan so you will know exactly what will be the impact of this patch on your system 2 Helps you to be more proactive and reduces the time your organization is at risk – Improve MTTP Gives visibility to your executives how you reduce company risk level without adding additional resources 3 4 21
  • 22. © Panaya | An Infosys company PANAYA Curious how you stand compared to your industry benchmark? 22
  • 23. © Panaya | An Infosys company PANAYA USA Germany Israel Japan Australia 23

Editor's Notes

  1. Nowadays, security is on everyone’s mind. The costs of cyber crimes are increasing yearly. In 2015, a cyber crime incident in the United States costs a company an average of $15.4 million. This is an increase of 20% from 2014. Not only are the costs are rising, the number of successful attacks have also increased by 46% in the past 4 years. In 2015, companies faced to 99 security breaches. As a result, companies spend billions of dollars to protect their system and data from security breaches Especially in public companies that are under regulations, security is mandatory and part of the company’s responsibility Security is complex because it is a moving target, and organizations are having a hard time staying ahead of the game and minimizing ongoing risk In addition to that , We can see 2 major trends that increase security risk Self service – more and more services provided by the organization are becoming digital and self-served And - 2. The move to the Cloud – we are in a time of migrating systems to the cloud. It is transition time, where organization use both on-premise and cloud solutions, increasing exposure as data integrates between different systems
  2. Roni flow: You may not be aware, but security affects how organizations perceive your role and responsibilities. Not just yours, but everyone’s. Especially in companies that are regulated, if an employee suspects a security issue, he or she must report it. C-level executives have a personal responsibility on any security issue that can impact the organization. After the famous Target breach, both the CEO and CIO resigned. New roles have been created – CSO and CISO, to own security within organizations. The ERP world is not immune to security liability. And this is why we are here today. The purpose of this webinar is to show you how to reduce ERP security risks
  3. Did your organization assign a C-level role (Like a CSO or CISO) to manage the security effort? Yes No I Don’t Know We will wait a few moments allow everyone to answer the question … Thank you. I will now pass the microphone back to my colleague Eyal.
  4. Now, let’s cut to the chase: We are here to talk about ERP. Is your ERP secure? External security and compliance vulnerability are becoming a major concern for organizations’ executives – we talked about that And Oracle E-business Suite is not an island - it is exposed to major security and compliance threats throughout its entire lifecycle Having access to many organizations, we at Panaya conducted our own research and found out two amazing facts – Everyone thinks they are 100% covered – at least that’s what they tell us 70% of Oracle EBS shops don’t install security and compliance updates (Patches) that are necessary to keep the EBS safe 5. Yes, you heard me correctly: 70%! 6. Patches should be implemented on an ongoing basis to reduce external risks. Not installing patches is like leaving the door open when you leave your house. 7. We also found out that the 2 main reasons organizations don’t install the patch are Awareness – Some ERP managers look at the ERP as an internal system that doesn’t have major security risk Effort – ERP managers conclude that the risk is not worth the effort associated with an unpatched system. As a result, patch installation is almost always delayed.
  5. Roni flow: The challenge with security risks is that they are not static. The risk is growing every minute you do not attend to the solution. Oracle realizes that not only there are new security risks every day, but that a solution must be provided fast and on an ongoing basis This is why Oracle provides the Security Patch on a quarterly basis (CPU) An organization that does not install the patch on time, has a growing security gap To emphasize, since this is not a static risk – every day an ERP Manager is late on installing the security patch, he or she is putting their organization in a growing risk
  6. Roni flow: It’s a challenge – because it is not a problem you can SEE. But you need to remember that it’s there. If you have a problem in production, this will not be solved until you install the needed patches , but with security patch although the gap is growing, it’s not something that you can actually see - until is too late
  7. Roni flow: 1. Let’s look at an example. This is a good example. You can see here Oracle release CPU ( Security patches ) on a quarterly basis Each patches include the list of Security valuation that the patch will cover , this is called CVE CVE - Common Vulnerabilities and Exposures. It is The Standard for Information Security Vulnerability. In this example the organization installed the needed patch on time so the organization’s risk is low.
  8. Here’s another example. This organization didn’t install the needed patches and the security gap is growing. As you can see in this example, each patch that the organization didn’t install includes the CVE , that are actual security risk that are currently not covered This is not a list of patches that were not installed, but REAL security risks that exist in the EBS system Each CVE that is associated with the patch includes the object that is in risk Some organizations believe that if they don’t use this object, they can ignore this patch But it is actually the opposite, especially in areas that you don’t use, this is where you are most vulnerable for attacks So its doesn't really matter if you use this module or you don’t, you must install any security patch Oracle release
  9. Would you like to receive a 1-on-1 demo of Panaya CloudQuality Suite™ and see how Panaya can help you improve the way your organization handles EBS Security issues Yes No Thanks We will wait a few moments allow everyone to answer the question … Thank you. I will now pass the microphone back to my colleague Eyal.
  10. Just to reiterate, if there’s one thing to remember, here it is Do not ignore the patch! You should install it anyway. Your EBS is more vulnerable in modules you don’t use.
  11. So, we talked about the challenges of keeping your Oracle EBS safe, and how you can reduce the risk by installing the needed patches. We thought what we at Panaya can do to help you get on the fast track – give you a faster way to know what you should be doing first to reduce your EBS security risks. Panaya analyzes hundreds of organizations every month. We are offering you access to this data, which can tell you how your organization stands compared to your industry, and what are the immediate steps you should take in order to be aligned with the industry standards. At the end f the webinar we will give you access to our application which will analyze the status of your organization based on a few questions, andwillshow you how you can quickly reduce your EBS security risks. Stay tuned.
  12. Until now we talk about the important of installing security patches to reduce security risk Now, with your permission, I would like to cover another topic : the time between the patch release date and the day that you actually install the patch It is a new KPI that is starting to be a standard, called MTTP - Mid Time To Patch , the time its take to the organization to install any security patch But what we actually can see is that the market standard for MTTP is days or even hours but - for Oracle EBS customers its mainly months You can see in the graph we make , that most of the Oracle EBS Shops are lagging behind and most of the are located in the Yellow or Orange area , what mean that its take the, too much time to install the security patches In security topics you are always challenged, so it is advised to know the industry standard – and where you stand compared to the benchmark Staying aligned with the market, improving your MTTP, and minimizing the time its takes your organization to install the needed security patches And this is exactly what Panaya can help you with
  13. Did your organization implement one of the Oracle cloud solutions and integrate it with the Oracle EBS Yes Yes – With Oracle ERP Cloud Yes- With Oracle HCM Cloud No I Don’t Know We will wait a few moments allow everyone to answer the question … Thank you. I will now pass the microphone back to my colleague Eyal.
  14. - Panaya evaluates the industry-standards for MTTP (MinTime To Patch) of security and compliance patches, as well as all Oracle’s relevant patches as they are released - Panaya analyzes your code, usage and patch level of your current system and defines your EBS risk level List of recommended patches for external risk reduction is provided & lean work plan to install them with no side-effects on production (what to test and what to install ) - No need to guess anymore Panaya will tell you which patches you need to install and what exactly will be the impact of those patches in your system
  15. So lets see how we do it In order to know what you need to do in order to keep your EBS system safe we Panaya analyzed 3 main factors The Vendor – what are the latest patched that the vendor release for the different version and what are the risks included in each patch The Market – what is the market behavior regarding security patch installation mainly around the MTTP , what is the recommended gap between the day the vendor release the patch and the day you install this patch Your Organization – Panaya analysis int a generic one each organization is different and the impact of the same patch on different organization can be totally different So Panaya will build a personalized set of Recommendation that will include Which patch you need to install What is the correct time frame you need to act What will be the impact of this specific patch on you existing EBS system
  16. As we promise In the end of this webinar we will share a with you a web application that will help you to know what you need to do in order improve your EBS security level
  17.   Question #