SlideShare a Scribd company logo
1 of 26
Confidential
MAY 2017
Secure HANA in the Cloud |
Mitigating Internal & External Threats
Scott Goolik, VP of Compliance & Security | Symmetry
Tom Evgey, Director of Cloud | Onapsis
Confidential
Agenda
§ Introducing Symmetry & Onapsis
§ Evolution of SAP Security
§ Recent trends in SAP security & SAP Cybersecurity
§ Considerations for moving to the cloud
§ Mitigating risk with the Onapsis Security Platform
§ Questions
©2017 Symmetry
Confidential
24x7x365
Full-time
Employees
U.S. based
Global
Customers
Industry Roots
Symmetry was founded in 1996 and has
since grown to become one of the larger
privately held application management
and cloud hosting firms in the United
States.
Longtime Certified SAP Partner
Center of Excellence -
Milwaukee, Wis.
Enterprise Hosting
In 2005, Symmetry began providing
comprehensive hosting and managed
services to customers and is now a leader in
enterprise application hosting services.
Investing in next generation cloud platform
that also support HANA
Symmetry SAP HANA Cloud
Symmetry is a LEADER in SAP HANA
technologies, with dedicated hardware to host
true ‘Pay as you Grow’ cloud model.
Dedicated Support
Symmetry’s reputation for providing excellence in
customer service is proven by our NPS rating of 57
(2015 survey results), providing direct access to a
team familiar with your systems, backed by a
24x7x365 help desk.
GRC
Always Audit Ready
Founded in 2009, Symmetry’s GRC software is built
and supported by GRC and audit professionals.
Symmetry’s robust GRC in-house solution provides
complete compliance automation.
Who is Symmetry?
©2017 Symmetry
@2017 Onapsis, Inc. All Rights Reserved
ONAPSIS: COMPANY HIGHLIGHTS
Onapsis: Keeping Business-Critical Applications Secure & Compliant
Market Leaders
First-movers focused on Fortune
2000 and Federal organizations;
over 200 customers
Thought Leaders
Dedicated in-house Research Labs;
discovered over 500
vulnerabilities and attack vectors
Patented Technology
Awarded patent covering
underlying critical algorithms and
capabilities
Experienced Management
Successful executives from IBM,
RSA, EMC, Sophos, Amazon.com
Backed by Leading Investors
.406 Ventures, Schlumberger,
Evolution, Arsenal, Endeavor
Board of Directors & Advisors
Sr VP, Booz Allen CISO Schlumberger,
former AVG CEO, CTO Veracode
Sustained Hyper-Growth: 4th consecutive year of 100%+ YoY ARR & Bookings growth
@2017 Onapsis, Inc. All Rights Reserved
The industry’s leading intelligence on security threats affecting
SAP and Oracle Business-Critical Applications
THE ONAPSIS RESEARCH LABS
Helped secure over
500 SAP and Oracle
flaws to date,
including 100+
affecting SAP HANA
Worked hand in hand
with the DHS on the
first-ever US-CERT
Alert for SAP
Business Applications
Regularly invited to
speak at leading
Security, SAP and
Oracle conferences
around the world
(BlackHat, RSA,
Defcon, SANS, etc)
Provide the Onapsis
Security Platform and
Onapsis Customers
with Advanced Threat
Intelligence and
market trends
THE EVOLUTION OF SAP SECURITY
Confidential
Business Critical Application Security
ERP Systems & Business-Critical Applications = The Crown Jewels
Intellectual Property
High value industry data
Sensitive Customer Information
High value customer data
Business Trade Secrets
Competitive Insights
Treasury and Cash
Corporate bank accounts
Financial Reporting Insights
Inside financial information
Sensitive Employee Information
High volume employee data
Network Front Door
Access point to the corporate network
Life Blood of the Business
Single point of operational failure
©2017 Symmetry
Confidential
Traditional SAP Security Challenges
©2017 Symmetry
§ What challenges faced when
managing…
§ SAP security workloads?
§ complex SAP security questions?
§ Audit and compliance requirements?
§ How does your organization
address…
§ Segregation of Duties?
§ User Provisioning?
§ Role Changes?
§ Emergency Access?
Confidential
Traditional SAP Security Challenges
Mitigating Risk with ControlPanelGRC
§ Managed SAP Security Services
§ Deep technical expertise with customer-first mindset
§ ControlPanelGRC
§ Symmetry’s proprietary compliance automation solution
for SAP environments
§ Automated compliance processes reduce risks
§ Compliant User Provisioning
§ Compliant Role Management
§ Emergency Access Management
§ Audit & Compliance Reporting
©2017 Symmetry
Managed SAP Security + ControlPanelGRC = Lower Cost + Greater Value
RECENT TRENDS IN SAP CYBERSECURITY
@2017 Onapsis, Inc. All Rights Reserved
THE THREAT LANDSCAPE
The Escalation of SAP Security Attacks
Anonymous claimed breach to
Greek Ministry of Finance
using SAP zero-day exploit
2012
A malware targeting SAP
systems discovered in the wild
- A “Tsunami of SAP Attacks
Coming?”
2013
A Chinese hacker exploited a
vulnerability in a corporate
SAP NetWeaver Portal.
2014
2015
Report: Chinese Breach of
USIS targeted SAP. Went
unnoticed for over six months
and compromised over 48,000
employee records of DHS and
OPM.
First ever US-CERT Alert for
cybersecurity of SAP business
applications released
2016
@2017 Onapsis, Inc. All Rights Reserved
May ‘16: DHS Released Critical Alert on SAP Cyberattacks
THE THREAT LANDSCAPE
Onapsis Research Labs discovered 36 organizations worldwide
being exploited through a 5-year-old SAP vulnerability
Onapsis worked very closely and confidentially with US
Department of Homeland Security resulting in the US DHS CERT-
Alert TA16--132A
Onapsis released a detailed Threat Report to help customers:
• Explain the nature of the US-CERT Alert
• Determine if they are susceptible to the vulnerability
• Mitigate this vulnerability in their SAP Implementation
@2017 Onapsis, Inc. All Rights Reserved
PONEMAN RESEARCH REPORT
Key Findings
92%
92% indicated an SAP breach
would be serious, very
serious or catastrophic
65%
65% said their SAP System
was breached at least once
in the past 24 months
$4.5M
Average cost to take
SAP offline was $4.5M
per incident
47%
47% indicated they were “not
confident” or had “no confidence”
that they could detect an SAP
breach within a year
CONSIDERATIONS FOR MOVING TO THE CLOUD
@2017 Onapsis, Inc. All Rights Reserved
• Many leading Organizations are already running in the cloud
• WHY ORGANIZATIONS MOVE TO THE CLOUD
• Saves on space and money required to buy and host hardware
• Makes it possible for users to access data, applications and services over the internet
• Gives users and employees the ability to work anywhere
• Employee collaboration capabilities
• Quicker and more cost effective scaling of environments
• Free or cost effective IT management and updates
• Perceived security of cloud environments
TYPES OF CLOUD DEPLOYMENTS
@2017 Onapsis, Inc. All Rights Reserved
• Hosting deployments for SAP, SAP HANA & Traditional Workloads
• Managed Private Cloud
o A secure cloud based environment managed directly by Symmetry
• available as Dedicated Private Cloud or Virtual Private Cloud
o Engineered to deliver performance and security for complex enterprises with a compliant-ready
foundation for a variety of security control points
• Hybrid Cloud
o A combination of Private and Public cloud environments designed specifically for your needs
SAP CLOUD SECURITY ISSUES
@2017 Onapsis, Inc. All Rights Reserved
• CLOUD SECURITY ISSUES
• Complex migration process
• Data Breaches
• Data Loss
• Insecure APIs and Connections
• Malicious Insiders
• Insufficient Due Diligence
• Shared Technology
• Agreeing to someone else's security standards
MITIGATING RISKS WITH
THE ONAPSIS SECURITY PLATFORM
@2017 Onapsis, Inc. All Rights Reserved@2017 Onapsis, Inc. All Rights Reserved
The first cybersecurity solution that automates vulnerability
management, insider and outsider threat detection and
response, and audit and compliance monitoring for SAP systems
By partnering with Onapsis, your enterprise can unlock new
security and compliance capabilities in three key areas:
AUTOMATE
Continuous vulnerability scanning and alerts
proactively identify and bring attention to
misconfigurations, insider and outsider threats.
Improve work flows to reduce resources
committed to audit and compliance data tasks.
Compensating controls help satisfy regulators and
maintain compliance between audits.
INTEGRATE ANTICIPATE
Implementation and customer success services
accelerate the maturity of an enterprise’s
cybersecurity organization.
Custom data links feed your existing SIEM tools,
such as Splunk and QRadar, to provide a unified
view of risk.
SAP-certified add-on assures BASIS teams of
system compatibility.
Onapsis Research Labs provides industry-defining
threat intelligence to prepare our customers for
what’s next.
Research feeds development of new features to
address emerging needs.
More than 350 SAP and Oracle vulnerabilities
reported to date.
THE ONAPSIS SECURITY PLATFORM
ONAPSIS & SYMMETRY SOLUTIONS
Confidential
Conclusion
§ Symmetry mitigates risks for internal threats
§ Managed SAP Security Services
§ ControlPanelGRC – a proprietary compliance automation platform
§ Onapsis identifies risks from external threats
§ Identification of critical SAP security notes
§ Continuous vulnerability and configuration scanning
§ Symmetry Managed SAP Basis Services mitigates identified risks
©2017 Symmetry
Confidential
Symmetry + Onapsis
©2017 Symmetry
Segregation of
Duties
Emergency Access
Management
Identity
Management
User Provisioning
Continuous
Monitoring
User Activity
Monitoring
Compliance
Monitoring
SAP Platform
Security
Configurations
Security Patches
Interfaces
Real-time Detection
of Cyber-Attacks
Virtual Patching
Research & Advance
Threat Intelligence
Integration with
Customer Ecosystem
Custom Code Static
Analysis
ControlPanelGRC
Onapsis Security Platform
Managed SAP Security Services
Managed SAP Basis Services
Managed Cloud Platform
COMPLETE security coverage
Confidential©2017 Symmetry
Questions?
Confidential©2017 Symmetry
THANK YOU
Follow us on @Symmetry_Corp & @Onapsis

More Related Content

What's hot

Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
 Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPTAmazon Web Services
 
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAmazon Web Services
 
Enterprise DevOps: Begin with Production-Ready Migration (ENT217-R1) - AWS re...
Enterprise DevOps: Begin with Production-Ready Migration (ENT217-R1) - AWS re...Enterprise DevOps: Begin with Production-Ready Migration (ENT217-R1) - AWS re...
Enterprise DevOps: Begin with Production-Ready Migration (ENT217-R1) - AWS re...Amazon Web Services
 
Cloud Choices Quantifying the Cost and Risk Implications of Cloud
Cloud Choices Quantifying the Cost and Risk Implications of CloudCloud Choices Quantifying the Cost and Risk Implications of Cloud
Cloud Choices Quantifying the Cost and Risk Implications of CloudAmazon Web Services
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAmazon Web Services
 
Making Self-Service BI a Reality in the Enterprise
Making Self-Service BI a Reality in the EnterpriseMaking Self-Service BI a Reality in the Enterprise
Making Self-Service BI a Reality in the EnterpriseCloudera, Inc.
 
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...Amazon Web Services
 
SplunkLive! London 2016 Splunk for IT Ops
SplunkLive! London 2016 Splunk for IT OpsSplunkLive! London 2016 Splunk for IT Ops
SplunkLive! London 2016 Splunk for IT OpsSplunk
 
Combining ERP, Public Cloud and Cybersecurity
Combining ERP, Public Cloud and CybersecurityCombining ERP, Public Cloud and Cybersecurity
Combining ERP, Public Cloud and CybersecurityPete Nieminen
 
Lessons Learned Scaling Your Talent Transformation
Lessons Learned Scaling Your Talent TransformationLessons Learned Scaling Your Talent Transformation
Lessons Learned Scaling Your Talent TransformationAmazon Web Services
 
Improve Productivity with Continuous Integration & Delivery
Improve Productivity with Continuous Integration & DeliveryImprove Productivity with Continuous Integration & Delivery
Improve Productivity with Continuous Integration & DeliveryAmazon Web Services
 
AWS Security Week: Threat Detection & Remediation Workshop
AWS Security Week: Threat Detection & Remediation WorkshopAWS Security Week: Threat Detection & Remediation Workshop
AWS Security Week: Threat Detection & Remediation WorkshopAmazon Web Services
 
2016 AWS Life Sciences Day | New Jersey – July 26th, 2016
2016 AWS Life Sciences Day | New Jersey – July 26th, 20162016 AWS Life Sciences Day | New Jersey – July 26th, 2016
2016 AWS Life Sciences Day | New Jersey – July 26th, 2016Amazon Web Services
 
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSHow Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSAmazon Web Services
 
Security Operations in the Cloud
Security Operations in the CloudSecurity Operations in the Cloud
Security Operations in the CloudArmor
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSAmazon Web Services
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Splunk
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityDoug Copley
 

What's hot (20)

Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
 Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
 
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
 
Enterprise DevOps: Begin with Production-Ready Migration (ENT217-R1) - AWS re...
Enterprise DevOps: Begin with Production-Ready Migration (ENT217-R1) - AWS re...Enterprise DevOps: Begin with Production-Ready Migration (ENT217-R1) - AWS re...
Enterprise DevOps: Begin with Production-Ready Migration (ENT217-R1) - AWS re...
 
Cloud Choices Quantifying the Cost and Risk Implications of Cloud
Cloud Choices Quantifying the Cost and Risk Implications of CloudCloud Choices Quantifying the Cost and Risk Implications of Cloud
Cloud Choices Quantifying the Cost and Risk Implications of Cloud
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About Compliance
 
Making Self-Service BI a Reality in the Enterprise
Making Self-Service BI a Reality in the EnterpriseMaking Self-Service BI a Reality in the Enterprise
Making Self-Service BI a Reality in the Enterprise
 
12 Steps to Cloud
12 Steps to Cloud12 Steps to Cloud
12 Steps to Cloud
 
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
SplunkLive! London 2016 Splunk for IT Ops
SplunkLive! London 2016 Splunk for IT OpsSplunkLive! London 2016 Splunk for IT Ops
SplunkLive! London 2016 Splunk for IT Ops
 
Combining ERP, Public Cloud and Cybersecurity
Combining ERP, Public Cloud and CybersecurityCombining ERP, Public Cloud and Cybersecurity
Combining ERP, Public Cloud and Cybersecurity
 
Lessons Learned Scaling Your Talent Transformation
Lessons Learned Scaling Your Talent TransformationLessons Learned Scaling Your Talent Transformation
Lessons Learned Scaling Your Talent Transformation
 
Improve Productivity with Continuous Integration & Delivery
Improve Productivity with Continuous Integration & DeliveryImprove Productivity with Continuous Integration & Delivery
Improve Productivity with Continuous Integration & Delivery
 
AWS Security Week: Threat Detection & Remediation Workshop
AWS Security Week: Threat Detection & Remediation WorkshopAWS Security Week: Threat Detection & Remediation Workshop
AWS Security Week: Threat Detection & Remediation Workshop
 
2016 AWS Life Sciences Day | New Jersey – July 26th, 2016
2016 AWS Life Sciences Day | New Jersey – July 26th, 20162016 AWS Life Sciences Day | New Jersey – July 26th, 2016
2016 AWS Life Sciences Day | New Jersey – July 26th, 2016
 
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSHow Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWS
 
Security Operations in the Cloud
Security Operations in the CloudSecurity Operations in the Cloud
Security Operations in the Cloud
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
 

Similar to Secure HANA in the Cloud | Mitigating Internal & External Threats

Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksSAP Customer Experience
 
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?michelemanzotti
 
SAP Landscape Security
SAP Landscape SecuritySAP Landscape Security
SAP Landscape SecurityJoachim Kaland
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP SystemsOnapsis Inc.
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...Tunde Ogunkoya
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC) 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)Onapsis Inc.
 
Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Tunde Ogunkoya
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and GovernanceSAP Analytics
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWSAmazon Web Services
 
How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWSAmazon Web Services
 
Overview of SAP HANA Cloud Platform
Overview of SAP HANA Cloud PlatformOverview of SAP HANA Cloud Platform
Overview of SAP HANA Cloud PlatformVitaliy Rudnytskiy
 
Cyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsCyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsOnapsis Inc.
 
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...Dao Van Hang
 
Predictive analytics from a to z
Predictive analytics from a to zPredictive analytics from a to z
Predictive analytics from a to zalpinedatalabs
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis Inc.
 
Journey to analytics in the cloud
Journey to analytics in the cloudJourney to analytics in the cloud
Journey to analytics in the cloudSaama
 
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...Amazon Web Services
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 

Similar to Secure HANA in the Cloud | Mitigating Internal & External Threats (20)

Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
 
SAP Landscape Security
SAP Landscape SecuritySAP Landscape Security
SAP Landscape Security
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC) 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
 
Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 
How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWS
 
Overview of SAP HANA Cloud Platform
Overview of SAP HANA Cloud PlatformOverview of SAP HANA Cloud Platform
Overview of SAP HANA Cloud Platform
 
Cyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsCyber-attacks to SAP Systems
Cyber-attacks to SAP Systems
 
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
 
Predictive analytics from a to z
Predictive analytics from a to zPredictive analytics from a to z
Predictive analytics from a to z
 
protect4s-product-sheet
protect4s-product-sheetprotect4s-product-sheet
protect4s-product-sheet
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
 
Journey to analytics in the cloud
Journey to analytics in the cloudJourney to analytics in the cloud
Journey to analytics in the cloud
 
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 

More from Symmetry™

Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...
Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...
Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...Symmetry™
 
Carlisle Construction Materials: Value Achieved in Automated Controls in an S...
Carlisle Construction Materials: Value Achieved in Automated Controls in an S...Carlisle Construction Materials: Value Achieved in Automated Controls in an S...
Carlisle Construction Materials: Value Achieved in Automated Controls in an S...Symmetry™
 
An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...
An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...
An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...Symmetry™
 
Managed Hosting Buyer’s Checklist | Symmetry
Managed Hosting Buyer’s Checklist | SymmetryManaged Hosting Buyer’s Checklist | Symmetry
Managed Hosting Buyer’s Checklist | SymmetrySymmetry™
 
Roadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | SymmetryRoadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | SymmetrySymmetry™
 
SAP HANA® Deployment Guide | Symmetry
SAP HANA® Deployment Guide | SymmetrySAP HANA® Deployment Guide | Symmetry
SAP HANA® Deployment Guide | SymmetrySymmetry™
 
ControlPanelGRC® Security Risk Assessment | Symmetry
ControlPanelGRC® Security Risk Assessment | SymmetryControlPanelGRC® Security Risk Assessment | Symmetry
ControlPanelGRC® Security Risk Assessment | SymmetrySymmetry™
 
Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Symmetry™
 
Prevent SAP Security Vulnerabilities | Symmetry
Prevent SAP Security Vulnerabilities | SymmetryPrevent SAP Security Vulnerabilities | Symmetry
Prevent SAP Security Vulnerabilities | SymmetrySymmetry™
 
SAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySymmetry™
 
3 Ways to Future-Proof Your SAP® on IBM i Implementation
3 Ways to Future-Proof Your SAP® on IBM i Implementation3 Ways to Future-Proof Your SAP® on IBM i Implementation
3 Ways to Future-Proof Your SAP® on IBM i ImplementationSymmetry™
 
Simplifying the path to SAP Solution Manager 7.2 | Symmetry™
Simplifying the path to SAP Solution Manager 7.2 | Symmetry™Simplifying the path to SAP Solution Manager 7.2 | Symmetry™
Simplifying the path to SAP Solution Manager 7.2 | Symmetry™Symmetry™
 
Best Practices for SAP Access Controls | Symmetry™
Best Practices for SAP Access Controls | Symmetry™Best Practices for SAP Access Controls | Symmetry™
Best Practices for SAP Access Controls | Symmetry™Symmetry™
 
Compliant Cloud Hosting: What You Need to Know | Symmetry™
Compliant Cloud Hosting: What You Need to Know | Symmetry™Compliant Cloud Hosting: What You Need to Know | Symmetry™
Compliant Cloud Hosting: What You Need to Know | Symmetry™Symmetry™
 
Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™
Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™
Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™Symmetry™
 
Compliance Automation: The Complete Journey | Symmetry™
Compliance Automation: The Complete Journey | Symmetry™Compliance Automation: The Complete Journey | Symmetry™
Compliance Automation: The Complete Journey | Symmetry™Symmetry™
 
Symmetry and smartShift | Revolutionizing SAP® Technology Transformation
Symmetry and smartShift | Revolutionizing SAP® Technology TransformationSymmetry and smartShift | Revolutionizing SAP® Technology Transformation
Symmetry and smartShift | Revolutionizing SAP® Technology TransformationSymmetry™
 

More from Symmetry™ (17)

Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...
Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...
Delivering Unparalleled System Uptime and Peace-of-Mind For Critical Systems ...
 
Carlisle Construction Materials: Value Achieved in Automated Controls in an S...
Carlisle Construction Materials: Value Achieved in Automated Controls in an S...Carlisle Construction Materials: Value Achieved in Automated Controls in an S...
Carlisle Construction Materials: Value Achieved in Automated Controls in an S...
 
An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...
An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...
An SAP upgrade and HANA Cloud Case Study: Carlisle Construction Materials | S...
 
Managed Hosting Buyer’s Checklist | Symmetry
Managed Hosting Buyer’s Checklist | SymmetryManaged Hosting Buyer’s Checklist | Symmetry
Managed Hosting Buyer’s Checklist | Symmetry
 
Roadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | SymmetryRoadmap to SAP® Security and Compliance | Symmetry
Roadmap to SAP® Security and Compliance | Symmetry
 
SAP HANA® Deployment Guide | Symmetry
SAP HANA® Deployment Guide | SymmetrySAP HANA® Deployment Guide | Symmetry
SAP HANA® Deployment Guide | Symmetry
 
ControlPanelGRC® Security Risk Assessment | Symmetry
ControlPanelGRC® Security Risk Assessment | SymmetryControlPanelGRC® Security Risk Assessment | Symmetry
ControlPanelGRC® Security Risk Assessment | Symmetry
 
Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...
 
Prevent SAP Security Vulnerabilities | Symmetry
Prevent SAP Security Vulnerabilities | SymmetryPrevent SAP Security Vulnerabilities | Symmetry
Prevent SAP Security Vulnerabilities | Symmetry
 
SAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | Symmetry
 
3 Ways to Future-Proof Your SAP® on IBM i Implementation
3 Ways to Future-Proof Your SAP® on IBM i Implementation3 Ways to Future-Proof Your SAP® on IBM i Implementation
3 Ways to Future-Proof Your SAP® on IBM i Implementation
 
Simplifying the path to SAP Solution Manager 7.2 | Symmetry™
Simplifying the path to SAP Solution Manager 7.2 | Symmetry™Simplifying the path to SAP Solution Manager 7.2 | Symmetry™
Simplifying the path to SAP Solution Manager 7.2 | Symmetry™
 
Best Practices for SAP Access Controls | Symmetry™
Best Practices for SAP Access Controls | Symmetry™Best Practices for SAP Access Controls | Symmetry™
Best Practices for SAP Access Controls | Symmetry™
 
Compliant Cloud Hosting: What You Need to Know | Symmetry™
Compliant Cloud Hosting: What You Need to Know | Symmetry™Compliant Cloud Hosting: What You Need to Know | Symmetry™
Compliant Cloud Hosting: What You Need to Know | Symmetry™
 
Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™
Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™
Get Audit Ready | Enterprise Risk Management Implementation | Symmetry™
 
Compliance Automation: The Complete Journey | Symmetry™
Compliance Automation: The Complete Journey | Symmetry™Compliance Automation: The Complete Journey | Symmetry™
Compliance Automation: The Complete Journey | Symmetry™
 
Symmetry and smartShift | Revolutionizing SAP® Technology Transformation
Symmetry and smartShift | Revolutionizing SAP® Technology TransformationSymmetry and smartShift | Revolutionizing SAP® Technology Transformation
Symmetry and smartShift | Revolutionizing SAP® Technology Transformation
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Secure HANA in the Cloud | Mitigating Internal & External Threats

  • 1. Confidential MAY 2017 Secure HANA in the Cloud | Mitigating Internal & External Threats Scott Goolik, VP of Compliance & Security | Symmetry Tom Evgey, Director of Cloud | Onapsis
  • 2. Confidential Agenda § Introducing Symmetry & Onapsis § Evolution of SAP Security § Recent trends in SAP security & SAP Cybersecurity § Considerations for moving to the cloud § Mitigating risk with the Onapsis Security Platform § Questions ©2017 Symmetry
  • 3. Confidential 24x7x365 Full-time Employees U.S. based Global Customers Industry Roots Symmetry was founded in 1996 and has since grown to become one of the larger privately held application management and cloud hosting firms in the United States. Longtime Certified SAP Partner Center of Excellence - Milwaukee, Wis. Enterprise Hosting In 2005, Symmetry began providing comprehensive hosting and managed services to customers and is now a leader in enterprise application hosting services. Investing in next generation cloud platform that also support HANA Symmetry SAP HANA Cloud Symmetry is a LEADER in SAP HANA technologies, with dedicated hardware to host true ‘Pay as you Grow’ cloud model. Dedicated Support Symmetry’s reputation for providing excellence in customer service is proven by our NPS rating of 57 (2015 survey results), providing direct access to a team familiar with your systems, backed by a 24x7x365 help desk. GRC Always Audit Ready Founded in 2009, Symmetry’s GRC software is built and supported by GRC and audit professionals. Symmetry’s robust GRC in-house solution provides complete compliance automation. Who is Symmetry? ©2017 Symmetry
  • 4. @2017 Onapsis, Inc. All Rights Reserved ONAPSIS: COMPANY HIGHLIGHTS Onapsis: Keeping Business-Critical Applications Secure & Compliant Market Leaders First-movers focused on Fortune 2000 and Federal organizations; over 200 customers Thought Leaders Dedicated in-house Research Labs; discovered over 500 vulnerabilities and attack vectors Patented Technology Awarded patent covering underlying critical algorithms and capabilities Experienced Management Successful executives from IBM, RSA, EMC, Sophos, Amazon.com Backed by Leading Investors .406 Ventures, Schlumberger, Evolution, Arsenal, Endeavor Board of Directors & Advisors Sr VP, Booz Allen CISO Schlumberger, former AVG CEO, CTO Veracode Sustained Hyper-Growth: 4th consecutive year of 100%+ YoY ARR & Bookings growth
  • 5. @2017 Onapsis, Inc. All Rights Reserved The industry’s leading intelligence on security threats affecting SAP and Oracle Business-Critical Applications THE ONAPSIS RESEARCH LABS Helped secure over 500 SAP and Oracle flaws to date, including 100+ affecting SAP HANA Worked hand in hand with the DHS on the first-ever US-CERT Alert for SAP Business Applications Regularly invited to speak at leading Security, SAP and Oracle conferences around the world (BlackHat, RSA, Defcon, SANS, etc) Provide the Onapsis Security Platform and Onapsis Customers with Advanced Threat Intelligence and market trends
  • 6. THE EVOLUTION OF SAP SECURITY
  • 7. Confidential Business Critical Application Security ERP Systems & Business-Critical Applications = The Crown Jewels Intellectual Property High value industry data Sensitive Customer Information High value customer data Business Trade Secrets Competitive Insights Treasury and Cash Corporate bank accounts Financial Reporting Insights Inside financial information Sensitive Employee Information High volume employee data Network Front Door Access point to the corporate network Life Blood of the Business Single point of operational failure ©2017 Symmetry
  • 8. Confidential Traditional SAP Security Challenges ©2017 Symmetry § What challenges faced when managing… § SAP security workloads? § complex SAP security questions? § Audit and compliance requirements? § How does your organization address… § Segregation of Duties? § User Provisioning? § Role Changes? § Emergency Access?
  • 9. Confidential Traditional SAP Security Challenges Mitigating Risk with ControlPanelGRC § Managed SAP Security Services § Deep technical expertise with customer-first mindset § ControlPanelGRC § Symmetry’s proprietary compliance automation solution for SAP environments § Automated compliance processes reduce risks § Compliant User Provisioning § Compliant Role Management § Emergency Access Management § Audit & Compliance Reporting ©2017 Symmetry Managed SAP Security + ControlPanelGRC = Lower Cost + Greater Value
  • 10. RECENT TRENDS IN SAP CYBERSECURITY
  • 11. @2017 Onapsis, Inc. All Rights Reserved THE THREAT LANDSCAPE The Escalation of SAP Security Attacks Anonymous claimed breach to Greek Ministry of Finance using SAP zero-day exploit 2012 A malware targeting SAP systems discovered in the wild - A “Tsunami of SAP Attacks Coming?” 2013 A Chinese hacker exploited a vulnerability in a corporate SAP NetWeaver Portal. 2014 2015 Report: Chinese Breach of USIS targeted SAP. Went unnoticed for over six months and compromised over 48,000 employee records of DHS and OPM. First ever US-CERT Alert for cybersecurity of SAP business applications released 2016
  • 12. @2017 Onapsis, Inc. All Rights Reserved May ‘16: DHS Released Critical Alert on SAP Cyberattacks THE THREAT LANDSCAPE Onapsis Research Labs discovered 36 organizations worldwide being exploited through a 5-year-old SAP vulnerability Onapsis worked very closely and confidentially with US Department of Homeland Security resulting in the US DHS CERT- Alert TA16--132A Onapsis released a detailed Threat Report to help customers: • Explain the nature of the US-CERT Alert • Determine if they are susceptible to the vulnerability • Mitigate this vulnerability in their SAP Implementation
  • 13. @2017 Onapsis, Inc. All Rights Reserved PONEMAN RESEARCH REPORT Key Findings 92% 92% indicated an SAP breach would be serious, very serious or catastrophic 65% 65% said their SAP System was breached at least once in the past 24 months $4.5M Average cost to take SAP offline was $4.5M per incident 47% 47% indicated they were “not confident” or had “no confidence” that they could detect an SAP breach within a year
  • 15. @2017 Onapsis, Inc. All Rights Reserved • Many leading Organizations are already running in the cloud • WHY ORGANIZATIONS MOVE TO THE CLOUD • Saves on space and money required to buy and host hardware • Makes it possible for users to access data, applications and services over the internet • Gives users and employees the ability to work anywhere • Employee collaboration capabilities • Quicker and more cost effective scaling of environments • Free or cost effective IT management and updates • Perceived security of cloud environments
  • 16. TYPES OF CLOUD DEPLOYMENTS
  • 17. @2017 Onapsis, Inc. All Rights Reserved • Hosting deployments for SAP, SAP HANA & Traditional Workloads • Managed Private Cloud o A secure cloud based environment managed directly by Symmetry • available as Dedicated Private Cloud or Virtual Private Cloud o Engineered to deliver performance and security for complex enterprises with a compliant-ready foundation for a variety of security control points • Hybrid Cloud o A combination of Private and Public cloud environments designed specifically for your needs
  • 19. @2017 Onapsis, Inc. All Rights Reserved • CLOUD SECURITY ISSUES • Complex migration process • Data Breaches • Data Loss • Insecure APIs and Connections • Malicious Insiders • Insufficient Due Diligence • Shared Technology • Agreeing to someone else's security standards
  • 20. MITIGATING RISKS WITH THE ONAPSIS SECURITY PLATFORM
  • 21. @2017 Onapsis, Inc. All Rights Reserved@2017 Onapsis, Inc. All Rights Reserved The first cybersecurity solution that automates vulnerability management, insider and outsider threat detection and response, and audit and compliance monitoring for SAP systems By partnering with Onapsis, your enterprise can unlock new security and compliance capabilities in three key areas: AUTOMATE Continuous vulnerability scanning and alerts proactively identify and bring attention to misconfigurations, insider and outsider threats. Improve work flows to reduce resources committed to audit and compliance data tasks. Compensating controls help satisfy regulators and maintain compliance between audits. INTEGRATE ANTICIPATE Implementation and customer success services accelerate the maturity of an enterprise’s cybersecurity organization. Custom data links feed your existing SIEM tools, such as Splunk and QRadar, to provide a unified view of risk. SAP-certified add-on assures BASIS teams of system compatibility. Onapsis Research Labs provides industry-defining threat intelligence to prepare our customers for what’s next. Research feeds development of new features to address emerging needs. More than 350 SAP and Oracle vulnerabilities reported to date. THE ONAPSIS SECURITY PLATFORM
  • 22. ONAPSIS & SYMMETRY SOLUTIONS
  • 23. Confidential Conclusion § Symmetry mitigates risks for internal threats § Managed SAP Security Services § ControlPanelGRC – a proprietary compliance automation platform § Onapsis identifies risks from external threats § Identification of critical SAP security notes § Continuous vulnerability and configuration scanning § Symmetry Managed SAP Basis Services mitigates identified risks ©2017 Symmetry
  • 24. Confidential Symmetry + Onapsis ©2017 Symmetry Segregation of Duties Emergency Access Management Identity Management User Provisioning Continuous Monitoring User Activity Monitoring Compliance Monitoring SAP Platform Security Configurations Security Patches Interfaces Real-time Detection of Cyber-Attacks Virtual Patching Research & Advance Threat Intelligence Integration with Customer Ecosystem Custom Code Static Analysis ControlPanelGRC Onapsis Security Platform Managed SAP Security Services Managed SAP Basis Services Managed Cloud Platform COMPLETE security coverage
  • 26. Confidential©2017 Symmetry THANK YOU Follow us on @Symmetry_Corp & @Onapsis