In order to maintain compliance in SAP systems, a well-established authorization management and a well-founded analysis of the separation of functions is necessary. This becomes all the more complex the more non-system solutions are available in your SAP ERP or S/4HANA landscape, because such systems usually have their own authorization structures.
It is therefore necessary to think about a reliable, cross-system authorization management in good time so that roles and authorizations are synchronized across all your SAP and non-SAP applications.
In this webinar, we will show you how to master comprehensive SoD analyses, business process analyses and the identification of authorization conflicts in the future – tool-supported and with a feasible administrative effort.
Topics of Focus:
• SoD analysis for SAP and non-SAP systems
• Cross-system authorization management with a central identity
• Evaluation of assigned roles and rights
• Advantages of the SAST User Access Management
• Best practice tips
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Our audits are designed to help you determine your SAP landscape's actual risk exposure and pinpoint areas that are open to potential attacks. They include everything from your infrastructure and SAP system parameters to individual component configurations and authorizations.
Also if your company's migration to SAP HANA or S/4HANA is right around the corner. An audit offers an ideal solution for safeguarding your systems and taking all the necessary security measures before you start your transition.
Our approach is based on SAP's security guidelines, the recommendations of the German Federal Office for Information Security (BSI), and the information security standard DIN ISO 27001.
Topics of focus:
• Challenges, tools and proven methods
• Advantages of a root cause analysis and of the resulting risks for your company
• Quick check vs. audit vs. penetrationtest
• Our project approach at a glance
• Recommendations for the follow-up of an Audit
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Conflicts between employers and works councils often arise in particular due to divergent views regarding the implementation and use of technical facilities, including the ability to monitor IT workplaces.
The benefits of constructive cooperation between works council, IT department, and HR are apparent. In this light, we have designed a webinar that demonstrates how you can use the SAST SUITE for the fair monitoring of the IT workplaces at your company – while at the same time complying with the German Works Constitution Act.
In addition to portraying the relevant intersections, we will show you the options you have for planning and managing SAP users directly in the system, as well as indicate the limits defined by the relevant laws. We will also present a tried and tested procedure model with a focus on an optimized authorization concept in SAP systems, enabling you to avoid conflicts from the start.
Topics of focus:
• Legal basis of the German Works Constitution Act in combination with the SAST SUITE
• Transaction statistics in the standard SAP system
• Privacy and data protection despite data loss prevention
• Procedure model for proactive conflict avoidance
• Model works agreement
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Thousands of security-relevant settings in a common SAP system do not make it easy to implement a comprehensive security check. Although the DSAG test guide and other standards explain what should be checked, they do not show how this can be done, and certainly not what the ideal approach is. Therefore, in this webinar we will show you how you can effectively and efficiently control the security status of your SAP ERP and S/4HANA systems and what advantages a tool-based check offers you.
Topics of focus:
• Challenges with the implementation of security guidelines
• Overview of relevant regulations
• Project methodology for a security management process
• Advantages of tool-supported checks with the SAST SUITE
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Fiori and S/4 authorizations: "What are the biggest challenges, and where do the risks lie?"
-------------------------------------------------------------------------------------Many SAP customers are currently planning to implement SAP S/4HANA or are already making the transition. Besides the extensive new architectural aspects involved, implementing S/4HANA and Fiori also changes quite a few longstanding rules in the area of SAP authorizations.
A number of transactions - some of which veteran SAP ERP users have come to hold dear - have either been integrated into other transactions, replaced by Fiori apps, or simply eliminated. Meanwhile, the consistent use of OData services in the context of Fiori has resulted in a variety of ramifications with regard to security design in both the front and back end.
------------------------------------------------------------------------------------- Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
We all know how it goes – once a year, the auditor carries out an IT audit as part of the year-end audit. The idea is to flag potential threats in SAP cyber security, and in identity & access management.
In terms of risk, this procedure is no solution; rather, the step is taken much too late in the process to allow for any kind of quick reaction. Hackers may have already had ample time to take advantage of the risks. Despite this fact, many companies leave it too late to close loopholes.
In this webinar, we will show you a much better approach that addresses this discrepancy. Thanks to SAST SUITE, you can achieve continuous, highly efficient real-time monitoring of all critical and security-related changes to your SAP systems. This means you can act immediately. No more waiting until next year when the auditor is at your doorstep.
Topics of focus:
• Immediate detection of unauthorized authorization assignments
• Monitoring role allocation and any evasion of the dual control principle
• Proper reaction – without delay – to suspicious table change documents
• Cost-benefit analysis: manual downstream controls vs. intelligent real-time monitoring
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Year in and year out, the annual external audit is a given, as every SAP system and security administrator knows. Nonetheless, the current risk situation of the SAP systems is often uncertain. Have all the findings from the last audit really been rectified? Have new risks arisen in the meantime?
SAP authorization concepts are subject to continual change, which is why auditors check every year to make sure that authorizations like SAP_ALL and the SAP standard users are protected. The list of necessary measures is long: from installing security patches to checking and reducing critical authorizations. But the solution is simple: Don’t wait until the next audit! Instead, identify your vulnerabilities today. It’s the only way to guarantee the security of your SAP systems year-round and enable you to react to anomalies quickly.
In this webinar, we’ll show you how the SAST SUITE can help you define your top findings quickly, check critical authorizations efficiently, and keep your systems clean. You’ll never have to dread an auditor visit again.
Topics of focus:
- The next test is never far away – tips for effective follow-ups and optimal preparation for an audit
- Tool-supported identification and rectification of your top findings
- Stay clean through cyclical checks
- Best practice recommendations
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
As anyone who works in the field of SAP Basis services will tell you, there's always something to optimize when it comes to user authorizations. What these efforts fail to do far too often, however, is remove transactions that are no longer in use from the respective roles. This leads to preventable risks with regard to the segregation of duties and unnecessary resource consumption in administration.
After conducting various tests on intelligent ways to streamline role profiles, RENK AG settled on one solution: the new Self-Adjusting Authorizations module of SAST SUITE. During authorization projects, it's not uncommon for our experts to find users with up to 500 SAP authorizations - only 25% of which they actually utilize.
With SAST Self-Adjusting Authorizations, you can implement tailored, fully streamlined roles without putting any restrictions on your day-to-day business - which is also the best way to prepare for your next SAP license audit.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Comprehensive authorization management and the SoD analysis that comes with it are essential measures in safeguarding SAP systems, especially in the context of compliance. However, problems can arise when connecting external solutions to an SAP landscape. SAP Ariba, for example, comes with its own role and authorization concept - one that often doesn't match the SAP standard. This makes truly comprehensive SoD analysis simply impossible.
The solution? Cross-system authorization management that monitors roles and authorizations while factoring in all the relationships among them. The authorization management module of SAST SUITE makes it possible to customize SoD functions in a way that incorporates roles and permissions into SoD analysis, even when non-SAP systems like Ariba are involved.
In this webinar, you'll learn how to take control of extensive SoD and business process analyses while identifying authorization conflicts across multiple systems.
-------------------------------------------------------------------------------------Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Our audits are designed to help you determine your SAP landscape's actual risk exposure and pinpoint areas that are open to potential attacks. They include everything from your infrastructure and SAP system parameters to individual component configurations and authorizations.
Also if your company's migration to SAP HANA or S/4HANA is right around the corner. An audit offers an ideal solution for safeguarding your systems and taking all the necessary security measures before you start your transition.
Our approach is based on SAP's security guidelines, the recommendations of the German Federal Office for Information Security (BSI), and the information security standard DIN ISO 27001.
Topics of focus:
• Challenges, tools and proven methods
• Advantages of a root cause analysis and of the resulting risks for your company
• Quick check vs. audit vs. penetrationtest
• Our project approach at a glance
• Recommendations for the follow-up of an Audit
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Conflicts between employers and works councils often arise in particular due to divergent views regarding the implementation and use of technical facilities, including the ability to monitor IT workplaces.
The benefits of constructive cooperation between works council, IT department, and HR are apparent. In this light, we have designed a webinar that demonstrates how you can use the SAST SUITE for the fair monitoring of the IT workplaces at your company – while at the same time complying with the German Works Constitution Act.
In addition to portraying the relevant intersections, we will show you the options you have for planning and managing SAP users directly in the system, as well as indicate the limits defined by the relevant laws. We will also present a tried and tested procedure model with a focus on an optimized authorization concept in SAP systems, enabling you to avoid conflicts from the start.
Topics of focus:
• Legal basis of the German Works Constitution Act in combination with the SAST SUITE
• Transaction statistics in the standard SAP system
• Privacy and data protection despite data loss prevention
• Procedure model for proactive conflict avoidance
• Model works agreement
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Thousands of security-relevant settings in a common SAP system do not make it easy to implement a comprehensive security check. Although the DSAG test guide and other standards explain what should be checked, they do not show how this can be done, and certainly not what the ideal approach is. Therefore, in this webinar we will show you how you can effectively and efficiently control the security status of your SAP ERP and S/4HANA systems and what advantages a tool-based check offers you.
Topics of focus:
• Challenges with the implementation of security guidelines
• Overview of relevant regulations
• Project methodology for a security management process
• Advantages of tool-supported checks with the SAST SUITE
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Fiori and S/4 authorizations: "What are the biggest challenges, and where do the risks lie?"
-------------------------------------------------------------------------------------Many SAP customers are currently planning to implement SAP S/4HANA or are already making the transition. Besides the extensive new architectural aspects involved, implementing S/4HANA and Fiori also changes quite a few longstanding rules in the area of SAP authorizations.
A number of transactions - some of which veteran SAP ERP users have come to hold dear - have either been integrated into other transactions, replaced by Fiori apps, or simply eliminated. Meanwhile, the consistent use of OData services in the context of Fiori has resulted in a variety of ramifications with regard to security design in both the front and back end.
------------------------------------------------------------------------------------- Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
We all know how it goes – once a year, the auditor carries out an IT audit as part of the year-end audit. The idea is to flag potential threats in SAP cyber security, and in identity & access management.
In terms of risk, this procedure is no solution; rather, the step is taken much too late in the process to allow for any kind of quick reaction. Hackers may have already had ample time to take advantage of the risks. Despite this fact, many companies leave it too late to close loopholes.
In this webinar, we will show you a much better approach that addresses this discrepancy. Thanks to SAST SUITE, you can achieve continuous, highly efficient real-time monitoring of all critical and security-related changes to your SAP systems. This means you can act immediately. No more waiting until next year when the auditor is at your doorstep.
Topics of focus:
• Immediate detection of unauthorized authorization assignments
• Monitoring role allocation and any evasion of the dual control principle
• Proper reaction – without delay – to suspicious table change documents
• Cost-benefit analysis: manual downstream controls vs. intelligent real-time monitoring
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Year in and year out, the annual external audit is a given, as every SAP system and security administrator knows. Nonetheless, the current risk situation of the SAP systems is often uncertain. Have all the findings from the last audit really been rectified? Have new risks arisen in the meantime?
SAP authorization concepts are subject to continual change, which is why auditors check every year to make sure that authorizations like SAP_ALL and the SAP standard users are protected. The list of necessary measures is long: from installing security patches to checking and reducing critical authorizations. But the solution is simple: Don’t wait until the next audit! Instead, identify your vulnerabilities today. It’s the only way to guarantee the security of your SAP systems year-round and enable you to react to anomalies quickly.
In this webinar, we’ll show you how the SAST SUITE can help you define your top findings quickly, check critical authorizations efficiently, and keep your systems clean. You’ll never have to dread an auditor visit again.
Topics of focus:
- The next test is never far away – tips for effective follow-ups and optimal preparation for an audit
- Tool-supported identification and rectification of your top findings
- Stay clean through cyclical checks
- Best practice recommendations
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
As anyone who works in the field of SAP Basis services will tell you, there's always something to optimize when it comes to user authorizations. What these efforts fail to do far too often, however, is remove transactions that are no longer in use from the respective roles. This leads to preventable risks with regard to the segregation of duties and unnecessary resource consumption in administration.
After conducting various tests on intelligent ways to streamline role profiles, RENK AG settled on one solution: the new Self-Adjusting Authorizations module of SAST SUITE. During authorization projects, it's not uncommon for our experts to find users with up to 500 SAP authorizations - only 25% of which they actually utilize.
With SAST Self-Adjusting Authorizations, you can implement tailored, fully streamlined roles without putting any restrictions on your day-to-day business - which is also the best way to prepare for your next SAP license audit.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Comprehensive authorization management and the SoD analysis that comes with it are essential measures in safeguarding SAP systems, especially in the context of compliance. However, problems can arise when connecting external solutions to an SAP landscape. SAP Ariba, for example, comes with its own role and authorization concept - one that often doesn't match the SAP standard. This makes truly comprehensive SoD analysis simply impossible.
The solution? Cross-system authorization management that monitors roles and authorizations while factoring in all the relationships among them. The authorization management module of SAST SUITE makes it possible to customize SoD functions in a way that incorporates roles and permissions into SoD analysis, even when non-SAP systems like Ariba are involved.
In this webinar, you'll learn how to take control of extensive SoD and business process analyses while identifying authorization conflicts across multiple systems.
-------------------------------------------------------------------------------------Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Managed Services: "The choice is yours: a make or buy approach to SAP security and compliance?"
-------------------------------------------------------------------------------------
Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security. However, efforts like these are technically complex, which is why they require so much time and personnel. Decision-makers thus face a fundamental question: Should they "make" or “buy" their way to SAP security and compliance? Our SAST MANAGED SERVICES offer a holistic solution that can assist you in both on-site and remote environments.
--------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Administrating a large number of user accounts often presents companies with serious challenges. Especially when you consider how complicated most of the available standard tools are. The effort is hardly manageable if user identities also need to be maintained in several systems, directory services, or databases.
The lack of an option to manage user IDs and authorizations across multiple systems in a transparent way, not only leads to insufficient clarity and SoD conflicts; it also requires more effort to address those issues.
We will demonstrate how you can manage the identities, roles and authorizations of your SAP users efficiently and also on a shared S/4HANA system landscape.
Topics of focus:
• Challenges of Identity Management in SAP S/4HANA systems
• Reduction of effort due to automated authorization requests
• Real time risk assessment of critical authorizations
• Advantages of the SAST User Access Management
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Only the permanent monitoring of all events allows you a reliable protection of your SAP systems. Thereby a real security incident can arise from a combination of several uncritical events.
In this webinar, Linde will provide insights on how to identify, evaluate and document such an incident as quickly as possible so that appropriate countermeasures can be taken. In case of an attack, the reaction capability has a considerable influence on the expected level of damage.
Topics of focus:
• What is needed for a reliable security monitoring
• Protection of your SAP systems on platform and authorization level
• Identification of vulnerabilities in real time
• Importance of security dashboards to analyze suspicious user activities
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Although managed services are becoming a firm fixture in more and more IT areas, companies are still hesitant when it comes to SAP – even though almost all of them face similar challenges, including the specialized domain of SAP security and authorizations.
There is a shortage of specialist staff capable of ensuring GDPR-compliant monitoring of SAP systems, especially the sensitive personnel data they manage. Although they would like to monitor highly critical transactions, they often lack both the internal expertise and the suitable tools. Last but not least, although some companies monitor their IT systems in real time, the response times to alerts in the SAP environment are far too long to support a rapid response to identified threats.
Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security, however. With the SAST Managed Service, we can take care of all this for you, no matter whether your company is already playing in the Champions League of security or are only just starting out. We offer custom-tailored security and compliance solutions for both SAP ERP and SAP S/4HANA.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
It has long been no secret that cyber criminals particularly like to attack SAP systems. After all, they are perfectly suited as a backdoor for a company's highly sensitive data, and there is no better way to make money.
You can't prevent attacks, but with the right cyber threat detection strategy, you can be prepared, detect anomalies immediately and respond to security incidents immediately.
We'll show you how to properly assess threats, identify and neutralize real cyber-attacks before they can cause serious damage.
Topics of Focus:
• Building an SAP cyber security strategy you can trust
• Protection of your SAP systems on platform and authorization level
• Identification of weak points in real time
• Importance of security dashboards to analyze suspicious user activity
• Advantages of the SAST SUITE for your SAP Threat Detection measures
• Best practice tips for typical attack scenarios
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
IT audits are a universally accepted quality measure and have become indispensable. As such, internal audits are increasingly being used in addition to annual reviews by external auditors, to check the configuration of SAP landscapes and user authorizations. Their benefits: They can analyze individual aspects in shorter intervals, help prepare for and follow up on annual audits, and provide optimal support to internal control systems.
It must be noted, however, that any audit merely provides a snapshot of the current situation. But what about analyses of transactions, changes, and system behavior? When and where have employees deviated from the specified working methods? Were differing settings intentionally changed back to the “target” state?
Take the initiative and round out your spot checks with automated real-time monitoring. Stop limiting your SAP security analyses to a single point in time and instead identify risks holistically, over freely definable periods. In our webinar, we’ll show you the new possibilities and describe how the SAST SUITE can help you optimize your internal control systems, while at the same time establishing reliable real-time monitoring of your SAP systems.
Topics of focus:
• The most frequently underestimated activities
• How to optimize cyclical analyses of the system configuration and user settings
• Why real-time analyses are so important for your IT security concept
• Benefits of tool-based checks using SAST SUITE
• Best practice recommendations
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Security Intelligence: “What you stand to gain from intelligent, SAP real-time monitoring."
-------------------------------------------------------------------------------------
Your efforts to protect your SAP systems won't be complete until you have reliable way to keep a constant eye on your transactions and applications. When you detect critical incidents right when they occur, you'll be able take immediate action in response. When you're under attack, your reaction time has a significant impact on the level of damage you can expect. It's not hard to see how a real-time solution like AKQUINET's SAST Security Radar pays for itself in short order.
Detecting attacks based on log files and analyzing network traffic requires in-depth knowledge of the potential paths and patterns such incursions can follow. This is because events relevant to security have to be filtered out of a sea of data and placed in the proper context.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
How hackers are compromising S/4HANA and how you can protect yourself with SAST SUITE.
-------------------------------------------------------------------------------------
Significant changes are taking place in the world of SAP. By 2025, the majority of the company's customers will make the move to S/4HANA. The related preparations are fully under way – including among hackers who are looking to exploit every available security flaw.
Here, hackers have a key advantage: S/4HANA involves technology that’s not only extremely complex, but relatively new, as well. The risk of making configuration errors that could undermine security is definitely real.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
When transforming authorization roles from your ERP system, there are many points to consider in parallel: For which transactions are there comparable counterparts, which must be exchanged, and which are even obsolete? To do this, you need to select the appropriate Fiori Apps for the new roles and, of course, you also need to adhere to your SAP authorization concept. This requires some preparatory work and analyses, especially if you plan to implement this work manually.
In this webinar we will show you how we can support you, shorten the migration period and at the same time greatly improve the quality and security of your roles. After all, it will be more expensive to clean up legacy issues only after migration - not to mention the damage caused by security holes that have been transferred.
Topics of focus:
• Challenges and necessary questions before project start
• Our project procedure at a glance
• Tips for identifying and eliminating risks in your SAP roles
• Advantages of the SAST Role Conversion Service
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The maxim “Trust is good, but control is better” definitely applies to SAP systems, which constitute the core of many companies’ IT landscapes. The current security status of such systems should be known to more than just the SAP experts involved; indeed, this information is becoming relevant to more and more contacts at companies. As a result, it's all the more important that analyses be intuitive and user-friendly.
SAST Management Dashboard enables you to assess the security of your SAP systems at a glance. It analyzes key risks and presents the results in a visual format while also depicting trends over time.
At the press of a button, SAST Management Dashboard can provide you with a current status report based on risk KPIs you define in advance and reveal the causes of security flaws. The benefits are clear: You’ll have constant access to high-quality information regarding your present risk situation and you security will taken to the next level.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
User Access Management: "Using SAST Safe Go-Live Management to prevent disruptions in authorization design."
-------------------------------------------------------------------------------------
Whether it's after an audit or during an S/4HANA project, companies' requirements regarding quality, the time involved, and of course, their project budget often differ greatly when it comes to planning authorization redesigns.
No matter what your own priorities are in authorization projects, AKQUINET offers solutions designed to meet every requirement to the letter. And the best part? Thanks to SAST Safe Go-Live Management methodology, your project won't cause any disruptions in your everyday business.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
sPlatform Security: "Are you really that attached to your ABAP security flaws, or can they go?"
-------------------------------------------------------------------------------------
Attacks on companies have increased exponentially in recent years. Not uncommonly, these were made possible by software vulnerabilities. SAP systems are particularly critical for many core business processes and should receive corresponding protections.
However, you'll only achieve a basic level of security that can weather stress tests and remain consistent if you take a truly head-to-toe approach to security. And that includes your ABAP code. In our experience to date, many companies balk at audits of their custom developments or 3rd-party add-ons, or are unsatisfied with the nearly unmanageable number of findings. How can this mass of supposedly critical security flaws be evaluated reliably? Where do you even start to clean up?
The newest module in our SAST SUITE, the Code Security Advisor, offers a solution. It is directly integrated into your SAP system and has a risk assessment enriched by key figures such as usage statistics for prioritization, an option to easily decommission obsolete code and a comprehensive set of rules with test cases developed by our SAP security and compliance consultants based on their years of experience.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The interest in SAP security has been growing exponentially, and not only among whitehats. SAP invests money and resources in security, provides guidelines, and arranges conferences, but, unfortunately, SAP users still pay little attention to SAP security
There are most important takeaways for CISOs to provide SAP Security for Enterprises. The presentation destroys the SAP Security myths, includes statistics obtained by ERPScan Research Group, and future trends in SAP Security.
In practice, we often see SAP security projects that only offer a partial solution. Only rarely do such projects involve an end-to-end examination of all layers – from operating system to databases and applications, as well as concepts and policies.
At the same time, an all-encompassing approach to security is essential for projects involving the implementation of or migration to SAP S/4HANA, because the database, user interface, gateway, applications, and authorizations have all grown closer together. As a result, access to important data has become both more complex and more difficult to monitor – especially due to media discontinuity and access options at different layers. This means your framework authorization concept has to combine all these topics prior to implementation and define an end-to-end security strategy.
Ideally, all the security expertise needed for a comprehensive solution like this will come from a single source. This will guarantee perfect interplay between design and management, as well as monitoring, administration, and auditing. And you will also cover all the security areas, in the sense of a comprehensive SIEM system.
In this webinar, we will show you why SAST SOLUTIONS, with our highly specialized SAP experts in combination with our SAST SUITE solution, have just what you are looking for.
Topics of focus:
• The challenges of successful SAP S/4HANA security projects
• How to make sure your SAP S/4HANA implementation or migration is a success
• Benefits of support by SAST SUITE tools
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The presentation describes 5 steps you should take to secure your SAP. There are:
1. Pentesting and Audit
2. Compliance
3. Internal security and SOD
4. ABAP Source code review
5. Forensics
SAP License Audit Tips
www.auditbots.com
SAP Audit Procedure for SAP License
Real-time analysis and SAP Audit procedure for SAP license type classification helps companies both reduce the time and cost of SAP license audits, as well as the overall cost of licensing SAP.
By providing live snapshots, methods for classifications and consolidating a user’s various usernames into a single entity, the user license manager can show companies what they can save in licensing costs. SAP License Manager can be automated too.
According to Gartner Senior Analyst, Patricia Adams “ Depending upon the level of maturity, enterprises that implement software usage capabilities will achieve savings of 5% to 25% in the first year”.
The interest in SAP security is growing exponentially, and not only among whitehats. Unfortunately, SAP users still pay little attention to SAP security.
Obtained findings were presented at RSA APAC Conference 2013.
This research focuses on statistics of SAP Vulnerabilities, threats from the Internet, known incidents and future trends.
This document describes the overview of SAP BusinessObjects Rapid Marts, available Rapid Mart
packages, how Rapid Mart packages helps and accelerates in Data Warehouse implementation process
Managed Services: "The choice is yours: a make or buy approach to SAP security and compliance?"
-------------------------------------------------------------------------------------
Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security. However, efforts like these are technically complex, which is why they require so much time and personnel. Decision-makers thus face a fundamental question: Should they "make" or “buy" their way to SAP security and compliance? Our SAST MANAGED SERVICES offer a holistic solution that can assist you in both on-site and remote environments.
--------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Administrating a large number of user accounts often presents companies with serious challenges. Especially when you consider how complicated most of the available standard tools are. The effort is hardly manageable if user identities also need to be maintained in several systems, directory services, or databases.
The lack of an option to manage user IDs and authorizations across multiple systems in a transparent way, not only leads to insufficient clarity and SoD conflicts; it also requires more effort to address those issues.
We will demonstrate how you can manage the identities, roles and authorizations of your SAP users efficiently and also on a shared S/4HANA system landscape.
Topics of focus:
• Challenges of Identity Management in SAP S/4HANA systems
• Reduction of effort due to automated authorization requests
• Real time risk assessment of critical authorizations
• Advantages of the SAST User Access Management
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Only the permanent monitoring of all events allows you a reliable protection of your SAP systems. Thereby a real security incident can arise from a combination of several uncritical events.
In this webinar, Linde will provide insights on how to identify, evaluate and document such an incident as quickly as possible so that appropriate countermeasures can be taken. In case of an attack, the reaction capability has a considerable influence on the expected level of damage.
Topics of focus:
• What is needed for a reliable security monitoring
• Protection of your SAP systems on platform and authorization level
• Identification of vulnerabilities in real time
• Importance of security dashboards to analyze suspicious user activities
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Although managed services are becoming a firm fixture in more and more IT areas, companies are still hesitant when it comes to SAP – even though almost all of them face similar challenges, including the specialized domain of SAP security and authorizations.
There is a shortage of specialist staff capable of ensuring GDPR-compliant monitoring of SAP systems, especially the sensitive personnel data they manage. Although they would like to monitor highly critical transactions, they often lack both the internal expertise and the suitable tools. Last but not least, although some companies monitor their IT systems in real time, the response times to alerts in the SAP environment are far too long to support a rapid response to identified threats.
Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security, however. With the SAST Managed Service, we can take care of all this for you, no matter whether your company is already playing in the Champions League of security or are only just starting out. We offer custom-tailored security and compliance solutions for both SAP ERP and SAP S/4HANA.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
It has long been no secret that cyber criminals particularly like to attack SAP systems. After all, they are perfectly suited as a backdoor for a company's highly sensitive data, and there is no better way to make money.
You can't prevent attacks, but with the right cyber threat detection strategy, you can be prepared, detect anomalies immediately and respond to security incidents immediately.
We'll show you how to properly assess threats, identify and neutralize real cyber-attacks before they can cause serious damage.
Topics of Focus:
• Building an SAP cyber security strategy you can trust
• Protection of your SAP systems on platform and authorization level
• Identification of weak points in real time
• Importance of security dashboards to analyze suspicious user activity
• Advantages of the SAST SUITE for your SAP Threat Detection measures
• Best practice tips for typical attack scenarios
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
IT audits are a universally accepted quality measure and have become indispensable. As such, internal audits are increasingly being used in addition to annual reviews by external auditors, to check the configuration of SAP landscapes and user authorizations. Their benefits: They can analyze individual aspects in shorter intervals, help prepare for and follow up on annual audits, and provide optimal support to internal control systems.
It must be noted, however, that any audit merely provides a snapshot of the current situation. But what about analyses of transactions, changes, and system behavior? When and where have employees deviated from the specified working methods? Were differing settings intentionally changed back to the “target” state?
Take the initiative and round out your spot checks with automated real-time monitoring. Stop limiting your SAP security analyses to a single point in time and instead identify risks holistically, over freely definable periods. In our webinar, we’ll show you the new possibilities and describe how the SAST SUITE can help you optimize your internal control systems, while at the same time establishing reliable real-time monitoring of your SAP systems.
Topics of focus:
• The most frequently underestimated activities
• How to optimize cyclical analyses of the system configuration and user settings
• Why real-time analyses are so important for your IT security concept
• Benefits of tool-based checks using SAST SUITE
• Best practice recommendations
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Security Intelligence: “What you stand to gain from intelligent, SAP real-time monitoring."
-------------------------------------------------------------------------------------
Your efforts to protect your SAP systems won't be complete until you have reliable way to keep a constant eye on your transactions and applications. When you detect critical incidents right when they occur, you'll be able take immediate action in response. When you're under attack, your reaction time has a significant impact on the level of damage you can expect. It's not hard to see how a real-time solution like AKQUINET's SAST Security Radar pays for itself in short order.
Detecting attacks based on log files and analyzing network traffic requires in-depth knowledge of the potential paths and patterns such incursions can follow. This is because events relevant to security have to be filtered out of a sea of data and placed in the proper context.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
How hackers are compromising S/4HANA and how you can protect yourself with SAST SUITE.
-------------------------------------------------------------------------------------
Significant changes are taking place in the world of SAP. By 2025, the majority of the company's customers will make the move to S/4HANA. The related preparations are fully under way – including among hackers who are looking to exploit every available security flaw.
Here, hackers have a key advantage: S/4HANA involves technology that’s not only extremely complex, but relatively new, as well. The risk of making configuration errors that could undermine security is definitely real.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
When transforming authorization roles from your ERP system, there are many points to consider in parallel: For which transactions are there comparable counterparts, which must be exchanged, and which are even obsolete? To do this, you need to select the appropriate Fiori Apps for the new roles and, of course, you also need to adhere to your SAP authorization concept. This requires some preparatory work and analyses, especially if you plan to implement this work manually.
In this webinar we will show you how we can support you, shorten the migration period and at the same time greatly improve the quality and security of your roles. After all, it will be more expensive to clean up legacy issues only after migration - not to mention the damage caused by security holes that have been transferred.
Topics of focus:
• Challenges and necessary questions before project start
• Our project procedure at a glance
• Tips for identifying and eliminating risks in your SAP roles
• Advantages of the SAST Role Conversion Service
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The maxim “Trust is good, but control is better” definitely applies to SAP systems, which constitute the core of many companies’ IT landscapes. The current security status of such systems should be known to more than just the SAP experts involved; indeed, this information is becoming relevant to more and more contacts at companies. As a result, it's all the more important that analyses be intuitive and user-friendly.
SAST Management Dashboard enables you to assess the security of your SAP systems at a glance. It analyzes key risks and presents the results in a visual format while also depicting trends over time.
At the press of a button, SAST Management Dashboard can provide you with a current status report based on risk KPIs you define in advance and reveal the causes of security flaws. The benefits are clear: You’ll have constant access to high-quality information regarding your present risk situation and you security will taken to the next level.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
User Access Management: "Using SAST Safe Go-Live Management to prevent disruptions in authorization design."
-------------------------------------------------------------------------------------
Whether it's after an audit or during an S/4HANA project, companies' requirements regarding quality, the time involved, and of course, their project budget often differ greatly when it comes to planning authorization redesigns.
No matter what your own priorities are in authorization projects, AKQUINET offers solutions designed to meet every requirement to the letter. And the best part? Thanks to SAST Safe Go-Live Management methodology, your project won't cause any disruptions in your everyday business.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
sPlatform Security: "Are you really that attached to your ABAP security flaws, or can they go?"
-------------------------------------------------------------------------------------
Attacks on companies have increased exponentially in recent years. Not uncommonly, these were made possible by software vulnerabilities. SAP systems are particularly critical for many core business processes and should receive corresponding protections.
However, you'll only achieve a basic level of security that can weather stress tests and remain consistent if you take a truly head-to-toe approach to security. And that includes your ABAP code. In our experience to date, many companies balk at audits of their custom developments or 3rd-party add-ons, or are unsatisfied with the nearly unmanageable number of findings. How can this mass of supposedly critical security flaws be evaluated reliably? Where do you even start to clean up?
The newest module in our SAST SUITE, the Code Security Advisor, offers a solution. It is directly integrated into your SAP system and has a risk assessment enriched by key figures such as usage statistics for prioritization, an option to easily decommission obsolete code and a comprehensive set of rules with test cases developed by our SAP security and compliance consultants based on their years of experience.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The interest in SAP security has been growing exponentially, and not only among whitehats. SAP invests money and resources in security, provides guidelines, and arranges conferences, but, unfortunately, SAP users still pay little attention to SAP security
There are most important takeaways for CISOs to provide SAP Security for Enterprises. The presentation destroys the SAP Security myths, includes statistics obtained by ERPScan Research Group, and future trends in SAP Security.
In practice, we often see SAP security projects that only offer a partial solution. Only rarely do such projects involve an end-to-end examination of all layers – from operating system to databases and applications, as well as concepts and policies.
At the same time, an all-encompassing approach to security is essential for projects involving the implementation of or migration to SAP S/4HANA, because the database, user interface, gateway, applications, and authorizations have all grown closer together. As a result, access to important data has become both more complex and more difficult to monitor – especially due to media discontinuity and access options at different layers. This means your framework authorization concept has to combine all these topics prior to implementation and define an end-to-end security strategy.
Ideally, all the security expertise needed for a comprehensive solution like this will come from a single source. This will guarantee perfect interplay between design and management, as well as monitoring, administration, and auditing. And you will also cover all the security areas, in the sense of a comprehensive SIEM system.
In this webinar, we will show you why SAST SOLUTIONS, with our highly specialized SAP experts in combination with our SAST SUITE solution, have just what you are looking for.
Topics of focus:
• The challenges of successful SAP S/4HANA security projects
• How to make sure your SAP S/4HANA implementation or migration is a success
• Benefits of support by SAST SUITE tools
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The presentation describes 5 steps you should take to secure your SAP. There are:
1. Pentesting and Audit
2. Compliance
3. Internal security and SOD
4. ABAP Source code review
5. Forensics
SAP License Audit Tips
www.auditbots.com
SAP Audit Procedure for SAP License
Real-time analysis and SAP Audit procedure for SAP license type classification helps companies both reduce the time and cost of SAP license audits, as well as the overall cost of licensing SAP.
By providing live snapshots, methods for classifications and consolidating a user’s various usernames into a single entity, the user license manager can show companies what they can save in licensing costs. SAP License Manager can be automated too.
According to Gartner Senior Analyst, Patricia Adams “ Depending upon the level of maturity, enterprises that implement software usage capabilities will achieve savings of 5% to 25% in the first year”.
The interest in SAP security is growing exponentially, and not only among whitehats. Unfortunately, SAP users still pay little attention to SAP security.
Obtained findings were presented at RSA APAC Conference 2013.
This research focuses on statistics of SAP Vulnerabilities, threats from the Internet, known incidents and future trends.
This document describes the overview of SAP BusinessObjects Rapid Marts, available Rapid Mart
packages, how Rapid Mart packages helps and accelerates in Data Warehouse implementation process
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)Twan van den Broek
SAP Inside Track NL talk by Iver van de Zand
The session “SAP Analytics Cloud as enabler for the Intelligent Enterprise“ will provide you with a technical outlook on how SAP has evolved SAP Analytics Cloud into a tool that is at the core of SAP’s Intelligent Enterprise. Iver van de Zand – Global Head Analytics & Leonardo PreSales – will share the latest SAC evolutions as well as provide you with a detailed outlook on what you can expect on short notice”
The SAP Startup Focus Program – Tackling Big Data With the Power of Small by ...Codemotion
Geared exclusively towards helping startups master big data to the benefit of their users, the SAP Startup Focus Program has truly gone global since its initiation in March 2012. The in-memory database platform SAP HANA forms the basis of this initiative.
Marcus and Sönke from the SAP Innovation Center will introduce the program and provide technical insights into the unique capabilities of SAP HANA in a hands-on manner.
How to reinvent your organization in an iterative and pragmatic way? This is the result of using our digital toolbox. It allows you to transform your business model, expand your ecosystem by setting up your digital platform. This reinvention is also supported by the adaptation of your governance allowing you to innovate while guaranteeing the performance of your organization. For any information / suggestion / collaboration - william.poos@nrb.be
Comment réinventer votre organisation de manière itérative et pragmatique ? C'est le résultat de l'utilisation de notre boîte à outils digitale. Elle vous permet de transformer votre modèle métier, d'étendre votre écosystème en mettant en place votre plateforme digitale. Cette réinvention est également supportée par l'adaptation de votre gouvernance vous permettant d'innover tout en garantissant la performance de votre organisation. Pour toute information / suggestion / collaboration - william.poos@nrb.be
Improve Data Protection and Compliance with UI-Level Logging and MaskingPatric Dahse
For more info about how Natuvion can help with GDPR, visit us on our site: https://natuvion-gdpr.com/
This session highlights two solutions from SAP that can help you increase protection from data theft, and support corporate efforts to comply e.g. with General Data Protection Regulation (GDPR).
Discover how you can benefit from enhanced data access logging and field masking, see the systems in action and get answers to questions around prerequisites, implementation, and operation!
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...Mobile Trends
9.45 – 10.15 Karol Kalisz, Vitaliy Rudnytskiy - Mobile in IoT Context ? Mobile Applications in "Industry 4.0".
How mobile helps in implementations of business requirements in IoT. A view on use cases and infrastructure for IoT.
Introduction to NEW SAP - Accenture Technology MeetupAccenture Hungary
ABAP fejlesztő vagy? Tanácsadó? Nincs elég időd követni az SAP újdonságait, szeretnéd átlátni az egészet és felkészülni az új SAP-ra? Ezúttal az SAP területe került terítékre, s a NEW SAP alapjait mutattuk be.
Az előadás során az SAP HANA, az SAP S/4HANA Enterprise Management, a SAPUI5 és a FIORI, az SAP Cloud Platform, és az SAP Leonardo platformokról volt szó, ezek szerepeiről és együttes hatásáról.
Előadó: Petr Stary (SAP Technology Lead in Accenture)
Data Engineer's Lunch #81: Reverse ETL Tools for Modern Data PlatformsAnant Corporation
During this lunch, we’ll review open-source reverse ETL tools to uncover how to send data back to SaaS systems.
Sign Up For Our Newsletter: http://eepurl.com/grdMkn
Join Data Engineer’s Lunch Weekly at 12 PM EST Every Monday:
https://www.meetup.com/Data-Wranglers-DC/events/
Cassandra.Link:
https://cassandra.link/
Follow Us and Reach Us At:
Anant:
https://www.anant.us/
Awesome Cassandra:
https://github.com/Anant/awesome-cassandra
Email:
solutions@anant.us
LinkedIn:
https://www.linkedin.com/company/anant/
Twitter:
https://twitter.com/anantcorp
Eventbrite:
https://www.eventbrite.com/o/anant-1072927283
Facebook:
https://www.facebook.com/AnantCorp/
Join The Anant Team:
https://www.careers.anant.us
#data #dataengineering #datagovernance
SAP applications contain large amounts of sensitive data: from personal to financial information. A targeted or even inadvertent disclosure of this data thus offers a potential attack surface. If someone from abroad logs in with the user of a designer from Germany, he should not be able to see any company-relevant drawings. A warehouse clerk often does not necessarily need to know what the contents of which package are, and a sales employee should be able to find the right product and packaging unit for quotations, but not necessarily be able to see the purchase prices. Data masking is therefore about protecting data that is there and also necessary, but which not everyone should see in every situation. Classic, static masking policies via authorisation concepts do not take into account the context of access risk and therefore force a compromise between data security and accessibility. This is where the concept of attribute-based data masking comes in: Additional targeted dynamic policies are used without the need for adjustments to SAP for implementation. In this way, fine-grained control is achieved over which information can be viewed by which users in which situation.
Focus of the webinar:
• Data loss prevention as a further protective measure for your sensitive data
• Why a good authorisation concept alone does not provide sufficient protection
• The advantage of dynamic masking measures over static ones
• Best practice tips for restricting views by location, IP address or time of access
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch schreiben Sie uns gerne an: mail@sast-solutions.de
In this webinar, Dürr IT provides insights into how they can transparently present their risk situation with the SAP Security Dashboard of the SAST SUITE and also integrate relevant information into their SIEM system as well as make it available to the company-wide SOC. The focus is on a holistic view of regular punctual parameter checks in combination with real-time threat detection. In addition, we offer an overview of the optimal measures for the best possible risk minimization.
For more and more companies, the holistic overview of the current risk situation and the presentation of information is an increasing challenge. Management views of the current risk situation and its changes over time are required, as are detailed work lists and support for follow-up actions. All this with increasingly diversified contacts in security teams across the company.
Focus of the webinar:
• How dashboards transparently visualize changes in the risk situation
• Integrating SAP security islands into enterprise SIEM/SOC solutions
• Learnings for the implementation of successful SAP Security Dashboards
• Best practice approach to risk mitigation for SAP systems
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch schreiben Sie uns gerne an: mail@sast-solutions.de
Conventional authorization projects are based on a monolithic approach, with a standardized procedure model and a linear sequence of project phases with milestones. In an ideal project, where both the project factors and the final state are known, this approach might go well. But if changes occur during the project, things become more difficult, and the response is often to increase the resources or push the deadline back. Neither is an ideal solution for your project.
In our experience, SAP S/4HANA authorization projects tend to be highly dynamic, due to the lack of a clear overall strategy in the beginning and frequently changing requirements. This is a key reason why such projects fail.
Our SAP experts at SAST SOLUTIONS follow an agile project management approach that is perfectly suited to the complexity and dynamism in SAP S/4HANA projects. Take advantage of our extensive experience and benefit from rapid response times to changing requirements and a continuous optimization process.
Topics of focus:
• Frequent stumbling blocks in SAP S/4HANA authorization projects
• Comparison between “classic” and “agile” project management
• How you can benefit from the SAST project approach
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Every year, SAP audits its customers’ systems and calculates the user-specific license fee based on the collected data. Many companies prefer to leave SAP users active when in doubt, however, out of concern that their day-to-day operations might be disrupted. They fear that a given user ID might still be used technically for background workflows or interface activities.
Use the SAST SUITE to analyze your SAP users, to find out about their actual usage and identify user IDs that are no longer in use. In addition to dialog users, we also focus on background and interface use. This holistic approach makes it possible to derive recommended actions and remove user IDs safely, without any negative side-effects. It’s a double win for you: with the very little effort required, a fast return on investment is practically certain.
Topics of focus:
• How to reduce your SAP license fees without affecting your day-to-day business
• Use the SAST SUITE to identify users that are no longer needed
• Step-by-step instructions for deactivating obsolete SAP users
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Your efforts to protect your SAP systems won't be complete until you have reliable way to keep a constant eye on your transactions and applications. When you detect critical incidents right when they occur, you'll be able take immediate action in response. When you're under attack, your reaction time has a significant impact on the level of damage you can expect. It's not hard to see how a real-time solution like AKQUINET's SAST Security Radar pays for itself in short order.
Detecting attacks based on log files and analyzing network traffic requires in-depth knowledge of the potential paths and patterns such incursions can follow. This is because events relevant to security have to be filtered out of a sea of data and placed in the proper context.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Platform Security: "Insecure SAP system interfaces: an underestimated risk."
-------------------------------------------------------------------------------------
How confident are you that your SAP systems are sufficiently protected against cyberattacks? In our experience, it's far too often the case that companies fail to pay the requisite attention to analyzing and securing their SAP system interfaces. These include RFC connections, SAP Gateway, and extended ST01 traces, along with considerations of their relevance, criticality, and potential defects.
As you take the steps necessary to secure your landscape, the suite module SAST Interface Management can provide you with optimal support. It's capable of evaluating multiple systems, creating a comprehensive interface overview in graphical or tabular format, and categorizing the flaws it finds.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. AXEL DALDORF
Senior PreSales Consultant SAST SUITE
Fon: +49 40 88173-4438
Email: axel.daldorf@akquinet.de
Web: www.sast-solutions.com
WELCOME!
Introducing your host today:
3. With the SAST SOLUTIONS portfolio of akquinet AG, we are your world-class provider for the holistic protection
of SAP ERP as well as S/4HANA systems - with real-time monitoring. In addition to our proprietary software suite,
we offer SAP security and compliance consulting and managed services from a single source.
Worldwide, more than 200 customers with 3.5 million SAP users currently rely on our vast expertise in protecting
their SAP systems from cyberattacks, manipulation, espionage and data theft.
Facts and figures
- 3 -
SAST SOLUTIONS customers worldwide
920
305
165
325
556
796
64
845
Employees
Turnovers Mio. €
5,3
16,3
41,5
28,2
118
2002 2005 2008 2011 2014 2018 2019 2020
132
124
akquinet AG
71
5. SAST gives you the choice!
SAP Security & Compliance – make or buy?!
SOFTWARE SUITE CONSULTING MANAGED SERVICES
Identity and User Access Management
Platform Security
Security Intelligence
Security Consulting
Security Advisory
Authorization Consulting
Software Implementation & Workshops
User Access Management
Platform Security
6. Migration of your SoD analyses into the SAP Cloud Apps.
SAP extension using external systems / cloud applications+
+
+
+
+
- 6 -
Systematics / Differences in authorizations and users
SAST Central Identity Module
Authorization analyses for ARIBA as an example
Q & A
7. The SAP Identity and Account Problem in Practice
Where does an Identity Account have authorizations? And which?
ID: P261165 (Max Müller)
SAP P11/100: MMUELER
SAP P21/200: P261165
Max.Mueller@Kunde.de
SAP P31/300: P261165
DB User: MUELLER
Max.Mueller@4711.kunden.sap.de
- 7 -
8. SAP extension using external systems / cloud applications
SoD conflict using SAP ERP and Ariba integration as examples
Account: Max.Mueller@Kunde.de
Gruppe: SUBMIT_PO
Account: P261165
Rolle: MAINTAIN_VENDOR
SoD
- 8 -
SAP Ariba Cloud Integration Gateway
9. Cross-system account and permission list.
Checking permissions:
Single critical / sensitive.
Separation of functions (SoD) in one system.
Function separation (SoD) across system boundaries.
Possibility of mitigation of risks at all levels.
Central evaluation without double IT systems.
Integration into existing SAST scenarios.
SAP extension using external systems / cloud applications
Requirements from Practical User and Authorization Administration
- 9 -
10. Identity: Describes a unique characteristic of a natural/technical person.
Account: Describes a user account in a defined IT system.
Role:
In SAP context, a set of users and their permissions (object, field, value).
In non-SAP context, a grouping of permissions (characteristics such as CREATE_PO).
Group: A set of users in a non-SAP context.
Systematics / Difference in user and authorization management
Terminology
- 10 -
11. The Central Identity function provides the following functions:
Import identities from
LDAP
HR
SAP
IDM
Import of accounts from systems
Import roles and roles assignment
Available for customers with release 5.20
Connection of external systems using adapters based on RFC, HTTP (SOAP/REST, XML), File.
Support of SAP Netweaver and Ariba from SAST SUITE 5.20, then S/4 HANA Cloud, HANA DB and
others planned.
SAST Central Identity Function
Overview
- 11 -
12. SAST Central Identity Function
"Sync on Premise" as basis for Cross System evaluations
Identity Source Adapter SAP on Premise with SAST SUITE
Identities
Accounts
Roles
Systems
ID-Sources
Info System
and
SOD Engine
and Rules
Cross System
Identity/Account Info
System
Cross System Role
Info System
Authorization and
SoD Scan Results
- 12 -
Account Adapter
Role / Group Adapter
Account Adapter
Role / Group Adapter
Account Adapter
Role / Group Adapter
Account Adapter
Role / Group Adapter
16. Initial situation
Japan's largest pharmaceutical company has SAP landscapes with around 4,000 users
in 50 countries worldwide.
User requests and authorization assignments were handled via Winword forms.
The SAP cloud application "Ariba" is used to optimize the procurement process,
but master data maintenance takes place in SAP ERP.
Standard software solutions on the market usually cover SoD risks only on a single system.
Example: Audit-proof SoD analyses at Takeda.
Project goals
1. Simplification and speed-up of the authorization assignment process.
2. Regular reports on potential risks/conflicts should optimize the control process additionally.
3. Protection of research projects and product innovations is of highest priority for Takeda.
- 16 -
17. Project implementation
Before the implementation of SAST SUITE, the authorization process was optimized.
Development of a cross SoD matrix with check content for SAP ERP and S/4HANA systems
in combination with Ariba and integration into the SAST SUITE.
Identification of various user IDs of a person and assignment to a central identity.
Synchronization of the SAP Cloud Application via SAP Cloud Connector daily or on demand.
Permanent check for SoD conflicts including recommendations for action via SAST SUITE.
Example: Audit-proof SoD analyses at Takeda.
- 17 -
Advantages for Takeda
Establishment of a transparent and secure SAP user management in only two months.
Automated reporting of role conflicts and risks.
Reduction of high and medium critical SoD conflicts by about 70%.
✓
✓
✓
18. - Manfred Meier -
“The SAST SUITE has given us the perfect
solution for our global SAP authorization
management.
At the same time our systems
are permanently monitored
for vulnerabilities.“
19. Take Home Messages for cross-system SoD analyses:
Uniform "central identity" necessary (organisation and standards).
Define your S/4HANA SoD matrix before creating the first role!
The introduction of a "mixed" architecture must be planned and
tightly controlled.
SoD analysis Hybrid-On-Premise / Cloud / Non-SAP possible.
Implement a sandbox system for "test drive" for IT and users.
- 19 -
✓
✓
✓
✓
✓
21. Keep the ball rolling with us…
SAST BLOG sast-blog.akquinet.com
New expert articles, practical tips, case studies, etc. every week
SAST NEWS Registration on the website or by mail: sast@akquinet.de
Current information every 6-8 weeks.
SAST WEBINARS Were you unable to attend a live webinar?
ON DEMAND The webinar archive allows you to individually schedule when you want
to take advantage of our recommendations.
SAST WEBINARS Further topics for 2020 are available on our event page on the web.
- 21 -