Why and how to minimize your Attack Surface in SAP

8 results

  1. Why and how to minimize your Attack Surface in SAP

    May 21, 2021

    Cyber attacks are growing exponentially as remote work becomes the norm and new exploits capture the attention of hackers. A key theme is that these threats increasingly focus on the application layer – more specifically, the user layer – leveraging privileged accounts to get the keys to your kingdom. While perimeter security and IAM best…

  2. How MARS, Inc. is Achieving Unrivaled Visibility into SAP Data Access & Usage

    The SAP team at MARS knows that deep visibility into application activity is no longer a “nice to have” option. With newly discovered vulnerabilities (RECON) and growing data privacy mandates (GDPR, CCPA), understanding SAP data access and usage is as critical as maintaining a secure network. In this session, join Matt Pecorelli, Director of Cyber…

  3. Least Privilege 2.0: Controlling Risk in a Dynamic Environment

    A growing landscape of laptops and smartphones, widespread internet access, and remote workforces throughout the world have increased the need for risk and identity management and has changed how security models should operate. Continuing to focus on only two dimensions, the “Who” (users and user groups) and the “What” (roles and authorizations), leaves organizations vulnerable…

  4. Strengthen Security & Risk Management in Your Journey to SAP S/4HANA

    Migrating to S/4HANA represents one of the largest opportunities for business transformation an organization can undergo. As with most large-scale implementation projects, the audit of existing business processes must play a vital role in managing risk. In addition, optimizing and putting additional controls in place must be considered, as business processes have likely grown in…

  5. Impact20: Real-Time SoD Detection & Prevention

    Static, role-based access controls are reaching their limitations. This is especially apparent with the enforcement of Segregation of Duties in SAP. While RBAC has value in its simplicity, relying on a static SoD model poses constraints. By integrating attribute-based access controls (ABAC) into SoD policies, organizations can now overcome many of these challenges. Together, this…

  6. Impact20: Auditing SAP License Usage before moving to S/4HANA

    There is no denying that SAP applications make it easy for organizations in almost every industry to streamline their business processes. However, that ease doesn’t include SAP software license management, which by all accounts, is considered one of the most complex compared to other ERP vendors. When migrating to S/4HANA, performing an independent license audit…

  7. The Benefits of Application GRC

    This year has seen many organizations face challenges brought on by the economic climate. Some have reduced staff, while others are putting projects on hold to reduce the need for capital expenditure. This is particularly true in the cybersecurity space as seen in our May 2023 report Cybersecurity Threats to SAP Systems. More than half…

  8. Pathlock: The New Leader in Application Security and Controls Automation

    Watch as Pathlock discusses their recent merger with Security Weaver, Appsian, SAST, and CSI Tools. Learn how SAP customers can benefit from this powerful combination of best-in-class technologies.