Seamless integration of threats Introduction Since the release of our Threat Detection solution, we have been working extensively on expanding functionality in various ways. One…
An easy way to process SAP threats without a SIEM solution Introduction Usually, a typical SAP threat detection scenario runs through a SIEM solution in…
And why it is important to scan SCC systems regularly Introduction Every month, new security features and checks are released for our SAP Vulnerability Management…
Practical guidelines for SAP components We wrote earlier about what general approach to take when implementing HTTPS in an SAP environment to enhance SAP security,…
SAProuter as an example We have recently pointed out the advantage of a reverse invoke configuration and explored this for the SAP Web Dispatcher component,…