Securing IT systems and certain business-critical systems such as SAP is becoming increasingly important. At the same time, we see that many SAP companies have…
Posted by Joris van de Vis, SAP Security researcher and co-founder at Protect4S Introduction In this post, we’ll look at CVE-2019-0328, a vulnerability found by…
Why is Protect4S offering a new feature, the Protect4S Connection Map? An average SAP landscape consists of multiple SAP systems with many interconnections. These connections…
Within the cyber security industry, Risk is an important and central concept. It is commonly defined as exposure to harm or loss resulting from breaches…
Companies looking for ways to secure their SAP systems commonly face three problems: 1. Information overload SAP customers who want to start with SAP Security…
The following scenario is a typical one: You are running SAP systems to support your business-critical processes. Your landscape probably contains SAP ECC, SAP Solution…
As more and more companies move their SAP systems to the cloud for various reasons (business transformation, cost control, ICT policy, focus on core business…