SAP Cyber Security

Cyber crime represents the greatest risk to economic health in history. It is forecast that by 2021, cyber crime will cost the world in excess of
$6 trillion annually, up from $3 trillion in 2015. Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.

 

So are SAP systems safe?
Up until 2012, many people thought so, that was until the Greek Ministry of Finance’s SAP system was hacked and information was posted online. Since then, there have been many high-profile hacks including the US Department of Homeland Security. So, the simple answer is that SAP needs to be protected and monitored, and knowing what is happening in your SAP system is key.

Understand and Remediate SAP Cyber Security threats with a Winterhawk Vulnerability Assessment
Designed to provide organisations with real-time intelligence about suspicious activity in their SAP systems. Identify hackers and malicious behaviour before any harm is done.

Schedule a SAP Cyber Vulnerability Assessment today

Gain a full picture of risk across your SAP landscape with recommendations and action plans.

  • We perform over 1,600 checks across an array of areas (Firewalls, Web Dispatchers, Folder Share permissions, Open ports, Kernel, Path manipulations, Code Injections, OS and DB checks, OS commands, Table logging, RFCs, identification of any missing SAP Security notes etc).
  • We also examine what and where your SAP systems are connected to as part of a connection mapping risk review.
  • All vulnerabilities are prioritised for risk and mitigation effort.
  • Clear recommendations are provided including mitigation plans, actions and improvements.

Requirements

  • As part of our assessment, we leverage a SAP certified Add-On for both S/4HANA and NetWeaver, which can be installed in minutes.
  • No agents or additional hardware are required.

“While you can control security through authorisations, and you can deploy a GRC solution to guard against segregation of duties, even with strong patch management, there are so many vulnerabilities that a hacker can expose to gain open access to data. We get our clients up and running quickly, in a matter of hours, and able to make immediate changes to close out threats and see where any breaches have occurred.”

Linda Hewison, Winterhawk Partner

 

Summary

  • Move from reactive to a preventive and controlled state, understanding your organisation’s risks, with mitigation activities made easy by clear and understandable remediation management reporting.
  • The assessment, including issuing and walkthrough of the management report, takes approximately 10 days end to end.
  • Our low-cost assessment is offered as either a one-time service or can be scheduled at an agreed frequency.

Get in touch

Contact Winterhawk to schedule a SAP Cyber Vulnerability assessment.