SAP Cyber Security

Cyber crime represents the greatest risk to economic health in history. It is forecast that by 2021, cyber crime will cost the world in excess of
$6 trillion annually, up from $3 trillion in 2015. Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.

What keeps you awake at night?

  • Do I have critical SAP Security notes that might be missing? Are we up to date?
  • Is our RFC Gateway secure?
  • How secure are the connections between my SAP systems?
  • Have can I assure my management that our SAP systems are secure?

Eliminate SAP Cyber Security threats with
a Winterhawk Vulnerability Assessment

Designed to provide organisations with real-time intelligence about suspicious activity in their SAP systems. Identify hackers and malicious behaviour before any harm is done.

Schedule a SAP Vulnerability Assessment today

Gain a full picture of risk across your landscape with recommendations & action plans.

  • Over 1,600+ checks
  • Heatmaps – All vulnerabilities prioritised for risk and mitigation effort
  • Clear recommendations, mitigation plans with actions and improvements
  • Connection Mapping – providing a full overview of risks in your SAP connections
  • Identification of any missing SAP Security notes (we can also implement them for you)

System Requirements

  • An SAP certified Add-On for both S/4HANA and NetWeaver.
  • Can be installed within 1 day.
  • No agents or additional hardware are required and completely removable after use.

“While you can control security through authorisations, and you can deploy a GRC solution to guard against segregation of duties, even with strong patch management, there are so many vulnerabilities that a hacker can expose to gain open access to data. We get our clients up and running quickly, in a matter of hours, and able to make immediate changes to close out threats and see where any breaches have occurred.”

Bill Oliver, Winterhawk Director & SME in Data Privacy

Summary

  • Scans, Heat Maps (risk analysis), Mitigation planning, Connection Maps, SAP Security note gaps and optional implementation.
  • Move from reactive / manual to a preventive / controlled and planned state.
  • Analysis and mitigation activities made easy by information pointers, dashboards and task lists.
  • Clear, understandable management reports for desktop and mobile.
  • The assessment can be repeated and offered as an ongoing service (some clients seek a quarterly health check) or clients can purchase the software and we’ll provide the necessary training to enable an in-house team to provide ongoing assurance.

Get in touch

Contact Winterhawk to schedule an assessment.