Sap security Online Training |SAP Security Training in India. PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: Sap security Online Training |SAP Security Training in India.


1
(No Transcript)
2
SAP SECURITY
  • MWR have long been interested in SAP security.
    Its very clear from talking to our clients, and
    to the attendees of our regular that SAP security
    issues are at the forefront of their agenda.
    Given that SAP systems are the core operational
    system of many businesses, where even the
    smallest level of compromise can have devastating
    effects, this comes as no surprise. What does
    come as a surprise is how many organizations.

3
SAP SECURITY
  • This misconception comes from the definition of
    what an SAP environment is. Typically, SAP
    platforms are comprised, at least, of three
    different tiers Development, Quality Assurance
    and Production It is very common that, depending
    on your role inside your organization, you might
    be conceptualizing differently what an SAP
    environment is.

4
SAP SECURITY
  • It is true that you can find real and serious
    risks at the production environment, however, we
    need to recognize that this tier is always
    connected to the others and also to more SAP or
    non-SAP systems where we can definitely find real
    risks too that can even be bigger.

5
SAP SECURITY
  • Because of this I always recommend to expand
    the risk sight when executing a security
    assessment on SAP environments we need to have a
    full approach here in order to identify all the
    possible risks that can affect the
    confidentiality, integrity and availability of
    the information supported by, in this case, an
    SAP environment.

6
SAP SECURITY
7
SAP SECURITY
  • Many of the systems discovered on the Internet
    were also reportedly found to be running
    vulnerable services and/or old and out of date
    versions of SAP software. In addition, it was
    found that systems could be exposed to attack
    from unauthenticated attackers and/or
    authenticated attackers (who could gain access
    using default well known username/password
    combinations. In MWRs experience, once a
    foothold on a SAP system is obtained compromise.

8
SAP SECURITY
9
Thank You
  • By
  • HYDERABADSYS Online Training
  • Contact Us
  • HYDERABADSYS.COM
  • INDIA 91 9030400777   
  • USA 1-347-606-2716
  •  Email contact_at_Hyderabadsys.com
Write a Comment
User Comments (0)
About PowerShow.com