Contact us today.

Subscribe me to your mailing list

Research Team

SAP S/4 HANA Security Guide: Introduction

This article is the first and introductory part of a new series of guidelines describing the main security areas of SAP S/4 HANA and SAP HANA systems.

It is well-known that ERP systems such as SAP ECC and SAP S/4 HANA in particular may dramatically enhance the quality and speed of the management of all the information and resources involved in a company’s operations.
Read more..

SAP Vulnerability Management. Part 4: Reporting

Vulnerability Management is the most fundamental security practice that provides discovery and security assessments of SAP systems. An approach to recognizing weak points drives security patching, incident management, security event monitoring and all other security capabilities.

Read more..

EAS-SEC. Oracle PeopleSoft Security Configuration. Part 6: Insecure settings

A typical PeopleSoft system is quite large and complex, so there are a lot of settings, which affect its security. Some of them we have already described. This part of the guideline is focused on specific insecure configurations, which can’t be tied to any other group.

There are 4 important areas that should be covered; one is common for any large ERP system and the remaining ones are specific to PeopleSoft.
Read more..