Contact us today.

Subscribe me to your mailing list


Implementing SAP Vulnerability Management Process. Part 2

This is the second article in the series “Implementing SAP Vulnerability Management”. In the first part, we’ve described the motivation for the practice, mentioned that vulnerability assessment tools generate tons of reports of enormous size and we need an approach to organize remediation work efficiently and swiftly.

In order to prioritize our remediation activities, we need to be aware of all assets, their relative importance, and vulnerabilities.

Read more..