Pathlock Germany
Pathlock is the leading security & GRC specialist for SAP and hybrid landscapes.
Pathlock is the leading security & GRC specialist for SAP, S/4HANA, multivendor and hybrid ERP systems. With 500 employees at 15 locations worldwide, we advise more than 1200 customers. Pathlock combines comprehensive software, high expertise and established best practice methods for the protection of business-critical applications, data and processes. We support companies in detecting anomalies, hacker attacks, manipulation and data theft.
IT service
SAP Security
Threat Detection
Security & Vulnerability Management
Software for GRC
Security & Vulnerability Management
Downloads
Videos
Links
All E3 articles by the authors
Interface Management: The open barn door in SAP
An open secret to which many management teams have so far paid little attention: the lack of control of interfaces in IT system landscapes. The fact that interface management was neglected was hardly surprising when SAP landscapes were still self-contained.
IT systems. However, this situation has changed fundamentally.
The new SAP licensing model can be expensive!
Until now, it was primarily a security issue when companies simply migrated their existing roles to S/4 without checking them. With the new licensing model, however, overly generous authorizations lead to a real explosion in costs.
Customized Masking
From protected personal to privileged financial information:
SAP applications contain large amounts of sensitive data. These always also harbor risks that companies must counter.
A new understanding of security
One realization these days is that security is a vulnerable commodity. Critical infrastructures such as nuclear power plants and hospitals are becoming targets of warlike aggression, and at the same time cyberattacks are increasing on an unprecedented scale.
Works after all! Agile Authorization Management in S/4HANA
Classic entitlement projects are based on a monolithic approach with a linear sequence of project phases with milestones. In an ideal project environment, where both the project drivers and the end state are known, this may work.
After the Test is the Same as Before the Test
Every year, as every SAP and security manager knows, the auditor's audit is due. And yet there is often uncertainty about the current risk situation of SAP systems.
Quickly and securely to S/4HANA Role Conversion
Roozbeh Noori-Amoli and Alina Demuth from SAST SOLUTIONS explain why authorization concepts can determine the success and dynamics of the S/4HANA transformation using the example of their authorization project at PUMA SE, its challenges, solutions and learnings.
The secure role conversion in S/4 Hana migration
The changeover to S/4 is picking up speed: Most companies in Germany are in the concrete planning phase or are in the process of converting. However, those responsible often do not take SAP security and compliance into account at the same time.
Self-Adjusting Authorizations
Companies make their SAP authorization process too easy, which, according to current findings, leads to users having 75 percent more authorizations than they need. The motto is: Clean up.