English | Deutsch | Español

Virtual Forge Blog

For over 10 years we help companies around the world to optimize the security and stability of their SAP landscapes. On the Virtual Forge Blog, our experts provide relevant content ready to help you to better understand and mitigate your IT risks.

Teaser-Blog-neu.png

How you can Hack any SAP® System through Transports unnoticed

July 5, 2018 From Lars Kehrel

At this year's ASUG Conference in the USA, SAP’s CSO presented 10 topics that are highly relevant for the security of SAP® systems. These include areas such as network and database security, authorizations and code security. However, two very important areas were missing in this overview: the safeguarding of interfaces and the security of transports. In our opinion, the lack of these areas in many lists is a major omission.  

Read more

Topics: UnderstandYourRisk, Transport Security

SAP® Security- Reading Recommendations

"If our economy is to thrive, our commitment to cyber-security must be consistent with our commitment to innovation." Justin Somaini, Chief Security Officer of SAP®, presents this sentence in a security lecture by the American SAP user group ASUG. We, the Virtual Forge, can only agree here.

Read more

Topics: UnderstandYourRisk

SAP Security: Hot Topics 2018

March 29, 2018 From Lars Kehrel

In times of increasingly linked IT systems and the growing relevance of systems and data in business processes, the business risk that IT carries on its shoulders is also increasing. 76% of all financial transactions worldwide pass through an SAP® system in at least one place!

Read more

Topics: UnderstandYourRisk

SAP® Security: Do you know your SAP Security Situation?

January 30, 2018 From Caroline Neuber, Virtual Forge GmbH

IT security has many facets. Your SAP® systems are only one of them, but they are the most important ones. They contain personal data of your customers, employees and partners and depict the business processes that are vital for your survival. An attack on your SAP systems has serious consequences for your company. Not only considerable costs for detecting and correcting the attack, but also production downtime, high penalties and enormous damage to the image can be the result.

Read more

Topics: UnderstandYourRisk