Stay in touch with us
Have any questions?
[email protected]
Montreal
+1 (438) 469-0700
Toronto
Start off with a discovery session to decide which pachage is best for you
PACKAGES |
ESSENTIALS Overall SAP® System Security Health Check
|
ADVANCED Overall Application (custom code) Security Vulnerability
|
COMPLETE Corporate security baseline specific to your environment based on SAP® recommendations
|
DELIVERABLES |
SAP® Security overall health report
|
SAP® Security vulnerability report |
Corporate SAP® baseline
|
OUTCOMES |
Clear vision of your current system security health; Key inputs to decrease the risk of a SAP® system intrusion | Key inputs to show how to protect your organization from the risk of a SAP® application security breach | Management Dashboard on your company’s security policy in order to ensure the confidentiality of your business data & the authenticity of your users |
DURATION* |
1-2 Weeks 1 SME * Requires SAP® Solution Manager * Based on one SAP® landscape |
2-3 Weeks 1-2 SME * Requires SAP® Solution Manager * Based on one SAP® landscape * Requires License if on premise |
3-4 Weeks 1-2 SME * Requires SAP® Solution Manager * Based on one SAP® landscape |
PACKAGES |
ESSENTIALS System Prevention • Review current System Security Health Check • Apply Security Hardening |
ADVANCED • DEVops Custom Code Security Protection • Review Overall Application (custom code) Security Vulnerability health check • Custom Code Lifecycle Management (CCLM) |
COMPLETE Identify suspected Attack (Forensics) • SAP® Enterprise Threat Detection |
DELIVERABLES |
• System Security Parameters Activation • Configuring and setting up UCON • Guide to configure UI Masking and UI Logging for SAP User Interface (UIs) • Protection for SAP® password hashes • Secure your SAP® Cloud Connector® or SAP® Connect |
• Configure and activate your CCLM • ATC, CCLM, and CVA systems to manage your code • Walk through on your personal DASHBOARD |
• Security & Technology Architecture and Blueprint Report • Input to Build your target SAP® Threat Detection • Input you need to select your platform • Configure and activate your SAP® Enterprise Threat Detection |
OUTCOMES |
Decrease the risk of a SAP® system intrusion | DASHBOARD to identify vulnerable code before going to production and retire codes that no longer being maintain | Substantially reduce the risk of costly downtime due to wrong user interaction or security breach |
DURATION* |
2-3 Weeks 1-3 SME * Requires latest version of SAP® Solution Manager * Based on one SAP® landscape |
4-6 Weeks 2 SME * Requires latest version of SAP® Solution Manager * Requires License for CVA * Requires sizing of infrastructure * Based on one SAP® landscape |
6-10 Weeks 2-3 SME * Requires License and infrastructure |