Foreword

During cyberattacks, malicious actors bypass multiple security devices in order to achieve their goal: the application layer. Thus, critical data for daily business activities are often reached through applications and professional softwares like ERPs.

The various technologies used in ERP environments generate an increasing complexity for the management of patches and vulnerabilities, which makes protecting data more and more painstaking. This situation consequently degrades the cost / benefice ratio. Indeed, companies need to cover a large attack surface in order to protect themselves from hackers that can concentrate on just one precise vector to penetrate systems.

In order to minimize this attack surface, the security of systems & applications landscapes need to follow essential best practices:

  • Have a strategic approach regarding the deployment of patches and updates,

  • Centralize the processing of identity data originating from multiple sources,

  • Protect and secure data access and communication between different applications in the Information System,

  • Implement a centralized system for the monitoring of telemetry data to detect threats.

« By 2020, 100% of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually, up from 40% today »

Gartner 2018

With a good knowledge of SAP systems, ArtimIS can support you in the management of these topics, in particular by applying best practices adapted to your context. Our SAP cybersecurity offering therefore addresses these four major topics.