Posts

The research finds that more than 90 percent of companies plan to invest into technology that enables predictive maintenance. [shutterstock: 551791498, Zapp2Photo]

The research finds that more than 90 percent of companies plan to invest into technology that enables predictive maintenance. [shutterstock: 551791498, Zapp2Photo]

European Manufacturers Take Steps Towards Predictive Maintenance

A new PAC/CXP Group study finds that 93% of European manufacturers and transport operators believe that their maintenance processes for industrial equipment and vehicles are not very efficient.

[Read more]

Development systems and extensive authorizations can increase the risk of an attack on SAP systems. [shutterstock: 399288955, hywards]

Development systems and extensive authorizations can increase the risk of an attack on SAP systems. [shutterstock: 399288955, hywards]

SAP Transport Management Part 2: Circumventing Authority Checks

The first article of this series talked about the global deactivation of authorization checks for single authorization objects per transport. A similar risk results from the possibility of deactivating authorization checks transaction-specifically. It is even more difficult to detect an attack if this method is used, as the impact can be limited to one transaction.

[Read more]

The opinions on the SAP authorization concept diverge widely. The concept works well in theory, in practice, vulnerabilities do exist. [shutterstock: 624185789, Markus Mainka]

The opinions on the SAP authorization concept diverge widely. The concept works well in theory, in practice, vulnerabilities do exist. [shutterstock: 624185789, Markus Mainka]

SAP Transport Management Part 1: Circumventing Authority Checks

The opinions on the SAP authorization concept diverge widely. Surely, a certain complexity and the related maintenance effort cannot be denied. Yet, the most important requirement, the gapless protection of all read and write accesses within a program, can be realized quite well – at least in theory. In practice, there are several options to circumvent authorization checks.

[Read more]

The transport sector in Europe is showing maturity even beyond the proof of concept stage when it comes to IoT. [shutterstock: 754750660, BigBlues]

The transport sector in Europe is showing maturity even beyond the proof of concept stage when it comes to IoT. [shutterstock: 754750660, BigBlues]

83% of Transport Companies in Europe Ready to Raise their IoT Game

A new PAC – CXP Group study finds that 83% of European transport companies plan to increase their IoT solutions spending in the next three years as they look to achieve a higher level of operational efficiency.

[Read more]

Even with years of experience in IT security, securing an SAP system with custom codes and be quite the challenge. [shutterstock: 264410330, file404]

Even with years of experience in IT security, securing an SAP system with custom codes and be quite the challenge. [shutterstock: 264410330, file404]

Why SAP Security Is Difficult For Security Departments To Understand

I recently wanted to tell a colleague of one of our partners the benefits of our Virtual Forge TransportProfiler solution. The first question I encountered was “What is a transport?” Now, it’s not as if the individual with whom I was speaking was incompetent: He has over 25 years of experience in IT security, CISSP, CISM, and as a lecturer; nevertheless, in the long conversation followed, I had to explain to him the basic architecture of an SAP system.

[Read more]