PROTECT YOUR SAP SYSTEMS FROM CYBER ATTACK

RUN SECURE WITH SAP SOLUTION MANAGER



Watch Video
500+ SAP Vulnerability Checks

SAP Vulnerability Checks

Automated Vulnerability Scanning

Automated Vulnerability Scanning

Real-Time Alerts for Cyber Attacks

Real-Time Alerts for Cyber Attacks

No Software Licensing or Installation

No Software Licensing or Installation

AUTOMATED CONTINUOUS SECURITY
MONITORING FOR SAP SYSTEMS

SAP Solution Manager leverages vulnerability rulesets developed by Layer Seven Security to continuously monitor the security of SAP systems. This includes vulnerabilities that expose your systems to cyber attack and events in SAP logs that could help you identify attacks in real-time.
 

  • Performs automated scans for vulnerabilities that expose SAP systems to cyber attack
  • Generates alerts for critical security events in SAP systems
  • Supports all SAP systems including ABAP, Java and HANA
  • Integrates with SAP Business Intelligence for advanced analytics
  • Provides dynamic dashboards for compliance monitoring
  • Recommended by SAP for vulnerability and security patch management

How it Works

License vulnerability rulesets from Layer Seven Security

1. LICENSE
License vulnerability rulesets from Layer Seven Security

Import rulesets into SAP Solution Manager

2. IMPORT
Import rulesets into SAP Solution Manager

Analize results using SAP Business Intelligence

3. REPORT
Analize results using SAP Business Intelligence

Subscribe to rule updates

4. UPDATE
Subscribe to rule updates

Vulnerability Rulesets

Vulnerabilty rulesets are benchmarked against best practices and SAP security recommendations. The rulesets are imported into SAP Solution Manager to perform vulnerability checks for the areas below. They are continuously updated by Layer Seven Security to counteract new threats and vulnerabilities

Gateway Security Server

Gateway Security Server

RFC Security

RFC Security

Transport Layer Security

Transport Layer Security

Standard Users

Standard Users

Critical Profiles, Authorizations and Transactions

Critical Profiles, Authorizations and Transactions

Message Server Security

Message Server Security

Password Policies

Password Policies

Table Access

Table Access

Web Services

Web Services

Missing Security Notes

Missing Security Notes

UME Settings

UME Settings

Java Services

Java Services

Hana Parameters

HANA Parameters

Hana Privileges

HANA Privileges

Audit Settings

Audit Settings

SAP Business Intelligence Reporting

SAP Business Intelligence Reporting

Support for SAP HANA and S/4HANA

Support for SAP HANA and S/4HANA

SAP-Recommended

SAP-Recommended

SAP Support and Maintenance

SAP Support and Maintenance

DOWNLOAD OUR FREE GUIDE
TO SECURING SAP SYSTEMS
AGAINST ADVANCED THREATS


DOWNLOAD WHITE PAPER

Schedule a Demo