Thank You!

Thank you for contacting Layer Seven Security. We will respond to your request in 1-2 business days.

Here are some recently published articles speaking to securing your SAP systems.

OPM Data Breach Reveals the Limitations of Cybersecurity Solutions

Posted on
The fallout from the record-breaking breach disclosed by the Office of Personnel Management (OPM) earlier this month reached a low point at a Capitol Hill hearing on June 16. During the hearing, members of the House Committee on Oversight and Government Reform scolded OPM officials and IT executives for their “complete and utter failure” to protect …
Read Article OPM Data Breach Reveals the Limitations of Cybersecurity Solutions

Are 95 percent of SAP systems really vulnerable to cyber attack?

Posted on
Earlier this month, SAP issued a strongly-worded response to claims made by the software vendor Onapsis in a press release that over 95 percent of SAP systems assessed by Onapsis were exposed to vulnerabilities that could lead to the compromise of SAP systems. According to SAP, “The press release published by Onapsis is aimed at …
Read Article Are 95 percent of SAP systems really vulnerable to cyber attack?

Turn the Tide against Cyber Attacks with SAP Enterprise Threat Detection

Posted on
One of the most striking facts revealed by the 2014 Verizon DBIR is that only one in every six data breaches are detected by organizations that are the victim of such breaches. The statistic revealed that the vast majority of organizations lack the capability to detect incidents that lead to a data breach. According to …
Read Article Turn the Tide against Cyber Attacks with SAP Enterprise Threat Detection

Discover Security Patches for your SAP Systems using System Recommendations

Posted on
One of the most startling facts revealed by the 2015 Cyber Risk Report is that over 44 percent of data breaches stem from the exploitation of known vulnerabilities that are over two years old. This suggests that effective patching can dramatically lower the likelihood of a successful data breach and, when employed with other countermeasures …
Read Article Discover Security Patches for your SAP Systems using System Recommendations

Five Logs that Could Reveal a Data Breach in your SAP Systems

Posted on
One of the most important discoveries uncovered by security researchers investigating the recent data breach at Anthem is that the original compromise may have occurred as early as April 2014, nine months before the breach was discovered by the organisation.  The attack has led to the loss of personal information impacting over 80 million individuals. …
Read Article Five Logs that Could Reveal a Data Breach in your SAP Systems

SAP Cybersecurity Framework 2.0: What’s New?

Posted on
Since the official release of the SAP Cybersecurity Framework in 2014, the standard has become the de facto benchmark for securing SAP systems from advanced cyber threats. Drawing upon guidance issued directly by SAP, as well as the real-world experience of front-line SAP security architects and forensic investigators, the framework delivers a single point of …
Read Article SAP Cybersecurity Framework 2.0: What’s New?

Three Steps to Prevent a Sony-Scale Breach of Your SAP Systems

Posted on
The recent attack experienced by Sony Pictures Entertainment may well prove to be the most significant breach of the year. By all measures, the impact has been devastating for the organization, leading to the loss of almost 40GB of data to attackers. This includes not only proprietary intellectual property such as digital media, blueprints and …
Read Article Three Steps to Prevent a Sony-Scale Breach of Your SAP Systems

New SAP Guidance Recommends Configuration Validation for Security Monitoring

Posted on
Some of the most critical recommendations issued by SAP in the recently released paper Securing Remote Function Calls include the use of configuration validation in Solution Manager to monitor RFC destination settings. This includes checks for destinations with stored credentials, trusted connections, and authorizations granted to RFC users in target systems. It also includes the …
Read Article New SAP Guidance Recommends Configuration Validation for Security Monitoring

Featured in SAPinsider: How to Build Security using SAP Solution Manager

Posted on
Data breaches occur all too often and organizations are frequently left blindsided. As a result, cybersecurity has become a board-level issue across all industries. According to a recent survey of global business leaders, cyber risk is regarded as one of the most significant threats faced by corporations today, and is consistently rated higher than legislation, …
Read Article Featured in SAPinsider: How to Build Security using SAP Solution Manager

FBI Director James Comey Speaks out on the Threat of Cybercrime

Posted on
During a candid discussion with host Scott Pelley of 60 Minutes at FBI headquarters in Washington DC, James Comey speaks out about the threat of cybercrime confronted by American citizens and corporations. Comey declares that cybercrime perpetrated by nation states, criminal syndicates and terrorist organizations has reached epidemic proportions and is directly costing the US …
Read Article FBI Director James Comey Speaks out on the Threat of Cybercrime

A Five Step Guide to Securing SAP Systems from Cyber Attack Without Breaking the Bank

Posted on
With SAP solutions deployed by 85 percent of Forbes 500 companies, they are a prized target for cyber attackers. Watch our Webinar playback to discover how to secure your SAP systems against targeted cyber attacks that could lead to denial of service, financial fraud or intellectual property theft. The Webinar is hosted by John Corvin, …
Read Article A Five Step Guide to Securing SAP Systems from Cyber Attack Without Breaking the Bank

Three More Reasons for using Solution Manager to Secure SAP Systems from Cyber Attack

Posted on
Our recent article outlining the advantages of using SAP-delivered components versus third party software resonated strongly with customers seeking an effective and cost-efficient solution to address cyber threats impacting their SAP systems. The article examined the five key benefits of a Solution Manager-based strategy that included lower costs through the avoidance of licensing and maintenance …
Read Article Three More Reasons for using Solution Manager to Secure SAP Systems from Cyber Attack

Five Reasons You Do Not Require Third Party Security Solutions for SAP Systems

Posted on
You’ve read the data sheet. You’ve listened to the sales spin. You’ve even seen the demo. But before you fire off the PO, ask yourself one question: Is there an alternative? In recent years, there have emerged a wide number of third party security tools for SAP systems. Such tools perform vulnerability checks for SAP …
Read Article Five Reasons You Do Not Require Third Party Security Solutions for SAP Systems

M-Trends, Verizon DBIR & Symantec ISTR: Detecting and responding to cyber attacks has never been more important

Posted on
The release of three of the most important annual threat intelligence reports earlier this month confirmed that 2013 was an explosive year for cybersecurity. All three reports point to rising incidences of cyber attack, increasing sophistication of attack vectors and a growing diversity of threat actors and targets. The first of the reports is entitled …
Read Article M-Trends, Verizon DBIR & Symantec ISTR: Detecting and responding to cyber attacks has never been more important

Trustwave Survey Reveals that IT Professionals are Feeling the Pressure of Board Level Scrutiny over Cyber Security

Posted on
The rise in the rate and sophistication of cyber attacks has predictably fuelled the pressure on security resources. However, the precise complexion and source of the pressure was largely unknown until the recent release of the Trustwave Security Pressures study. The study examines the threats most concerning to security professionals and the preferred responses. The …
Read Article Trustwave Survey Reveals that IT Professionals are Feeling the Pressure of Board Level Scrutiny over Cyber Security

A First Look at the U.S Data Security and Breach Notification Act

Posted on
On January 30, members of the U.S Senate and House of Representatives introduced a new bill intended to enforce federal standards for securing personal information and notifying consumers in the event of a data breach. Sponsored by leaders of the Senate Commerce, Science and Transportation Committee, the Security and Breach Notification Act of 2014 would …
Read Article A First Look at the U.S Data Security and Breach Notification Act

Measuring the Risks of Cyber Attack

Posted on
Most studies that examine the impact of cyber attack tend to focus on a combination of direct and indirect costs. Directs costs include forensic investigations, financial penalties, legal fees, hardware and software upgrades, etc. The approach is typified by the annual Cost of Data Breach Study performed by the Ponemon Institute, now in its eighth …
Read Article Measuring the Risks of Cyber Attack

Three Parallels between the POS Breach at Target Corp. and Vulnerabilities in ERP systems

Posted on
The decision of the Office of the Comptroller at the U.S Department of Treasury to recognize cyber threats as one of the gravest risks faced by organisations today appears to be vindicated by the disclosure of an unprecedented data breach at Target Corporation shortly after the release of the Comptroller’s report. Specifics of the breach …
Read Article Three Parallels between the POS Breach at Target Corp. and Vulnerabilities in ERP systems

New malware variant suggests cybercriminals are targeting SAP systems

Posted on
Security researchers at last week’s RSA Europe Conference in Amsterdam revealed the discovery of a new variant of a widespread Trojan program that has been modified to search for SAP systems. This form of reconnaissance is regarded by security experts as the preliminary phase of a planned attack against SAP systems orchestrated by cybercriminals. The …
Read Article New malware variant suggests cybercriminals are targeting SAP systems

Layered Defenses in Oracle 12c: The New Benchmark for Database Security

Posted on
Oracle databases support more than two thirds of SAP deployments in mid to large size enterprises. Oracle’s domination of the SAP database market is due to a widely regarded performance edge in areas such as compression, availability and scalability. Oracle databases are also optimized for SAP technology as a result of a long-standing partnership between …
Read Article Layered Defenses in Oracle 12c: The New Benchmark for Database Security