SAP Configuration Validation Solution Brief. Objectives Solution Benefits Quick Facts

Size: px
Start display at page:

Download "SAP Configuration Validation Solution Brief. Objectives Solution Benefits Quick Facts"

Transcription

1 SAP Configuration Validation Solution Brief Objectives Solution Benefits Quick Facts

2 Drive your business with confidence Realize the potential of SAP software Develop a robust response to cyber risks SAP Configuration Validation empowers organisations to realize the potential of SAP software and deliver on the promise of cloud computing, in-memory analytics, mobility and other technological trends. It provides the secure platform to transform organisational processes and drive your business with confidence. Automatically detect potential cyber attacks Maximize the benefits of standard SAP licensing agreements The threat of cyber risks in a hyperconnected world demands a robust and coordinated response. Cyber threats can paralyze decision-making and prevent organisations from rapidly realizing the benefits of emerging trends that contribute to business growth. According to the World Economic Forum, such trends are expected to generate between US$ trillion in value for the global economy by The opportunities presented by technological trends can only be realized by organisations that effectively manage the associated risks. This includes the risk of fraud, data and intellectual property theft and the malicious disruption of enterprise systems. SAP Configuration Validation enables organisations to meet this challenge. Configuration Validation continuously monitors critical security settings within SAP systems and automatically alerts customers of changes that may expose systems to cyber attack. The powerful monitoring solution is delivered by SAP with standard licensing agreements and is available in SAP Solution Manager 7.0 and above.

3 Automate continuous security monitoring for your SAP systems Leverage comprehensive information repositories in Solution Manager Automatically detect variances against security benchmarks Receive alerts for critical security vulnerabilities Filter and drilldown findings using Business Warehouse reports Configuration Validation leverages information repositories within Solution Manager that are automatically populated with data from managed systems through existing plugins and agents commonly installed in SAP systems. The repositories include information related to the following areas: Security-related instance and profile parameters Access control filters in gateway and message server security files RFC destinations with stored logon credentials and privileged users Active Web services Password policies Standard users Critical user authorizations Authorization profiles Security patching A scheduled and automated analysis of actual configuration data from managed systems against security benchmarks is performed by Configuration Validation. An alert is automatically generated and issued to designated officers for noncompliant areas revealed by the analysis. Configuration Validation provides an intuitive, simple and user-friendly interface through Work Centers in Solution Manager. Furthermore, it offers advanced filtering and drilldown reporting capabilities through an integrated instance of SAP NetWeaver Business Warehouse (BW).

4 Take advantage of standard SAP software components Leverage professional services delivered at fixed cost, scope and timeline Configuration Validation is available to SAP customers through standard agreements and therefore, does not require the licensing of additional software components. Align security checks with your specific policies and risk profile Benefit from SAP support Maximize return on investment Layer Seven Security can enable Configuration Validation in your SAP landscapes through professional services delivered at a fixed cost, scope and timeline. This includes: Reference and target system configuration Custom security rules Comparison list creation Job scheduling and automated report distribution Custom dashboards and reports E2E alerting End user training Technical support The security benchmarks in Configuration Validation are transparent and therefore can be customized to align with the specific policies and requirements of each customer. Benchmarks can also be adapted for specific systems. Production or external SAP systems, for example, can be validated against a stronger standard than non-production, internal systems. Checks performed by third-party security tools are hardcoded and therefore cannot be tailored by customers. Furthermore, such solutions require additional licensing and are not supported by SAP. Configuration Validation offers a higher return on investment than non-sap solutions by avoiding the capex and opex for software licensing and maintenance.

5 Summary SAP Configuration Validation empowers organisations to realize the potential of SAP software and technological trends. It continuously monitors critical security settings within SAP systems and automatically alerts customers of changes that may expose systems to insider and outsider threats including cyber attack. Solution Leverage comprehensive information repositories in Solution Manager Automatically detect variances against security benchmarks Receive alerts for critical security vulnerabilities Filter and drilldown findings using Business Warehouse reports Contact Us Westbury Corporate Centre, 2275 Upper Middle Road, Suite 101 Oakville, Ontario, L6H 0C3, Canada Tel. (Toll Free): Tel. (Office): Fax.: Objectives Realize the potential of SAP software Develop a robust response to cyber risks Automatically detect potential cyber attacks Maximize the benefits of standard SAP licensing agreements Benefits Leverage professional services delivered at fixed cost, scope and timeline Align security checks with your specific policies and risk profile Benefit from SAP support Maximize return on investment To schedule a live demonstration of SAP Configuration Validation, contact or info@layersevensecurity.com