Operations | Monitoring | ITSM | DevOps | Cloud

February 2022

SAP HotNews and CVE kernel patch: Securing your SAP systems

New ICMAD bugs require immediate attention and patching for SAP systems The dust has not yet settled on the CVSSv3 10.0 score Log4j security vulnerability that hit in December 2021. Last week, a new group of three security vulnerabilities were published by SAP, which all relate to SAP’s Internet Communication Manager (ICM or ICMAD). Once again, one of these vulnerabilities has a CVSS v3.0 base score of 10/10. In contrast to Log4j, the latest threats only impact SAP customers, but they need immediate attention.

SAP Cloud Security: A strong defense is the first step

Securing an SAP environment is critical to any organization and as the use of public clouds grows for these environments, so does the concern of SAP security. These hyperscalers all have teams of people working around the clock to ensure their solutions are impenetrable. Third party cybersecurity solutions are often used as well to make sure these environments are safe and secure.

Protecting your SAP systems from new vulnerabilities

New ICMAD bugs require immediate attention and patching for SAP systems. The dust has not yet settled on the CVSSv3 10.0 score Log4j security vulnerability, which has been keeping IT employees across all businesses very busy since December 2021. Read this article to learn more about the CVSSv3 10.0 score Log4j security vulnerability.

Is your SAP world ready for the cloud?

Running SAP systems in the cloud can provide a litany of benefits to users at every level of the organization. However, many hidden, unexpected and expensive challenges can quickly arise before, during and after migrating mission-critical SAP systems to the cloud. In this white paper you'll discover the three main challenges plaguing both Enterprise IT operations and Managed Service Providers (MSPs) today, and learn how to overcome them.

How to prevent SAP security vulnerabilities:

SAP creates some of the world's most popular products for managing information, with more than 400 million users worldwide. But SAP connectivity presents one of the biggest security risks for your company. In this ebook, we will consider some of the steps you can take to secure your SAP systems: we'll explore how SAP systems can be compromised, plus we will investigate some of the ways to prevent this from happening.

Six reasons why SAP monitoring is important for CIOs

Gartner reported that unplanned IT system downtime cost: $5,600 per minute. $300,000 per hour. IDC, on the other hand, estimates that system outages can cost a company between $500,000 to $1 million or more per hour. (“DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified”) With more than 345,000 customers in more than 180 countries and 15,000 partnering companies globally, SAP is the world’s third largest independent software manufacturer.