SlideShare une entreprise Scribd logo
1  sur  29
Presented by Anand Tanksali.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Errr What about Security I don’t care SAP should be up and running by Tuesday we have to take care of user passwords Umm What Security we have enough guards no more excuses SAP should be up on Tuesday
[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
 
 
 
Vulnerabilities published by SAP
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You! Anand Tanksali.

Contenu connexe

Tendances

Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
Automate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebAutomate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebHelpSystems
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexera
 
ROBOT and Banking on IBM i with Kevin Aker
ROBOT and Banking on IBM i with Kevin AkerROBOT and Banking on IBM i with Kevin Aker
ROBOT and Banking on IBM i with Kevin AkerHelpSystems
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsRohan Andrews
 
eScan version 11 for Corporate & Enterprises
eScan version 11 for Corporate & Enterprises eScan version 11 for Corporate & Enterprises
eScan version 11 for Corporate & Enterprises eScan
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 
eScan version 11 for SMB
eScan version 11 for SMBeScan version 11 for SMB
eScan version 11 for SMBeScan
 
Virtualization Licensing Lottery
Virtualization Licensing LotteryVirtualization Licensing Lottery
Virtualization Licensing LotteryFreeform Dynamics
 
13 Tips to Write Secure Applications
13 Tips to Write Secure Applications13 Tips to Write Secure Applications
13 Tips to Write Secure ApplicationsHelpSystems
 
Haris Sheikh(system administrator)..
Haris Sheikh(system administrator)..Haris Sheikh(system administrator)..
Haris Sheikh(system administrator)..Muhammad Haris Sheikh
 
Asia,scrsots
Asia,scrsotsAsia,scrsots
Asia,scrsotsquadsols
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]akquinet enterprise solutions GmbH
 
FlexNet Manager Platform Implementation Service
FlexNet Manager Platform Implementation ServiceFlexNet Manager Platform Implementation Service
FlexNet Manager Platform Implementation ServiceFlexera
 
Flex net manager for sap applications v9 1 presentation
Flex net manager for sap applications v9 1 presentationFlex net manager for sap applications v9 1 presentation
Flex net manager for sap applications v9 1 presentationNuno Alves
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 

Tendances (20)

Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
 
Automate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebAutomate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for Web
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
 
ROBOT and Banking on IBM i with Kevin Aker
ROBOT and Banking on IBM i with Kevin AkerROBOT and Banking on IBM i with Kevin Aker
ROBOT and Banking on IBM i with Kevin Aker
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
SAP grc
SAP grc SAP grc
SAP grc
 
SAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM WorkflowsSAP GRC AC 10.1 - ARM Workflows
SAP GRC AC 10.1 - ARM Workflows
 
eScan version 11 for Corporate & Enterprises
eScan version 11 for Corporate & Enterprises eScan version 11 for Corporate & Enterprises
eScan version 11 for Corporate & Enterprises
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
eScan version 11 for SMB
eScan version 11 for SMBeScan version 11 for SMB
eScan version 11 for SMB
 
Virtualization Licensing Lottery
Virtualization Licensing LotteryVirtualization Licensing Lottery
Virtualization Licensing Lottery
 
13 Tips to Write Secure Applications
13 Tips to Write Secure Applications13 Tips to Write Secure Applications
13 Tips to Write Secure Applications
 
Haris Sheikh(system administrator)..
Haris Sheikh(system administrator)..Haris Sheikh(system administrator)..
Haris Sheikh(system administrator)..
 
Asia,scrsots
Asia,scrsotsAsia,scrsots
Asia,scrsots
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]
 
FlexNet Manager Platform Implementation Service
FlexNet Manager Platform Implementation ServiceFlexNet Manager Platform Implementation Service
FlexNet Manager Platform Implementation Service
 
Flex net manager for sap applications v9 1 presentation
Flex net manager for sap applications v9 1 presentationFlex net manager for sap applications v9 1 presentation
Flex net manager for sap applications v9 1 presentation
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 

Similaire à Null Meet Ppt

SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksVirtual Forge
 
SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01Argos
 
Managing IT as A Service with System Center
Managing IT as A Service with System CenterManaging IT as A Service with System Center
Managing IT as A Service with System CenterLai Yoong Seng
 
Enterprise Reporting for ERP Systems
Enterprise Reporting for ERP SystemsEnterprise Reporting for ERP Systems
Enterprise Reporting for ERP SystemsAmbareesh Kulkarni
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overviewabhi1112
 
ITIL Dolphin Sunum
ITIL Dolphin SunumITIL Dolphin Sunum
ITIL Dolphin Sunumalperdogu
 
ON-DEMAND WEBINAR Why Your CRM System Needs RPA
ON-DEMAND WEBINAR Why Your CRM System Needs RPAON-DEMAND WEBINAR Why Your CRM System Needs RPA
ON-DEMAND WEBINAR Why Your CRM System Needs RPAHelpSystems
 
SharePoint Administration: Tips from the Field
SharePoint Administration: Tips from the FieldSharePoint Administration: Tips from the Field
SharePoint Administration: Tips from the Fieldwahidsaleemi
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...akquinet enterprise solutions GmbH
 
SAP HANA SPS10- Security
SAP HANA SPS10- SecuritySAP HANA SPS10- Security
SAP HANA SPS10- SecuritySAP Technology
 
How Salesforce.com R&D Delivers the Cloud
How Salesforce.com R&D Delivers the CloudHow Salesforce.com R&D Delivers the Cloud
How Salesforce.com R&D Delivers the CloudSalesforce Developers
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 

Similaire à Null Meet Ppt (20)

SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New Risks
 
SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01SAP performance testing & engineering courseware v01
SAP performance testing & engineering courseware v01
 
Sap basis online training
Sap basis online trainingSap basis online training
Sap basis online training
 
Managing IT as A Service with System Center
Managing IT as A Service with System CenterManaging IT as A Service with System Center
Managing IT as A Service with System Center
 
Enterprise Reporting for ERP Systems
Enterprise Reporting for ERP SystemsEnterprise Reporting for ERP Systems
Enterprise Reporting for ERP Systems
 
SAP ARCHITECTURE (I).pptx
SAP ARCHITECTURE (I).pptxSAP ARCHITECTURE (I).pptx
SAP ARCHITECTURE (I).pptx
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Sap basisoverviewv11
Sap basisoverviewv11Sap basisoverviewv11
Sap basisoverviewv11
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overview
 
Enterprise Deployments & SOA
Enterprise Deployments & SOAEnterprise Deployments & SOA
Enterprise Deployments & SOA
 
aplikom
aplikomaplikom
aplikom
 
ITIL Dolphin Sunum
ITIL Dolphin SunumITIL Dolphin Sunum
ITIL Dolphin Sunum
 
ON-DEMAND WEBINAR Why Your CRM System Needs RPA
ON-DEMAND WEBINAR Why Your CRM System Needs RPAON-DEMAND WEBINAR Why Your CRM System Needs RPA
ON-DEMAND WEBINAR Why Your CRM System Needs RPA
 
SharePoint Administration: Tips from the Field
SharePoint Administration: Tips from the FieldSharePoint Administration: Tips from the Field
SharePoint Administration: Tips from the Field
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...
 
Sap
SapSap
Sap
 
Resume
Resume Resume
Resume
 
SAP HANA SPS10- Security
SAP HANA SPS10- SecuritySAP HANA SPS10- Security
SAP HANA SPS10- Security
 
How Salesforce.com R&D Delivers the Cloud
How Salesforce.com R&D Delivers the CloudHow Salesforce.com R&D Delivers the Cloud
How Salesforce.com R&D Delivers the Cloud
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 

Null Meet Ppt