SAP Security Express Analysis

Offline Security provides both software and professional services for rapid SAP security assessment - offering an innovative method of evaluation that significantly reduces execution time and cost.

Software for rapid security analysis Professional services for express analysis

Software

Offline Security Client

A key element of our architecture. It processes input data, sends it to the server, and downloads the finished report. Installation on ABAP not required.

Offline Security Connector

Able to extract all required data from SAP via RFC protocol. You no longer need to collect data manually. Based on PyRFC library.

Offline Security Alerting

Provides capabilities for integration with SIEM, execution planning and notification sending.

Use cases:

1
Unpatched security vulnerabilities
Helps identify missed SAP security notes.
2
Compliance and Baseline validation
Checks for complince with standards, baselines, vendor recommendations and best-practices.
3
Roles&users with critical authorizations
Finds unrestricted and critical privileges in roles.
4
Insecure RFC connections and ICF services
Highlight insecure connections with other systems and insecure active services.
Offline Security report example
Learn more about Offline Security Toolset

Professional Services

24h Express Analysis

Rapid analysis of the entire SAP landscape within 24 hours. The minimal price and fully independent view

Offline SAP log analysis

Search for security incidents in your SAP landscape in past. Check maturity of your SOC Team and SIEM content for SAP. Have you missed SAP security incidents in past?

Advantages:

1
Quick start
Don't need to create role and resolve SOD conflicts. Access to SAP systems not required. Installation on ABAP not required
2
24h per SAP landscape
For you it means the minimal price. you can run assessment after any significant change in system at any project phase
3
Own software
Automation. We won't miss anything. You can check your constant software and processes. No need to pay for external software licences
4
Sensitive data anonymisation if required
You don't need to share system names, IP addresses, role names and usernames
5
Skilled expert included
Skilled person will help you with justification and prioritisation
Learn more about Professional Services