M2M communication risk
M2M communication riskSpecific on-premise and cloud solutions from third-party providers today extend the scope of ERP systems in an uncomplicated way. The SAP ecosystem, for example, has numerous data transfer mechanisms for connecting any application.
Gateway for cyber attacks
The cross-application integrated IT architecture creates new challenges for IT security and documentation: The data streams that are exchanged between SAP and non-SAP applications in the background, and thus without the user's intervention, are an underestimated gateway for cyber attacks.
In addition, the new EU General Data Protection Regulation (GDPR) requires accurate knowledge of the current location, use and processing of personal data across all applications.
Data Protection Regulation
In order to protect business-critical data and meet the requirements of the EU GDPR, continuous monitoring and control of machine-to-machine (M2M) communication will become the central task of the IT department in the future.
To do this, companies need intelligent solutions, such as Halocore from Secude, which are integrated directly into SAP and support common protocols such as RFC or web service.
They should document exactly which data volumes are transferred how frequently via which system accesses or batch processes and automatically alert those responsible in the event of unusual data outflows.
Combined with common security information and event management (SIEM) solutions, this creates an effective approach to gaining important insights into otherwise opaque "shadow IT."