The global and independent platform for the SAP community.

Security situation in cyberspace

DDoS attacks are among the most commonly reported types of attacks. They cannot always be prevented, but there are measures that can significantly mitigate them.
E-3 Magazine
11 May 2022
avatar
This text has been automatically translated from German to English.

These include special intrusion prevention signatures, operating system and gateway configuration settings, automatic management responses, and commands for dynamically blocking attack sources. If you want to defend against DDoS attacks in their entirety, a so-called perimeter attack mitigation device is recommended. This is capable of protecting companies against new network and application threats. In addition, a number of measures should always be on the checklist: protecting infrastructure from network and application outages, identifying and closing application vulnerabilities, preventing malware spread and network anomalies, and safeguarding against information theft.

Lothar Geuenich, Regional Director Central Europe at Check Point Software Technologies: "The geopolitical situation undoubtedly shows that wars are no longer fought only in the analog world, but increasingly in the digital world. In the process, even companies and organizations that at first glance appear to be neither geographically nor politically directly involved are being targeted by cyber attacks. Those responsible in IT security departments must be prepared for a range of attack types while, and this is essential, always remaining in close contact with law enforcement agencies, intelligence services and Computer Emergency Response Teams, also known as Incident Response Teams. The motto is always prevention, not reaction. Reacting means an attack has already succeeded and now damage control is being done."

Lothar Geuenich, checkpoint
Those responsible in IT security departments must be prepared for a range of attack types.Lothar Geuenich, Regional Director Central Europe, Check Point Software Technologies
avatar
E-3 Magazine

Information and educational outreach by and for the SAP community.


Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork.

Venue

More information will follow shortly.

Event date

Wednesday, May 21, and
Thursday, May 22, 2025

Early Bird Ticket

Available until Friday, January 24, 2025
EUR 390 excl. VAT

Regular ticket

EUR 590 excl. VAT

Venue

Hotel Hilton Heidelberg
Kurfürstenanlage 1
D-69115 Heidelberg

Event date

Wednesday, March 5, and
Thursday, March 6, 2025

Tickets

Regular ticket
EUR 590 excl. VAT
Early Bird Ticket

Available until December 24, 2024

EUR 390 excl. VAT
The event is organized by the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes attendance at all presentations of the Steampunk and BTP Summit 2025, a visit to the exhibition area, participation in the evening event and catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due course.