{"id":60396,"date":"2019-09-30T08:00:09","date_gmt":"2019-09-30T06:00:09","guid":{"rendered":"http:\/\/e3mag.com\/?p=60396"},"modified":"2024-01-19T14:50:03","modified_gmt":"2024-01-19T13:50:03","slug":"holistic-security-and-compliance-solutions","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/ganzheitliche-security-und-compliance-loesungen\/","title":{"rendered":"Holistic security and compliance solutions"},"content":{"rendered":"<p>Monitoring of the current risk and compliance status and rapid analyses as well as conclusions based on them increase the security of sensitive data.<\/p>\n<p>Many companies often use SIEM solutions to monitor systems and evaluate information. However, SAP systems are in the \"blind spot\" for SIEM tools because they do not have any special SAP audit rules.<\/p><div id=\"great-3228650070\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>This is where Sast Suite's Security Radar comes into play. It is not limited to a key date-related analysis, but permanently monitors whether unusual activities are taking place in the SAP system.<\/p>\n<p>But it's not that simple: On the one hand, companies are required to do more for the security and compliance of their SAP systems; on the other hand, there is a growing shortage of IT specialists.<\/p>\n<p>A fast and efficient way to improve competence in IT security, even in times of a shortage of specialists, is the Managed Security Services solution. Akquinet takes over the security expertise for classification and evaluation as well as the recommendation for options for action for the customer.<\/p>","protected":false},"excerpt":{"rendered":"<p>SAP systems are often the heart of IT. Permanent and, above all, real-time monitoring of transactions and applications as protection is therefore essential.<\/p>","protected":false},"author":38,"featured_media":60397,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,31140],"tags":[174,1790,6174],"coauthors":[19920],"class_list":["post-60396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1907","tag-compliance","tag-it-security","tag-it-sicherheit","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/SAST-SAP-Sicherheit_cmyk-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die SAP-Systeme sind oft das Herzst\u00fcck der IT. Eine permanente und vor allem Echtzeit\u00fcberwachung von Transaktionen und Anwendungen als Schutz ist daher unerl\u00e4sslich.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/szene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-1907\/\" rel=\"category tag\">MAG 19-07<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=60396"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60396\/revisions"}],"predecessor-version":[{"id":137972,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60396\/revisions\/137972"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/60397"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=60396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=60396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=60396"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=60396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}