Infrastructure Security

SAP security is not only about Segregation of Duties (SoD) and user access rights, but also the layer below application security, being the infrastructure and kernel security.

Since systems are more and more interconnected, the security on communication layer as well as on kernel level, has become one of the top security priorities. It’s all about keeping the bad guy out to avoid risk of sabotage, fraud or other cyberattacks.

Infrastructure vulnerability analysis helps with identifying security weaknesses on the layer below application security. Generally speaking, infrastructure management and SAP system administration are two different worlds and there tends to be a gap of knowledge and ownership between the two.

The technical foundation of system reliability is assessed through the infrastructure vulnerability analysis. A SAP security specialist should inspect the vulnerability of the installed SAP components, kernel and services for any (known) weaknesses.

Development Security

Tailoring and tuning a SAP system implementation and the configured business processes to the specific needs of an enterprise is essential to guarantee effectiveness and efficiency.

axl & trax helps companies with identifiying such risks and proposing counter-measures or adjustment to minimize exposure.

Some of the services that can help with closing possible backdoors and keeping them closed are:

  • custom code analysis or code review;
  • development quality assurance;
  • advisory on good development practices.

Don't let custom development be the Achilles' heel of the protection of your company assets.

Data Security

Business data is one of the most important assets within an ERP system. Today, companies realize the importance of a consistent and reliable data management framework while complying with privacy policies and laws.

axl & trax helps with identifying exposure, control gaps and supports companies defining and implementing their SAP data management frameworks to ensure confidentiality, integrity and availability of the data through:

  • quality and process assessment;
  • procedure reviews;
  • implementation of best practices and control methods;
  • data masking, scrambling;
  • flexible, consistent and secure copying of data.

Access Security

Access governance has become an essential part of enterprise security with the growing awareness of sensitivity to insider threats and increasing requirements for regulatory compliance. Getting better insight into who has access to key data sources and how, has grown into a high priority for all types of organizations.

Since 1997, axl & trax has been helping organizations improve SAP user security and establish good practices in user role architectures and access risk management. Expert-knowledge, experience, a sound and pragmatic methodology as well as purpose-made tools form the success factor of this service.

AXT Process Flow 2014 EN v8

Security Operations Center for SAP environments

Having a specialized Security Operations Center (SOC) that takes care of securing your SAP systems, ensures that trained experts work constantly to keep your business data and processes safe. No matter what time it is or in which time zone attention is required: security incidents and requests are picked up and handled efficiently and effectively.

Don't hinder business with service unavailability and make sure your SAP security is under control and managed in time.

A SOC allows you to focus on core business, relying on dedicated professionals to manage your SAP security state-of-the-art and following your desired service level. Forget about small service windows and staff unavailability disrupting your business processes or hindering profitable deals.

Expert level services with a business-oriented approach

Advisory & Consultancy

axl & trax delivers advisory and consultancy services to help companies with facing various and complex security challenges related to their SAP environment. Our advisory & consultancy services cover:

  • development of corporate SAP security strategies;
  • long range planning in SAP security (e.g. program management, maturity management, defense-in-depth);
  • enterprise changing environment: extension, reorganization or rationalization of SAP security technical & management processes in accordance with the enterprise evolution, e.g. multiple stakeholders accessing the enterprise SAP systems, geographical extension, mergers & acquisitions, outsourcing, etc;
  • compliance - information & privacy regulation, SoX, JSoX, etc;
  • R&D, advice, design and integration of tailored and custom solutions;
  • quality assurance.

Audit

In order to understand the current security posture or risk exposure, axl & trax performs at-request reviews and audits. The services range from in-depth analysis on SAP security and controls, to high-level assessments - on tactical, conceptual and/or technical level.

We are specialized in SAP audits and have strong experience in auditing user access rights, security role concepts, segregation of duties, business process controls, GRC rule sets and any related SAP security area.

Support

Established security must be maintained to ensure a sustainable protection for valuable information assets. axl & trax helps companies with administering and maintaining their SAP security on a day-to-day basis or for a short period in time e.g. when in-house administrators are ill or on vacation.

Your security support can also be fully or partially outsourced through our Security Operations Center.

Training

axl & trax is a recognized training provider for security, audit, control and GRC within SAP applications and SAP security tools such as SAP GRC, CSI tools and more.

In addition to regularly held open-class and on-site/online training, "à la carte" trainings can be organized for specific topic requests. axl & trax also regularly schedules webinars on SAP security for you to attend from your own computer.

© 2022 axl & trax, all rights reserved - GTC Belgium - GTC The Netherlands - Cookies
Cookies help us with providing you our services. By using our services, you agree with our use of cookies.