April 10, 2018 By Britta Simms 2 min read


Do you know that 87 percent of Forbes 2000 companies use SAP, and 76 percent of the world’s transaction revenue is processed by SAP systems? With such large sums of money and critical business, personal and financial data at stake, it’s no wonder that cybercriminals are increasingly targeting SAP systems. But what if the largest security risk to these organizations is right within their own walls due to insider mishandling of data, fraud or even an honest mistake?

According to the numbers, it is. IBM Security’s 2016 Cyber Security Intelligence Index found that 60 percent of all cybersecurity attacks were carried out by insiders. Of these attacks, three-quarters involved malicious intent, and one-quarter involved inadvertent actors.

Cooperating to Eliminate SAP Challenges

For this reason, we at IBM have chosen to collaborate with ERP Maestro, a company that focuses on internal cybersecurity via SAP risk reporting and access controls automation. ERP Maestro’s cloud-based tool provides advanced segregation of duties and sensitive access risk reporting that helps our consulting teams quickly diagnose what is wrong and prioritize problem areas that need attention, accelerating resolution of even the most complex SAP access issues. Its capabilities are also utilized for security design and redesign efforts to enable quicker design of roles and authorizations that are industry-focused, compliant and secure.

I sat down with Jody Paterson, CEO and Founder of ERP Maestro, to discuss in detail how we are more efficiently solving some of the challenges our clients are facing with the assistance of ERP Maestro’s technology. Recent trends like SAP HANA migration are bringing security back up to the top of IT priority lists, along with ongoing challenges related to legacy systems like R3 that have developed serious security and audit issues over time. Watch the video below to see the full discussion:

Stay Ahead of SAP Risks

In teaming up with ERP Maestro, IBM Security can offer a best-in-class combination of technology and expert services in the SAP application security space. This powerful combination ensures our customers are well-armed to combat internal cybersecurity threats and fraud risks related to excessive access and ineffective controls. I’m excited at the opportunities ahead to make our SAP clients’ environments more secure with this collaboration.

To learn more about our work with ERP Maestro contact your IBM Security representative or visit the IBM Enterprise Security page.

More from

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Stealthy WailingCrab Malware misuses MQTT Messaging Protocol

14 min read - This article was made possible thanks to the hard work of writer Charlotte Hammond and contributions from Ole Villadsen and Kat Metrick. IBM X-Force researchers have been tracking developments to the WailingCrab malware family, in particular, those relating to its C2 communication mechanisms, which include misusing the Internet-of-Things (IoT) messaging protocol MQTT. WailingCrab, also known as WikiLoader, is a sophisticated, multi-component malware delivered almost exclusively by an initial access broker that X-Force tracks as Hive0133, which overlaps with TA544. WailingCrab…

Operationalize cyber risk quantification for smart security

4 min read - Organizations constantly face new tactics from cyber criminals who aim to compromise their most valuable assets. Yet despite evolving techniques, many security leaders still rely on subjective terms, such as low, medium and high, to communicate and manage cyber risk. These vague terms do not convey the necessary detail or insight to produce actionable outcomes that accurately identify, measure, manage and communicate cyber risks. As a result, executives and board members remain uninformed and ill-prepared to manage organizational risk effectively.…

Pentesting vs. Pentesting as a Service: Which is better?

5 min read - In today's quickly evolving cybersecurity landscape, organizations constantly seek the most effective ways to secure their digital assets. Penetration testing (pentesting) has emerged as a leading solution for identifying potential system vulnerabilities while closing security gaps that can lead to an attack. At the same time, a newer entrant into the security arena is Pentesting as a Service (PTaaS). Although PTaaS shares some similarities with pentesting, distinct differences make them two separate solutions. This article will discuss how these methodologies…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today