{"id":13186,"date":"2025-06-30T09:45:13","date_gmt":"2025-06-30T07:45:13","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=13186"},"modified":"2025-06-30T09:48:14","modified_gmt":"2025-06-30T07:48:14","slug":"webinar-design-and-monitoring-of-sap-security-status","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/","title":{"rendered":"Webinar: Design and Monitoring of SAP Security Status"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">On Wednesday, June 25th, Inprosec delivered an exclusive webinar through our partner platform <\/span><a href=\"https:\/\/www.cuviv.com\/en\/\"><b>CUVIV<\/b><\/a><span style=\"font-weight: 400;\">, focusing on the <\/span><i><span style=\"font-weight: 400;\">\u201cDesign and Monitoring of SAP Security Status\u201d<\/span><\/i><span style=\"font-weight: 400;\">. The session was presented by our SAP security consultant, <\/span><a href=\"https:\/\/www.linkedin.com\/in\/pedrocostasmora\/\"><b>Pedro Costas<\/b><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">SAP Security Baseline: Standards to Protect Your Systems<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">During the webinar, we explored the <\/span><b>SAP Security Baseline<\/b><span style=\"font-weight: 400;\">, SAP\u2019s official guide that outlines the minimum recommended practices and configurations to protect systems against common threats. The six key pillars were detailed, covering everything from infrastructure and networks to logging and auditing of critical events.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Key Tools: Configuration Validation and System Recommendations<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">As the session continued, two essential tools for evaluating and monitoring SAP security were introduced:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Configuration Validation<\/b><span style=\"font-weight: 400;\">: Allows you to compare the current system configuration against a defined target (Target System), identifying deviations and potential risks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>System Recommendations<\/b><span style=\"font-weight: 400;\">: Provides a detailed analysis of the implementation status of SAP security notes, helping to keep systems up to date and protected.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The importance of integrating these tools with processes such as <\/span><b>ChaRM<\/b><span style=\"font-weight: 400;\"> (Change Request Management) was also emphasized, to ensure traceability and regulatory compliance.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Preparing for the Future: The End of SAP Solution Manager<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The webinar also addressed the <\/span><b>end of support for SAP Solution Manager by 2027<\/b><span style=\"font-weight: 400;\">, and the alternative solutions offered by SAP, such as <\/span><b>SAP Cloud ALM<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Focused Run<\/b><span style=\"font-weight: 400;\">. Their features, integrations, and limitations were analyzed in comparison with traditional tools.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">This webinar reinforced the importance of having a proactive strategy for SAP system security. At Inprosec, <\/span><b>we remain committed to raising awareness<\/b><span style=\"font-weight: 400;\">, providing <\/span><b>training<\/b><span style=\"font-weight: 400;\">, and <\/span><b>supporting<\/b><span style=\"font-weight: 400;\"> our clients <\/span><b>in strengthening their SAP environments<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you&#8217;re interested in watching the recording (in Spanish), exploring this topic further, or learning how we can help you improve the security of your SAP systems, feel free to contact us<\/span> <a href=\"https:\/\/www.inprosec.com\/en\/contact\/\"><b>here<\/b><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, you can explore our <\/span><a href=\"https:\/\/www.inprosec.com\/en\/sap-security\/sap-security-assesment\/\"><b>SAP\u00ae Security Assessment<\/b><\/a><span style=\"font-weight: 400;\"> service, where we offer a <\/span><b>comprehensive review to assess the actual security status of your SAP systems<\/b><span style=\"font-weight: 400;\">, <\/span><b>identify risks<\/b><span style=\"font-weight: 400;\">, and <\/span><b>define an improvement plan <\/b><span style=\"font-weight: 400;\">aligned with industry best practices.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Wednesday, June 25th, Inprosec delivered an exclusive webinar through our partner platform CUVIV, focusing on the \u201cDesign and Monitoring of SAP Security Status\u201d. The session was presented by our SAP security consultant, Pedro Costas. SAP Security Baseline: Standards to Protect Your Systems During the webinar, we explored the SAP Security Baseline, SAP\u2019s official guide&#8230;<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[61,62],"tags":[],"class_list":["post-13186","post","type-post","status-publish","format-standard","hentry","category-sap-security-en-2","category-webinar-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Webinar: Design and Monitoring of SAP Security Status - Inprosec<\/title>\n<meta name=\"description\" content=\"Webinar on designing and monitoring SAP security: learn about the SAP Security Baseline, key tools like Configuration Validation and System Recommendations, and alternatives after the end of SAP Solution Manager.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar: Design and Monitoring of SAP Security Status\" \/>\n<meta property=\"og:description\" content=\"Webinar on designing and monitoring SAP security: learn about the SAP Security Baseline, key tools like Configuration Validation and System Recommendations, and alternatives after the end of SAP Solution Manager.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-30T07:45:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T07:48:14+00:00\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-design-and-monitoring-of-sap-security-status\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-design-and-monitoring-of-sap-security-status\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"Webinar: Design and Monitoring of SAP Security Status\",\"datePublished\":\"2025-06-30T07:45:13+00:00\",\"dateModified\":\"2025-06-30T07:48:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-design-and-monitoring-of-sap-security-status\\\/\"},\"wordCount\":340,\"commentCount\":0,\"articleSection\":[\"SAP Security\",\"Webinar\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-design-and-monitoring-of-sap-security-status\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-design-and-monitoring-of-sap-security-status\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-design-and-monitoring-of-sap-security-status\\\/\",\"name\":\"Webinar: Design and Monitoring of SAP Security Status - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"datePublished\":\"2025-06-30T07:45:13+00:00\",\"dateModified\":\"2025-06-30T07:48:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"Webinar on designing and monitoring SAP security: learn about the SAP Security Baseline, key tools like Configuration Validation and System Recommendations, and alternatives after the end of SAP Solution Manager.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-design-and-monitoring-of-sap-security-status\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-design-and-monitoring-of-sap-security-status\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-design-and-monitoring-of-sap-security-status\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar: Design and Monitoring of SAP Security Status\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Webinar: Design and Monitoring of SAP Security Status - Inprosec","description":"Webinar on designing and monitoring SAP security: learn about the SAP Security Baseline, key tools like Configuration Validation and System Recommendations, and alternatives after the end of SAP Solution Manager.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/","og_locale":"en_US","og_type":"article","og_title":"Webinar: Design and Monitoring of SAP Security Status","og_description":"Webinar on designing and monitoring SAP security: learn about the SAP Security Baseline, key tools like Configuration Validation and System Recommendations, and alternatives after the end of SAP Solution Manager.","og_url":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/","og_site_name":"Inprosec","article_published_time":"2025-06-30T07:45:13+00:00","article_modified_time":"2025-06-30T07:48:14+00:00","author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"Webinar: Design and Monitoring of SAP Security Status","datePublished":"2025-06-30T07:45:13+00:00","dateModified":"2025-06-30T07:48:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/"},"wordCount":340,"commentCount":0,"articleSection":["SAP Security","Webinar"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/","url":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/","name":"Webinar: Design and Monitoring of SAP Security Status - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"datePublished":"2025-06-30T07:45:13+00:00","dateModified":"2025-06-30T07:48:14+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"Webinar on designing and monitoring SAP security: learn about the SAP Security Baseline, key tools like Configuration Validation and System Recommendations, and alternatives after the end of SAP Solution Manager.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/webinar-design-and-monitoring-of-sap-security-status\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Webinar: Design and Monitoring of SAP Security Status"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=13186"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13186\/revisions"}],"predecessor-version":[{"id":13190,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13186\/revisions\/13190"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=13186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=13186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=13186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}