Most transactions take place on business-critical applications and infrastructure, producing data and information with the highest possible value for attackers. Protecting these applications and infrastructure is a fundamental part of each corporate security strategy. In this session we will talk about the real security challenges facing your business critical infrastructure, i.e. your SAP or Oracle system, how mitigate the risks involved and prevent against threats.