Detecting the Hand Still in the Cookie Jar

Please use your KuppingerCole account to log in or create one, if you don't have it yet.


SAP systems contain the most precious assets of an enterprise. They can however get lost, manipulated or destroyed in less than a minute. Examples are a) theft of sensitive customer data on a large scale by simple download, b) illegitimately elevated access rights: A user creates fictive other users, carries out illegal activities and deletes these users afterwards again, c) system take over by manipulating files on the level of the operating system which gives full access to all data on the SAP system.

Language: English • Duration: 54:05 • Resolution: 1280x720

Learn more about this webinar