Search
Close this search box.

SAP Hacking: Let Google hack your SAP System 2.0​

Learn how to effectively protect your SAP system from vulnerabilities that are publicly known. Gather tips on what to consider when building SAP roles and authorizations. Hear and see how easy it is to hack your system – with only Google and a bit of spare time.

[gravityform id=44 title=false description=false ajax=true]
Contact

Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]
Contact
Webinars

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now