Wall Street & Technology is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security

11:55 AM
Mariano Nunez
Mariano Nunez
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Why Secure the ERP Jewels in Paper Vaults?

Enterprise resource planning systems are among the most critical for any organization. That makes them very attractive and rewarding targets for attack. Are generic security measures appropriate?

Today’s extended enterprise businesses invest vast chunks of their overall IT spend in upgrading and extending their enterprise resource planning (ERP) systems. Business leaders and IT heads place enormous value in ERP, and rightly so. Large organizations rely heavily on ERP applications to automate and improve efficiencies in finance, human resources, procurement, sales, logistics, and many, many other vital business-critical functions.

Because ERP systems are among the most critical for any organization, that makes them a very attractive and rewarding target for attack. So why do so many organizations assume that generic IT security measures are sufficient for the protection of their most valued processes and sensitive information? As the leading provider of ERP cyber-security solutions, part of the job is alerting business owners to the imminent dangers of leaving ERP systems vulnerable, while recommending the implementation of a comprehensive solution specifically designed to automate the security of valuable ERP systems.

These dangers are certainly very real, and the volume of security vulnerabilities and associated risks affecting ERP systems is increasing rapidly. A number of common misconfigurations are also exposing business-critical information to high-level risks, such as the possibility of malicious parties performing espionage, sabotage, and fraud attacks against vulnerable organizations.

Hackers shutting down ERP systems will quickly paralyze any business’s operations, disrupting integration with any number of business operations and even deleting sensitive information. Fraudsters may choose to modify financial information, tamper with sales and purchase orders, create new accounts, modify merchant data, and more. In highly competitive markets, it’s even possible that ERP systems may be unlocked in order to extract customer, vendor, or HR data -- maybe even planning information, balances, sales data, or unique designs and schemas.

Fortunately, considering the scale and critical nature of the threat, protecting business ERP systems is quick and painless.

A certified ERP security suite is installed in minutes. It will automatically discover and map ERP applications on any network, and is then ready to implement custom scan schedules and security policies to suit the needs and perceived threats of any organization. Insecure configurations and security risks detected are presented through a variety of different reports across any channel, detailing all threats and prioritizing mitigation activities. Without a specialist ERP security suite, business owners and CTOs must invest far greater resources to discover all of the security parameters that must be checked before manually connecting to each component, and then laboriously attemp to understand the involved risks before creating a string of reports.

It’s hard to imagine a business that wouldn’t regard specialized ERP protection as a no-brainer once the facts are presented. Who wouldn’t want to decrease financial fraud risks, enforce compliance requirements, protect against external hackers and insider threats, and drastically reduce audit costs, quickly and cost-effectively? Only purpose-built protection ensures ERP peace of mind.

Mariano Nunez is the CEO and co-founder of Onapsis, managing the strategic direction of the Company. A respected authority on SAP Security, Mariano is credited for being the first security researcher to present on real-world threats to SAP systems. He is also the developer of ... View Full Bio
More Commentary
A Wild Ride Comes to an End
Covering the financial services technology space for the past 15 years has been a thrilling ride with many ups as downs.
The End of an Era: Farewell to an Icon
After more than two decades of writing for Wall Street & Technology, I am leaving the media brand. It's time to reflect on our mutual history and the road ahead.
Beyond Bitcoin: Why Counterparty Has Won Support From Overstock's Chairman
The combined excitement over the currency and the Blockchain has kept the market capitalization above $4 billion for more than a year. This has attracted both imitators and innovators.
Asset Managers Set Sights on Defragmenting Back-Office Data
Defragmenting back-office data and technology will be a top focus for asset managers in 2015.
4 Mobile Security Predictions for 2015
As we look ahead, mobility is the perfect breeding ground for attacks in 2015.
Register for Wall Street & Technology Newsletters
Video