Security

11:55 AM
Mariano Nunez
Mariano Nunez
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Why Secure the ERP Jewels in Paper Vaults?

Enterprise resource planning systems are among the most critical for any organization. That makes them very attractive and rewarding targets for attack. Are generic security measures appropriate?

Today’s extended enterprise businesses invest vast chunks of their overall IT spend in upgrading and extending their enterprise resource planning (ERP) systems. Business leaders and IT heads place enormous value in ERP, and rightly so. Large organizations rely heavily on ERP applications to automate and improve efficiencies in finance, human resources, procurement, sales, logistics, and many, many other vital business-critical functions.

Because ERP systems are among the most critical for any organization, that makes them a very attractive and rewarding target for attack. So why do so many organizations assume that generic IT security measures are sufficient for the protection of their most valued processes and sensitive information? As the leading provider of ERP cyber-security solutions, part of the job is alerting business owners to the imminent dangers of leaving ERP systems vulnerable, while recommending the implementation of a comprehensive solution specifically designed to automate the security of valuable ERP systems.

These dangers are certainly very real, and the volume of security vulnerabilities and associated risks affecting ERP systems is increasing rapidly. A number of common misconfigurations are also exposing business-critical information to high-level risks, such as the possibility of malicious parties performing espionage, sabotage, and fraud attacks against vulnerable organizations.

Hackers shutting down ERP systems will quickly paralyze any business’s operations, disrupting integration with any number of business operations and even deleting sensitive information. Fraudsters may choose to modify financial information, tamper with sales and purchase orders, create new accounts, modify merchant data, and more. In highly competitive markets, it’s even possible that ERP systems may be unlocked in order to extract customer, vendor, or HR data -- maybe even planning information, balances, sales data, or unique designs and schemas.

Fortunately, considering the scale and critical nature of the threat, protecting business ERP systems is quick and painless.

A certified ERP security suite is installed in minutes. It will automatically discover and map ERP applications on any network, and is then ready to implement custom scan schedules and security policies to suit the needs and perceived threats of any organization. Insecure configurations and security risks detected are presented through a variety of different reports across any channel, detailing all threats and prioritizing mitigation activities. Without a specialist ERP security suite, business owners and CTOs must invest far greater resources to discover all of the security parameters that must be checked before manually connecting to each component, and then laboriously attemp to understand the involved risks before creating a string of reports.

It’s hard to imagine a business that wouldn’t regard specialized ERP protection as a no-brainer once the facts are presented. Who wouldn’t want to decrease financial fraud risks, enforce compliance requirements, protect against external hackers and insider threats, and drastically reduce audit costs, quickly and cost-effectively? Only purpose-built protection ensures ERP peace of mind.

Mariano Nunez is the CEO and co-founder of Onapsis, managing the strategic direction of the Company. A respected authority on SAP Security, Mariano is credited for being the first security researcher to present on real-world threats to SAP systems. He is also the developer of ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Becca L
50%
50%
Becca L,
User Rank: Author
6/30/2014 | 1:59:01 AM
Pulling out the stops for high-priority informaiton
Mariano, thanks for sharing! Firms often have to apply patchwork security solutions to their data to makes sure the highest-value elements are receiving the best defenses (which are often uneconomical to spread throughout the firm's system). These are usually documents critical to the business's continued operations and as you describe it, enterprise resource planning falls into this top tier. I'm curious how much extra protection you think ERP merits than other highly essential and sesitive business systems?
More Commentary
Driving Information Security, From Silicon Valley to Detroit
As software interacts with more and more of our daily lives, technology providers may be liable for more damages than they have in the recent past.
Big Data's Challenge: Matching Business Needs With Technology
All those bits and bytes only add up to something when they’re organized, arranged, and made coherent.
Single Source, Many Truths
If the data quality is not at fault, why then might departments reject the data? The answer is that there are two aspects to data quality: factual correctness and contextual correctness.
Predictions Come True as Regulators Swoop
While two out of the five capital markets predictions from July have already come true, let's hope that all five don't actually happen.
IBOR Before It Was "IBOR"
While its catchy new nomenclature and explosion in popularity has given the outside world an impression that it is novel, the same conversations about it were happening twenty years ago. So why then is IBOR the latest buzz word for firms today?
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - July 2014
In addition to regular audits, the SEC will start to scrutinize the cyber-security preparedness of market participants.
Video