Multi Factor Authentication - auth- · PDF fileSAP CONTAINS AN ORGANIZATION ... FI - Financial...

2
SAP CONTAINS AN ORGANIZATIONS MOST VALUABLE AND SENSITIVE INFORMATION - Imagine the damage that can take place if your SAP credentials are compromised 95% OF SAP DEPLOYMENTS VULNERABLE TO CYBER ATTACKS. SOURCE: ONAPSIS RESEARCH STUDY WARNING BELL FOR ENTERPRISES: NEARLY ALL SAP SYSTEMS REMAIN VULNERABLE TO ATTACKS. SOURCE: BIZTECH NEWS SAP SYSTEM VULNERABILITIES COULD LEAVE OIL AND GAS COMPANIES OPEN TO CYBERATTACK. SOURCE: INSIDE SAP/ ERP CAN Why are Hackers targeting SAP? Espionage Stealing Financial Information Stealing Corporate Secrets Stealing Supplier and Customer lists Stealing HR data Sabotage SAP Vulnerabilities Directory Traversal Information Disclosure Denial of Service Code Injection Vulnerability Remote Code Execution Unauthorized usage of Application Phone: +91-1147065866/ 27356211-12 +91-9313050131, Email: [email protected], www.auth-shield.com Auth Shield Multi Factor Authentication

Transcript of Multi Factor Authentication - auth- · PDF fileSAP CONTAINS AN ORGANIZATION ... FI - Financial...

Page 1: Multi Factor Authentication - auth- · PDF fileSAP CONTAINS AN ORGANIZATION ... FI - Financial Accounting module SD - Sales & Distribution module SCM - Supply Chain Management MM -

SAP CONTAINS AN ORGANIZATION’S MOST VALUABLE AND SENSITIVE INFORMATION - Imagine the damage that can take place if your SAP credentials are compromised

95% OF SAP DEPLOYMENTS

VULNERABLE TO CYBER

ATTACKS.

SOURCE: ONAPSIS RESEARCH

STUDY

WARNING BELL FOR

ENTERPRISES: NEARLY ALL SAP

SYSTEMS REMAIN VULNERABLE TO

ATTACKS.

SOURCE: BIZTECH NEWS

SAP SYSTEM

VULNERABILITIES COULD LEAVE OIL

AND GAS COMPANIES OPEN TO

CYBERATTACK.

SOURCE: INSIDE SAP/ ERP CAN

Why are Hackers targeting SAP?

Espionage

Stealing Financial Information

Stealing Corporate Secrets

Stealing Supplier and Customer lists

Stealing HR data

Sabotage

SAP Vulnerabilities

Directory Traversal

Information Disclosure

Denial of Service

Code Injection Vulnerability

Remote Code Execution

Unauthorized usage of Application

Phone: +91-1147065866/ 27356211-12 +91-9313050131, Email: [email protected], www.auth-shield.com

AuthShieldMulti Factor Authentication

Page 2: Multi Factor Authentication - auth- · PDF fileSAP CONTAINS AN ORGANIZATION ... FI - Financial Accounting module SD - Sales & Distribution module SCM - Supply Chain Management MM -

ARCHITECTURE

SECURE ALL TECHNICAL AND FINANCIAL MODULES

SAP GUI

Netweaver 1

4

5

6 3

2

1

Active Directory

Authentication Server

Mobile & Desktop One Click Authentication

FI - Financial Accounting module

SD - Sales & Distribution module

SCM - Supply Chain Management

MM - Materials Management module

IM - Investment Management

CRM - Customer Relationship Management

SAP LOGIN

User Name

Password

SAP Login

Successful !!!+ =

AuthShield Two Factor Authentication is useful for controlling fraud and validating

end users easily and cost effectively.“

SAP server withAuthShield Protocol

Decoding engineModule

AUTHSHIELD OFFERS UNIQUE AND PATENTED SOLUTION FOR PROTECTING

SAP CREDENTIALS WITH MULTIFACTOR AUTHENTICATION

Dr. Gautam Mahatapra Scientist 'F', DRDO