Multi Factor Authentication - auth- · PDF fileSAP CONTAINS AN ORGANIZATION ... FI - Financial...
Transcript of Multi Factor Authentication - auth- · PDF fileSAP CONTAINS AN ORGANIZATION ... FI - Financial...
SAP CONTAINS AN ORGANIZATION’S MOST VALUABLE AND SENSITIVE INFORMATION - Imagine the damage that can take place if your SAP credentials are compromised
95% OF SAP DEPLOYMENTS
VULNERABLE TO CYBER
ATTACKS.
SOURCE: ONAPSIS RESEARCH
STUDY
WARNING BELL FOR
ENTERPRISES: NEARLY ALL SAP
SYSTEMS REMAIN VULNERABLE TO
ATTACKS.
SOURCE: BIZTECH NEWS
SAP SYSTEM
VULNERABILITIES COULD LEAVE OIL
AND GAS COMPANIES OPEN TO
CYBERATTACK.
SOURCE: INSIDE SAP/ ERP CAN
Why are Hackers targeting SAP?
Espionage
Stealing Financial Information
Stealing Corporate Secrets
Stealing Supplier and Customer lists
Stealing HR data
Sabotage
SAP Vulnerabilities
Directory Traversal
Information Disclosure
Denial of Service
Code Injection Vulnerability
Remote Code Execution
Unauthorized usage of Application
Phone: +91-1147065866/ 27356211-12 +91-9313050131, Email: [email protected], www.auth-shield.com
AuthShieldMulti Factor Authentication
ARCHITECTURE
SECURE ALL TECHNICAL AND FINANCIAL MODULES
SAP GUI
Netweaver 1
4
5
6 3
2
1
Active Directory
Authentication Server
Mobile & Desktop One Click Authentication
FI - Financial Accounting module
SD - Sales & Distribution module
SCM - Supply Chain Management
MM - Materials Management module
IM - Investment Management
CRM - Customer Relationship Management
SAP LOGIN
User Name
Password
SAP Login
Successful !!!+ =
AuthShield Two Factor Authentication is useful for controlling fraud and validating
end users easily and cost effectively.“
“
SAP server withAuthShield Protocol
Decoding engineModule
AUTHSHIELD OFFERS UNIQUE AND PATENTED SOLUTION FOR PROTECTING
SAP CREDENTIALS WITH MULTIFACTOR AUTHENTICATION
Dr. Gautam Mahatapra Scientist 'F', DRDO