log(2) : SAP Cyber Security

Enormous amounts of data will be the most important raw material of any company in  future. Protecting this new asset is the goal of cybersecurity of a new generation.

As international security researchers and SAP specialists who have been consulting  large companies and manufacturers on cyber security for many years, we are leading specialists, trailblazer and innovators

logo_splunk

splunk & SAP - Security Monitoring in no time

Large amounts of data result in more and more opportunities to gain new insights. This is especially true for all security issues in corporate IT.

Your internal audit requires active management of the SAP Security Audit Log? This is realized in a short time.

Depositphotos_10538963_l-2015

Breaking Bad: Penetration Test, Red Team Hack and Blue Team Response

Whether a controlled local attack on your own SAP system or a complete scan and audit of the system – this is one of our core competences.

We are one of the world’s leading specialists for pen testing and security analysis of SAP systems, be it on-premise or in the cloud.

auge2

Darknet Intelligence & Cyber Threat Analysis for SAP-Enterprise Systems

International threats to SAP systems, cybercrime and darknet attacks are leaving their mark, even in the dark parts of the global network. Together with partners, we check daily actual, specific SAP system threats through targeted. We look for passwords that are sold in the Darknet or the use of ransomware spreading. And we are the Blue Team for defensive measures as a service.
Lighted refinery  in the evening after sunset

Industrial IoT

We are one of the few worldwide specialists in IoT security in the industrial environment. We know the hardware architectures, the security requirements and we are recognized specialists in hardware-based cryptography.

From the development department to the implementation to edges and clouds, we are partner for  IoT security projects.

log(2) : Who we are

Security is also changing with new technologies such as Big Data, Artificial Intelligence and new SAP technologies in the cloud.

At the same time, the threats of organized crime and geopolitical turmoil are also changing the economy for large and medium-sized enterprises. SAP cyber security must always be at eyesight with these threats.

With more than 25 years of international experience in the US, Asia and Australia for renowned major clients and partners, we are an ideal partner for new SAP security technologies, analyzing and countering global and complex threats and the resulting, necessary security measures and strategies.

0
System hacked
0
+
System secured
0
+
User secured
0
+
International projects in EU & USA

Productivity packs for SAP security projects

SAP

splunk Monitoring Productivity Pack

Our Power Pack for SAP Security Audit Log Monitoring. Introduced at a fixed price in a week. From zero to SAP Security Operation Center in a short time, recommended by auditors and governance.
View Details

Code

Project pack for secure ABAP code

You want to secure your SAP ABAP code and your FIORI applications? Here you have everything for a quick and perfect start to your project. And in no time.
View Details

Hack!

Pen Test and SAP: The Hack-Pack

Penetration testing, the coordinated and staged attacks on a company’s SAP systems, is a first step towards deeper SAP risk analysis, on-premises and in the cloud. We attack your  SAP systems and discuss the results and consequences with you.
View Details

SecOps

Darknet Intelligence & Operations

Together with partners, we are constantly analyzing sources from the darknet and the hacker world for current threats to the SAP world. This is tailored to each customer and is permanently incorporated into the daily work with SAP Security as an „actionable item“. Learn more about this permanent service.
View Details

Order your productivity pack

Are you interested in one of the Productivity Packs? We are also happy to be directly available as a contact and answer you open question. You can also request further information.

Mit der Nutzung dieses Formulars erklären Sie Sich mit der Speicherung und Verarbeitung Ihrer Daten durch diese Website einverstanden.

Our Company

25 years of international experience in the USA, Asia and Australia with renowned international partners makes us an ideal partner for all security issues in large companies. From strategies for the entire company to hacks, penetration tests and incident response, our portfolio ranges.

In recent years, the SAP world has changed drastically. The old and overcome silo knowledge about modules, static servers, monolithic ABAP applications and the classical view on SAP ERP systems comes to an end. The old IT style is literally retiring.

A new era of cloud, mobile devices, micro-applications, modern UI and the industrial Internet of Things is a major challenge for IT security in particular. And of course especially in the SAP ecosystem.

Address

log(2) oHG
Memelstrasse 5
64846 Gross Zimmern

Legal

Sitz der Gesellschaft: Gross Zimmern
Registergericht Amtsgericht:Darmstadt
HRB Nr: 7136
Ust.-IdentNr.: DE814091120

VISDP: Holger Stumm

Phone

Tel: +49 6071 / 496 47 – 22

Email

E-mail: info@log2.de