log(2) : SAP Cyber Security

[BREAKING NEWS] HACKINAR SAP Attack – Live Workshop , Pen Test and Red Team Attack

Leading in SAP Security technologies and pen testing

Pen Testing, Code Security, Cyber Threat Hunting and industrial IIOT Security – we deliver leading edge security technologies for large SAP landscapes.

Businesswoman with financial symbols coming from her hand

SAP Pen Test cloud and critical infrastructure

With more than 20 years of SAP experience and more than 10 years of experience in international SAP security projects, we offer pen tests for SAP systems, but also for classic IT landscapes.

Cloud, SAP BTP, internal networks and SAP landscapes or SAP systems exposed to the Internet with FIORI – we are the leading contact in the SAP security world.


Breaking Bad: Penetration Test, Red Team Hack and Blue Team Response

Whether a controlled local attack on your own SAP system or a complete scan and audit of the system – this is one of our core competences.

We are one of the world’s leading specialists for pen testing and security analysis of SAP systems, be it on-premise or in the cloud.


Hacking & checking SAP ABAP custom code

Breaching SAP ABAP Code Security at the customer’s site has far-reaching consequences.

An important area of SAP security to prevent these incidents is the analysis of the custom code SAP programs, which are classically written in the proprietary language ABAP.

Check your ABAP source code for trojans, criminal attempts and fraud.

Lighted refinery  in the evening after sunset

Microsoft Sphere: Industrial IoT - Attack on critical infrastructure

We are one of the few worldwide specialists in IoT security in the industrial environment. We know the hardware architectures, the security requirements and we are recognized specialists in hardware-based cryptography.

From the development department to the implementation to edges and clouds, we are partner for  IoT security projects.

log(2) : Who we are

Security is also changing with new technologies such as Big Data, Artificial Intelligence and new SAP technologies in the cloud.

At the same time, the threats of organized crime and geopolitical turmoil are also changing the economy for large and medium-sized enterprises. SAP cyber security must always be at eyesight with these threats.

With more than 25 years of international experience in Europe, the US, Asia and Australia for renowned major clients and partners, we are an ideal partner for new SAP security technologies, analyzing and countering global and complex threats and the resulting, necessary security measures and strategies.

System hacked
System secured
User secured
International projects in EU & USA

Productivity packs for SAP security projects


splunk Monitoring Productivity Pack

Our Power Pack for SAP Security Audit Log Monitoring. Introduced at a fixed price in a week. From zero to SAP Security Operation Center in a short time, recommended by auditors and governance.
View Details


Project pack for secure ABAP code

You want to secure your SAP ABAP code and your FIORI applications? Here you have everything for a quick and perfect start to your project. And in no time.
View Details


Pen Test and SAP: The Hack-Pack

Penetration testing, the coordinated and staged attacks on a company’s SAP systems, is a first step towards deeper SAP risk analysis, on-premises and in the cloud. We attack your  SAP systems and discuss the results and consequences with you.
View Details


Darknet Intelligence & Operations

Together with partners, we are constantly analyzing sources from the darknet and the hacker world for current threats to the SAP world. This is tailored to each customer and is permanently incorporated into the daily work with SAP Security as an “actionable item”. Learn more about this permanent service.
View Details

Order your productivity pack

Are you interested in one of the Productivity Packs? We are also happy to be directly available as a contact and answer you open question. You can also request further information.

    Mit der Nutzung dieses Formulars erklären Sie Sich mit der Speicherung und Verarbeitung Ihrer Daten durch diese Website einverstanden.

    Our Company

    25 years of international experience in the USA, Asia and Australia with renowned international partners makes us an ideal partner for all security issues in large companies. From strategies for the entire company to hacks, penetration tests and incident response, our portfolio ranges.

    With the Alliance for Cyber Security, founded in 2012, the Federal Office for Information Security (BSI) pursues the goal of strengthening the resilience of the German location to cyber attacks.

    Currently, the initiative involves around 2,700 companies and institutions – log (2) is one of them. Participation is a direct approach and mediation between our clients and government institutions.


    log(2) oHG
    Memelstrasse 5
    64846 Gross Zimmern


    Sitz der Gesellschaft: Gross Zimmern
    Registergericht Amtsgericht:Darmstadt
    HRB Nr: 7136
    Ust.-IdentNr.: DE814091120

    VISDP: Holger Stumm


    Tel: +49 6071 / 496 47 – 22


    E-mail: info@log2.de