SlideShare a Scribd company logo
Securing SAP Solutions for the Digital Enterprise
2
© Fortinet Inc. All Rights Reserved.
SAP systems are mission critical, and SAP security
failures lead to business disruption
SAP secures their solutions – the customer is
responsible to secure the whole business
Only Fortinet offers a comprehensive protection
for your SAP landscapes
Fortinet is securing people, device and data everywhere
Executive Summary
3
© Fortinet Inc. All Rights Reserved.
Founded: October 2000
Founded by: Ken Xie and Michael Xie
Headquarters: Sunnyvale, CA
Fortinet IPO (FTNT): November 2009
Listed in both: NASDAQ 100 and S&P 500
Member of: 2022 Dow Jones Sustainability
World and North America Indices
Security Investment Grade Rating: BBB+ Baa1
Securing people, devices, and data everywhere.
For over 20 years, Fortinet has been a driving force in the
evolution of cybersecurity and the convergence of networking
and security. Our security solutions are among the most
deployed, most patented, and most validated in the industry.
Global Customer Base
660,000+
Customers
2022 Billings
$5.59B+
(as of Dec 31, 2022)
Market Capitalization
$52.1B
(as of March 31, 2023)
Broad, Integrated Portfolio of
50+
Enterprise Cybersecurity
Products
Strong Analyst Validation
37
Enterprise Analyst Report
Inclusions
Vertical Integration
$1B+
Investment in ASIC
Design & Development
4
© Fortinet Inc. All Rights Reserved.
Global Reach & Support
Majority of our R&D is based in North America
13,200+
Employees
Worldwide
Engineers
Hardware
One Third
Software
Two-Thirds
Support Centers
Centers of Excellence
Headquarters
Dev Centers
Fortinet Dev & Support
Point-of-Presence (POP)
Burnaby
Canada
Ottawa
Canada
Bangalore
India
Uberlandia
Brazil
Kawasaki
Japan
Sunnyvale
US
Sofia
France
Chicago
US Herzliya
Israel
Concord
US
5
© Fortinet Inc. All Rights Reserved.
Cybersecurity Market & Industry Drivers
Ransom as
a Service
Kaseya
VSA
REvil
AI-enabled OT
SolarWinds | Log4j
Growing Attack
Surface
Cloud
Swarmbot Wipers |
Colonial
Pipeline
Hermetic
Wiper
Nation
Sponsored
Work from Anywhere
Operational Technology
Connectivity
Digital Acceleration
Application Journey
How we interact with customers, suppliers,
infrastructure, and employees is changing
Cybercriminals are adopting APT-like tactics to
develop and scale attacks faster than ever
Driving Infrastructure Evolution Evolving Threat Landscape
6
© Fortinet Inc. All Rights Reserved.
Travel Factory
Edge Compute
Public Cloud Internet SaaS
Data Center
Users and Device Security
Home Campus
Network Security Cloud Security Security Operations
Branch
+ + + +
Users and Devices
Today’s
Challenges
• Applications are
distributed
• Users are working from
anywhere
• More devices are
attaching to applications
• Too many IT and
security stacks
• Too many vendors
• Cybersecurity skills
shortage
Complexity is Slowing Digital Initiatives
7
© Fortinet Inc. All Rights Reserved.
ASIC Appliance Virtual Cloud Native As-a Service Container
Secure Networking Cybersecurity Platform OT Aware Security
AIOps
Threat
Intelligence
Ecosystem
Consolidation Reduces Complexity
& Accelerates Outcomes
8
© Fortinet Inc. All Rights Reserved.
Public
Cloud
Internet
SaaS
Data Center
Travel
Plant
Home
Campus
Branch
User and
Device
Security
Application
Security
Open
Ecosystem
Secure
Networking
FortiGuard
Threat
Intelligence
Network
Operations
Security
Operations
Edge
Compute
Fortinet
Security
Fabric
Broad
visibility and protection of the entire
digital attack surface to better
manage risk
Integrated
solution that reduces management
complexity and shares threat
intelligence
Automated
self-healing networks with AI-driven
security for fast and efficient
operations
9
© Fortinet Inc. All Rights Reserved.
Entities
Anywhere
Users and Devices
Public Cloud
SaaS
Internet
Edge
Applications
Resources
Everywhere
Data Center
FortiClient ZTNA
NOC FortiGuard
FortiWeb
Branch
Campus
OT
WFH
Employees
Contractors
FortiGate VM
FortiMail
FortiManager
FortiMonitor
FortiAIOps
FortiPolicy
FortiGuard
Web
Security
Content
Security
Device
Security
SD-WAN
FortiAP/
FortiSwitch
Networks
FortiGate
Securing the Digital Experience
FortiProxy
SOC
FortiAnalyzer
FortiSIEM /
FortiSOAR
FortiGuard
SoCaaS / IR
FortiNAC
FortiAuthenticator
FortiToken
FortiExtender
Remote
Access/VPN
FortiDDoS
FortiADC
FortiCASB
Control and Protect Everyone and
Everything on or off the Network
Secure Any Application
Journey on Any Cloud
Speed Operations, with
AI-powered Automation
Counter Threats, with
Coordinated Protection
FortiEDR /
FortiMDR
FortiDeceptor
FortiRecon
FortiNDR
FortiSASE
FortiGate
Cloud
Application
Security
SOC
Services
Fortinet Security Fabric Expansion
10
© Fortinet Inc. All Rights Reserved.
Figures as of Dec 1, 2022
Note: Logos are a representative subset of the Security Fabric Ecosystem
Fabric
Connectors
Fortinet-developed deep
integration automating
security operations and
policies
Fabric
APIs
Partner-developed
integration using Fabric
APIs providing broad
visibility with end-to-end
solutions
Community-driven DevOps
scripts automating network
and security provisioning,
configuration, and
orchestration
Fabric
DevOps
Extended
Ecosystem
Integrations with other
vendor technologies
& open systems
OT/ IoT FinServ Healthcare/
Life Sciences & Pharma
Retail SLED
+300
other
Fabric-
Ready
Partners
Maximize your existing investments
Fortinet integrates with 500+ security and networking solutions
11
© Fortinet Inc. All Rights Reserved.
8
MAGIC
QUADRANTS
COMPASSES
Fortinet is one of the most validated
enterprise cybersecurity companies in the
world ranking in leadership positions across
dozens of analyst reports highlighting the
broad application of the Fortinet Security
Fabric.
37
Enterprise Analyst
Reports Validate
Fortinet Across
Networking & Security
MARKET
GUIDES
9
#1 IN CRITICAL
CAPABILITIES
6
PEER INSIGHTS
CUSTOMERS’
CHOICE
4
WAVES
5
NOWTECHS/
LANDSCAPES
10
RADARS
6
MARKETSCAPES
4
PLATFORM
NAVIGATOR
1 5
GIGAOM
RADAR
8
*Analyst validation includes reports where expert and independent 3rd party analysts rank
and evaluate vendors: Gartner Magic Quadrants, IDC Marketscapes, Frost & Sullivan
Radars, Forrester Waves, Westlands Advisory Plaform Navigator, Kuppingercole
Compasses, Gigaom Radar.
12
© Fortinet Inc. All Rights Reserved.
13
© Fortinet Inc. All Rights Reserved.
SAP customers’ transformation journey
14
© Fortinet Inc. All Rights Reserved.
Innovation
Cloud
Business Security
Secure your success with SAP and Fortinet
15
© Fortinet Inc. All Rights Reserved.
SAP offers for cybersecurity
16
© Fortinet Inc. All Rights Reserved.
But SAP Security isn’t like other Security
Reconnaissance
detection requires
SAP specific
honeypots and lures
Requires both N/S
and E/W security
SAP Specific
Vulnerabilities and
Attacks
Requires tested and
validated security
architectures
It requires a Security Fabric from Fortinet
Visibility into SAP
Protocols and
communications
17
© Fortinet Inc. All Rights Reserved.
Fortinet for SAP solutions
Secure enterprise
landscapes
• Use FortiGate to
securely access
SAP systems
• Segment SAP
systems into
security zones
• Extend secure
access to remote
locations
• Use FortiSandbox
to detect malware
and zero-day
threats.
Secure SAP
Solutions in a
hybrid world
• Use FortiADC to
increase the
availability,
security and
performance of
SAP applications
• Utilize FortiWeb to
protect SAP
applications and
APIs
Enhance SAP
Identity
Management with
Zero Trust Access
• Zero Trust ensures
that no one should
be trusted unless
their devices have
been vetted and
identification have
been thoroughly
checked.
• Install FortiClient
and the FortiClient
Enterprise
Management
Server to enforce
zero-trust policies.
Secure SAP
Security
Operations
• Build or enhance
your SAP Security
Operations Center
(SOC) with
Fortinet
• Monitor the
security and
compliance of your
cloud-based
deployments with
FortiCNP.
Secure
RISE with SAP
• Fortinet integrates
Security for SAP
systems into a
broader security
fabric
• Fortinet allows to
secure SAP traffic,
ports and APIs as
well as to create
processes to
mitigate further
risks even in a
RISE with SAP
environment
18
© Fortinet Inc. All Rights Reserved.
SAP
Application
Protection
SAP
Web
Protection
Use Cases for Securing SAP Deployments
SAP
Intrusion
Prevention &
Content
Inspection
SAP Threat
Hunting
SAP
Vulnerability
Scans
SAP SaaS
Monitoring and
Compliance
SAP
Automated
Response
19
© Fortinet Inc. All Rights Reserved.
FortiADC
FortiCASB
FortiCNP
FortiDeceptor
FortiDAST
FortiSOAR FortiWeb
FortiGate
FortiCNF
Fortinet Products for Securing SAP Deployments
20
© Fortinet Inc. All Rights Reserved.
Validated Fortinet for SAP reference architectures
Integration with all major cloud providers
21
© Fortinet Inc. All Rights Reserved.
Benefits of Fortinet for your SAP Business
Versality
• Upgrade and
adapt your SAP
network security
in real time
• Easily control the
flow of data and
users if your
business changes
Multi-layer
protection
• Looking at traffic
across the
different levels of
the SAP business
• Better control and
transparency
• Ability to better
control the data
and information
that comes in and
out of your SAP
network
Simple cloud
infrastructure
• Streamlined SAP
network security
• Deploy new
policies much
easier across the
entire network
Updated thread
protection
• Security measures
integrated into on
seamless product
fabric
• Increased level of
protection across
the board through
component
cooperation
No performance
impact
• Improve and
expand the
deployment of
your protection
without
compromising the
speed of your
network
• SAP business is
protected, and the
speed of your
operations remain
fast
22
© Fortinet Inc. All Rights Reserved.
• Migrated SAP to Microsoft Azure
• Requirements
• Ability to scale as business grows
• Best-in-class security of mission critical apps and
data
• Consistent security across clouds and data centers
• Solution
• Global capability for both SAP and cloud services.
• Close collaboration of SAP, Microsoft, T-Systems
and Fortinet
• Customer benefits
• Provides infrastructure for securely growing
business in Asia
• Improved experience for their customers
“Zuellig Pharma uses Fortinet’s Adaptive
Cloud Security offerings to protect our
SAP deployments across public and
private cloud infrastructures,” shared
Daniel Laverick, Head of SAP & IT
Solutions at Zuellig Pharma. “Fortinet
offers the broadest set of security offerings
for securing workloads both on-premises
and on any cloud. With Fortinet, we’ve
gained unified visibility and control without
hindering our ability to deliver seamless
user experience to our customers
worldwide.”
Customer success with Zuellig Pharma
One of the largest healthcare groups in Asia
23
© Fortinet Inc. All Rights Reserved.
SAP systems are mission critical, and SAP security
failures lead to business disruption
SAP secures their solutions – the customer is
responsible to secure the whole business
Only Fortinet offers a comprehensive protection
for your SAP landscapes
Fortinet is securing people, device and data everywhere
Executive Summary
24
© Fortinet Inc. All Rights Reserved.
https://fortinetsecuressap.com/
25
© Fortinet Inc. All Rights Reserved.
SAP-request@fortinet.com

More Related Content

PPT
Computer graphics
PDF
Graduation Project Documentation.PDF
PPTX
Computer graphics presentation
PPTX
Viewing transformation
PDF
Collaborating Using Cloud Services
PPTX
Ip v4 & ip v6
PPTX
Image & Graphics
DOC
IOT Reference Model.doc
Computer graphics
Graduation Project Documentation.PDF
Computer graphics presentation
Viewing transformation
Collaborating Using Cloud Services
Ip v4 & ip v6
Image & Graphics
IOT Reference Model.doc

What's hot (9)

PPTX
M2M technology in IOT
PPTX
Smart board project
PDF
Module 4 Arithmetic Coding
PPTX
Target hardware debugging
PPTX
Symbol table
PPTX
Number system
PDF
Multiplication of large integers problem subi notes
PPTX
Artificial Intelligence in Computer Networks
PPT
Fractal Image Compression Using Quadtree Decomposition
M2M technology in IOT
Smart board project
Module 4 Arithmetic Coding
Target hardware debugging
Symbol table
Number system
Multiplication of large integers problem subi notes
Artificial Intelligence in Computer Networks
Fractal Image Compression Using Quadtree Decomposition
Ad

Similar to Fortinet_for_SAP (20)

PPTX
Fortinet Corporate Overview Deck.pptx
PPTX
Fortinet Corporate Overview Deck 11.pptx
PPTX
Adaptive Cloud Security Next Generation Sec
PPTX
Fortinet Perspectiva Coporativa
PPTX
Fortinet k
PDF
May 2025 - Investor Presentation - FINAL.pdf
PPTX
Secure AWS with Fortinet Security Fabric.pptx
PPTX
FTNT_Icon-Library-External-June-2022.pptx
PPTX
Biblioteca-Icones-Fortinet.FortiGate.pptx
PDF
Solution Guide Secure Access Architecture
PPTX
Fortinet Tanıtım
PPT
Emea Corporate Presentation 0709 Lin
PPTX
FTNT_Icon-Library-External-February-2023.pptx
PPTX
Network Security - Fortinet, Dublin June 2017
PDF
Fortinet security fabric
PDF
NTXISSACSC4 - Security for a New World
PPTX
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
PPTX
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
PDF
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck 11.pptx
Adaptive Cloud Security Next Generation Sec
Fortinet Perspectiva Coporativa
Fortinet k
May 2025 - Investor Presentation - FINAL.pdf
Secure AWS with Fortinet Security Fabric.pptx
FTNT_Icon-Library-External-June-2022.pptx
Biblioteca-Icones-Fortinet.FortiGate.pptx
Solution Guide Secure Access Architecture
Fortinet Tanıtım
Emea Corporate Presentation 0709 Lin
FTNT_Icon-Library-External-February-2023.pptx
Network Security - Fortinet, Dublin June 2017
Fortinet security fabric
NTXISSACSC4 - Security for a New World
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
Ad

Recently uploaded (20)

PDF
project resource management chapter-09.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
A Presentation on Touch Screen Technology
PDF
Hybrid model detection and classification of lung cancer
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
August Patch Tuesday
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Getting Started with Data Integration: FME Form 101
project resource management chapter-09.pdf
TLE Review Electricity (Electricity).pptx
NewMind AI Weekly Chronicles - August'25-Week II
Programs and apps: productivity, graphics, security and other tools
DP Operators-handbook-extract for the Mautical Institute
A Presentation on Touch Screen Technology
Hybrid model detection and classification of lung cancer
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation_ Review paper, used for researhc scholars
Group 1 Presentation -Planning and Decision Making .pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
August Patch Tuesday
cloud_computing_Infrastucture_as_cloud_p
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
1 - Historical Antecedents, Social Consideration.pdf
Heart disease approach using modified random forest and particle swarm optimi...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Getting Started with Data Integration: FME Form 101

Fortinet_for_SAP

  • 1. Securing SAP Solutions for the Digital Enterprise
  • 2. 2 © Fortinet Inc. All Rights Reserved. SAP systems are mission critical, and SAP security failures lead to business disruption SAP secures their solutions – the customer is responsible to secure the whole business Only Fortinet offers a comprehensive protection for your SAP landscapes Fortinet is securing people, device and data everywhere Executive Summary
  • 3. 3 © Fortinet Inc. All Rights Reserved. Founded: October 2000 Founded by: Ken Xie and Michael Xie Headquarters: Sunnyvale, CA Fortinet IPO (FTNT): November 2009 Listed in both: NASDAQ 100 and S&P 500 Member of: 2022 Dow Jones Sustainability World and North America Indices Security Investment Grade Rating: BBB+ Baa1 Securing people, devices, and data everywhere. For over 20 years, Fortinet has been a driving force in the evolution of cybersecurity and the convergence of networking and security. Our security solutions are among the most deployed, most patented, and most validated in the industry. Global Customer Base 660,000+ Customers 2022 Billings $5.59B+ (as of Dec 31, 2022) Market Capitalization $52.1B (as of March 31, 2023) Broad, Integrated Portfolio of 50+ Enterprise Cybersecurity Products Strong Analyst Validation 37 Enterprise Analyst Report Inclusions Vertical Integration $1B+ Investment in ASIC Design & Development
  • 4. 4 © Fortinet Inc. All Rights Reserved. Global Reach & Support Majority of our R&D is based in North America 13,200+ Employees Worldwide Engineers Hardware One Third Software Two-Thirds Support Centers Centers of Excellence Headquarters Dev Centers Fortinet Dev & Support Point-of-Presence (POP) Burnaby Canada Ottawa Canada Bangalore India Uberlandia Brazil Kawasaki Japan Sunnyvale US Sofia France Chicago US Herzliya Israel Concord US
  • 5. 5 © Fortinet Inc. All Rights Reserved. Cybersecurity Market & Industry Drivers Ransom as a Service Kaseya VSA REvil AI-enabled OT SolarWinds | Log4j Growing Attack Surface Cloud Swarmbot Wipers | Colonial Pipeline Hermetic Wiper Nation Sponsored Work from Anywhere Operational Technology Connectivity Digital Acceleration Application Journey How we interact with customers, suppliers, infrastructure, and employees is changing Cybercriminals are adopting APT-like tactics to develop and scale attacks faster than ever Driving Infrastructure Evolution Evolving Threat Landscape
  • 6. 6 © Fortinet Inc. All Rights Reserved. Travel Factory Edge Compute Public Cloud Internet SaaS Data Center Users and Device Security Home Campus Network Security Cloud Security Security Operations Branch + + + + Users and Devices Today’s Challenges • Applications are distributed • Users are working from anywhere • More devices are attaching to applications • Too many IT and security stacks • Too many vendors • Cybersecurity skills shortage Complexity is Slowing Digital Initiatives
  • 7. 7 © Fortinet Inc. All Rights Reserved. ASIC Appliance Virtual Cloud Native As-a Service Container Secure Networking Cybersecurity Platform OT Aware Security AIOps Threat Intelligence Ecosystem Consolidation Reduces Complexity & Accelerates Outcomes
  • 8. 8 © Fortinet Inc. All Rights Reserved. Public Cloud Internet SaaS Data Center Travel Plant Home Campus Branch User and Device Security Application Security Open Ecosystem Secure Networking FortiGuard Threat Intelligence Network Operations Security Operations Edge Compute Fortinet Security Fabric Broad visibility and protection of the entire digital attack surface to better manage risk Integrated solution that reduces management complexity and shares threat intelligence Automated self-healing networks with AI-driven security for fast and efficient operations
  • 9. 9 © Fortinet Inc. All Rights Reserved. Entities Anywhere Users and Devices Public Cloud SaaS Internet Edge Applications Resources Everywhere Data Center FortiClient ZTNA NOC FortiGuard FortiWeb Branch Campus OT WFH Employees Contractors FortiGate VM FortiMail FortiManager FortiMonitor FortiAIOps FortiPolicy FortiGuard Web Security Content Security Device Security SD-WAN FortiAP/ FortiSwitch Networks FortiGate Securing the Digital Experience FortiProxy SOC FortiAnalyzer FortiSIEM / FortiSOAR FortiGuard SoCaaS / IR FortiNAC FortiAuthenticator FortiToken FortiExtender Remote Access/VPN FortiDDoS FortiADC FortiCASB Control and Protect Everyone and Everything on or off the Network Secure Any Application Journey on Any Cloud Speed Operations, with AI-powered Automation Counter Threats, with Coordinated Protection FortiEDR / FortiMDR FortiDeceptor FortiRecon FortiNDR FortiSASE FortiGate Cloud Application Security SOC Services Fortinet Security Fabric Expansion
  • 10. 10 © Fortinet Inc. All Rights Reserved. Figures as of Dec 1, 2022 Note: Logos are a representative subset of the Security Fabric Ecosystem Fabric Connectors Fortinet-developed deep integration automating security operations and policies Fabric APIs Partner-developed integration using Fabric APIs providing broad visibility with end-to-end solutions Community-driven DevOps scripts automating network and security provisioning, configuration, and orchestration Fabric DevOps Extended Ecosystem Integrations with other vendor technologies & open systems OT/ IoT FinServ Healthcare/ Life Sciences & Pharma Retail SLED +300 other Fabric- Ready Partners Maximize your existing investments Fortinet integrates with 500+ security and networking solutions
  • 11. 11 © Fortinet Inc. All Rights Reserved. 8 MAGIC QUADRANTS COMPASSES Fortinet is one of the most validated enterprise cybersecurity companies in the world ranking in leadership positions across dozens of analyst reports highlighting the broad application of the Fortinet Security Fabric. 37 Enterprise Analyst Reports Validate Fortinet Across Networking & Security MARKET GUIDES 9 #1 IN CRITICAL CAPABILITIES 6 PEER INSIGHTS CUSTOMERS’ CHOICE 4 WAVES 5 NOWTECHS/ LANDSCAPES 10 RADARS 6 MARKETSCAPES 4 PLATFORM NAVIGATOR 1 5 GIGAOM RADAR 8 *Analyst validation includes reports where expert and independent 3rd party analysts rank and evaluate vendors: Gartner Magic Quadrants, IDC Marketscapes, Frost & Sullivan Radars, Forrester Waves, Westlands Advisory Plaform Navigator, Kuppingercole Compasses, Gigaom Radar.
  • 12. 12 © Fortinet Inc. All Rights Reserved.
  • 13. 13 © Fortinet Inc. All Rights Reserved. SAP customers’ transformation journey
  • 14. 14 © Fortinet Inc. All Rights Reserved. Innovation Cloud Business Security Secure your success with SAP and Fortinet
  • 15. 15 © Fortinet Inc. All Rights Reserved. SAP offers for cybersecurity
  • 16. 16 © Fortinet Inc. All Rights Reserved. But SAP Security isn’t like other Security Reconnaissance detection requires SAP specific honeypots and lures Requires both N/S and E/W security SAP Specific Vulnerabilities and Attacks Requires tested and validated security architectures It requires a Security Fabric from Fortinet Visibility into SAP Protocols and communications
  • 17. 17 © Fortinet Inc. All Rights Reserved. Fortinet for SAP solutions Secure enterprise landscapes • Use FortiGate to securely access SAP systems • Segment SAP systems into security zones • Extend secure access to remote locations • Use FortiSandbox to detect malware and zero-day threats. Secure SAP Solutions in a hybrid world • Use FortiADC to increase the availability, security and performance of SAP applications • Utilize FortiWeb to protect SAP applications and APIs Enhance SAP Identity Management with Zero Trust Access • Zero Trust ensures that no one should be trusted unless their devices have been vetted and identification have been thoroughly checked. • Install FortiClient and the FortiClient Enterprise Management Server to enforce zero-trust policies. Secure SAP Security Operations • Build or enhance your SAP Security Operations Center (SOC) with Fortinet • Monitor the security and compliance of your cloud-based deployments with FortiCNP. Secure RISE with SAP • Fortinet integrates Security for SAP systems into a broader security fabric • Fortinet allows to secure SAP traffic, ports and APIs as well as to create processes to mitigate further risks even in a RISE with SAP environment
  • 18. 18 © Fortinet Inc. All Rights Reserved. SAP Application Protection SAP Web Protection Use Cases for Securing SAP Deployments SAP Intrusion Prevention & Content Inspection SAP Threat Hunting SAP Vulnerability Scans SAP SaaS Monitoring and Compliance SAP Automated Response
  • 19. 19 © Fortinet Inc. All Rights Reserved. FortiADC FortiCASB FortiCNP FortiDeceptor FortiDAST FortiSOAR FortiWeb FortiGate FortiCNF Fortinet Products for Securing SAP Deployments
  • 20. 20 © Fortinet Inc. All Rights Reserved. Validated Fortinet for SAP reference architectures Integration with all major cloud providers
  • 21. 21 © Fortinet Inc. All Rights Reserved. Benefits of Fortinet for your SAP Business Versality • Upgrade and adapt your SAP network security in real time • Easily control the flow of data and users if your business changes Multi-layer protection • Looking at traffic across the different levels of the SAP business • Better control and transparency • Ability to better control the data and information that comes in and out of your SAP network Simple cloud infrastructure • Streamlined SAP network security • Deploy new policies much easier across the entire network Updated thread protection • Security measures integrated into on seamless product fabric • Increased level of protection across the board through component cooperation No performance impact • Improve and expand the deployment of your protection without compromising the speed of your network • SAP business is protected, and the speed of your operations remain fast
  • 22. 22 © Fortinet Inc. All Rights Reserved. • Migrated SAP to Microsoft Azure • Requirements • Ability to scale as business grows • Best-in-class security of mission critical apps and data • Consistent security across clouds and data centers • Solution • Global capability for both SAP and cloud services. • Close collaboration of SAP, Microsoft, T-Systems and Fortinet • Customer benefits • Provides infrastructure for securely growing business in Asia • Improved experience for their customers “Zuellig Pharma uses Fortinet’s Adaptive Cloud Security offerings to protect our SAP deployments across public and private cloud infrastructures,” shared Daniel Laverick, Head of SAP & IT Solutions at Zuellig Pharma. “Fortinet offers the broadest set of security offerings for securing workloads both on-premises and on any cloud. With Fortinet, we’ve gained unified visibility and control without hindering our ability to deliver seamless user experience to our customers worldwide.” Customer success with Zuellig Pharma One of the largest healthcare groups in Asia
  • 23. 23 © Fortinet Inc. All Rights Reserved. SAP systems are mission critical, and SAP security failures lead to business disruption SAP secures their solutions – the customer is responsible to secure the whole business Only Fortinet offers a comprehensive protection for your SAP landscapes Fortinet is securing people, device and data everywhere Executive Summary
  • 24. 24 © Fortinet Inc. All Rights Reserved. https://fortinetsecuressap.com/
  • 25. 25 © Fortinet Inc. All Rights Reserved. SAP-request@fortinet.com

Editor's Notes

  • #2: Welcome to "Cybersecurity for SAP, Everywhere You Need It.. This presentation is about Securing SAP Solutions for the Digital Enterprise.
  • #3: You will leave this presentation with the following key messages. SAP systems are mission critical, and SAP security failures lead to business disruption. SAP secures their solutions. The customer is responsible to secure the whole business. Only Fortinet offers a comprehensive protection for your SAP landscapes. Fortinet is securing people, device and data everywhere.
  • #4: Fortinet was founded over 20 years ago in Sunnyvale, California, and is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere you need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet's solutions, which are among the most deployed, most patented, and most validated in the industry. Consistent business momentum and a dedication to maintaining a strong supply chain means Fortinet is a partner you can trust to achieve your security and networking goals now and in the future. Key stats from this slide: Fortinet has a massive install base of customers — over 600,000 — and finished out 2021 with over $4.1 billion in billings. Founded over 22 years ago, Fortinet is still run by the original founders, Ken Xie and Michael Xie. Fortinet is a financially stable company with large investments in a broad portfolio of cybersecurity products from endpoint to cloud and everything in between. Fortinet has strong analyst validation and is included in over 33 different enterprise analyst reports. Something that’s very unique to Fortinet is our vertical integration. We not only have our own cybersecurity products, but also own our own operating system, and we actually design our own ASICs for our products, which means we have a very vertically integrated business, which allows us to take control of the supply chain. 
  • #5: Fortinet is a North America-based company in terms of R&D, with Sunnyvale, Ottawa, and Burnaby being our main centers of innovation. We have a few outposts through acquisitions in Israel, India, and in Japan, but the majority of our R&D — around 95% — is in North America. Fortinet now has over 13,000 employees around the world and a global footprint in terms of support and centers of excellence across time zones from North America to Europe to Asia. 
  • #6: Today, CIO and CISO teams are in the midst of an infrastructure evolution, tasked with business-critical initiatives, such as: Securing & connecting work-from-anywhere, enabling digital acceleration, managing applications moving to the edge or cloud, and securing operational technology environments converging with IT.  Meanwhile, the threat landscape continues to evolve, and cyber risk is escalating for all organizations. As cybercrime converges with advanced persistent threat methods, cybercriminals are finding ways to weaponize new technologies at scale to enable more disruption and destruction. At the same time, they are spending more time on reconnaissance to attempt to evade detection, intelligence, and controls. All of this means that cyber risk continues to escalate, and that CISOs need to be just as nimble and methodical as the adversary
  • #7: Today, complexity is slowing down digital initiatives.  Applications are distributed in the cloud, in the data center, and as a Service. Users are in constant movement across home, office, and travel. More devices than ever are attaching to applications. In response, most organizations add new networking or security point solutions, leading to too many IT and security stacks, too many vendors, and too many products that operate in a silo with their own policies and their own management consoles. This operational complexity is the #1 challenge teams can start solving right now to take back control of their environments. 
  • #8: Fortinet's answer to this challenge of complexity is to support our customers with consolidation.  By focusing on consolidating vendors and point products, across both security and networking, organizations can reduce complexity to close security gaps, improve operational efficiency, optimize user experience, and accelerate outcomes. Three key concepts to achieve consolidation are: 1st, The convergence of networking and security into a secure networking solution. 2nd, Consolidating point products into an integrated cybersecurity platform. 3rd,, Consistently applying threat intelligence and security services across everything. All three of these areas consist of solutions and products from Fortinet that can be deployed either as an appliance, as a virtual machine, as native cloud, as a service, or containerized.
  • #9: This is what it looks like when convergence, platform, and threat intelligence and security services come together: The Fortinet Security Fabric. , Fortinet is committed to delivering convergence in the network, endpoint and cloud, while also supporting the convergence of the Network and Security Operations Center. We connect everything together as part of the Fortinet Security Fabric and apply threat intelligence across while also integrating with an open ecosystem of over 500 solutions from over 350 vendors. The results are: 1st , A broad visibility and protection of the entire digital attack surface to better manage risk. 2nd , An integrated solution that reduces management complexity and shares threat intelligence. 3rd , Automated self-healing networks with A I driven security for fast and efficient operations
  • #10: Let’s look at the Fortinet Security Fabric in more detail; all of the products you see here are built with integration and automation in mind to share threat intelligence, correlate data, and mitigate threats across any network, endpoint, and cloud. This allows us to deliver real time detection as well as proactive enforcement and mitigation across the entire attack surface.
  • #11: We also realize you already have existing investments from other vendors. That’s why Fortinet's products and solutions integrate with your existing investments thanks to the industry’s largest open ecosystem of over 500 products from over 350 technology alliance partners. This is another example of Fortinet's dedication to supporting our customers in building integration and automation regardless of who they're currently working with.  We have four different categories of technology alliance partners: 1st , Fabric Connectors: Fortinet-developed deep integrations into technology partner platforms that automate operations, policies, and processes. 2nd ,Fabric API’s: Partner-developed Fabric API integrations for a broad range of ecosystem solutions to secure the entire digital attack surface. 3rd , Fabric DevOps: Community-driven set of security automation and orchestration tools and scripts developed by Fortinet, partners, and customers. 4th , Extended Ecosystem: Threat intelligence sharing collaborations and other vendor technology integrations, even competitors. This last category of our extended ecosystem is the most interesting of the four in that Fortinet talks and integrates into some of our key competitors. Listed in this slide are just a few examples, but you'll see this is something very different, a lot of our competitors won't integrate into Fortinet. But we proactively keep our ecosystem as open as possible, so that we can integrate not only with our partners, but also our competitors. To us, this openness is the best way to meet our customers where they are at and support them in consolidating point products and vendors to build a broad, integrated and automated platform.
  • #12: Fortinet is currently represented in 37 enterprise analyst reports and is consistently recognized year-after-year for both our vision and execution across both networking and security products. A few notable accolades include: Inclusion in 8 Gartner Magic Quadrants, including being named a Leader for Network Firewall and SD-WAN, which highlights our best of breed capability across security and networking. Recognized by Gartner for our platform approach to build an ecosystem of integrated components, a roadmap with innovative capabilities, a competitive price/performance ratio, and strong financials and commitment to the market. Fortinet has also been recognized as a vendor of choice by firms that are focused on specific verticals or market technologies. For example, recognition from Westlands Advisory as a leading vendor for our OT security platform.  
  • #13: As you learned now about Fortinet as company, trends and market drivers, and the Fortinet Security Platform, let’s talk about our partnership with SAP, and what we offer together to our customers.
  • #14: SAP customers are on a transformation journey to a digital enterprise. Today, new implementations of SAP systems, SAP upgrades, migrations to S4HANA, etc., are not deployed by default in on-premises data centers. “Do more with less” has been the challenge for CIO’s for many years, meaning to provide more IT services to the enterprise with a reduced or at best stable IT budget. , , By outsourcing IT to cloud providers, organizations can free budget and invest it into more innovative tasks and projects. However, by adding services from the cloud or by managing hybrid environments, SAP customers shift their attack surface. As a result, they have to rethink security seriously to ensure customer data and enterprise information is protected, and data pryvacy policies in each country conducting business are respected.
  • #15: How can customers seamlessly run their mission-critical SAP operations worldwide, ensuring efficiency, security, and innovation every step of the way? First and foremost, it's crucial to address the challenge of running SAP operations on a global scale. With businesses expanding their reach across borders, it becomes essential to have a solution that can accommodate the demands of your organization's global operations. We understand that you require a robust infrastructure that can handle the complexities of managing your mission-critical SAP systems across multiple regions. . . Next, we'll shed light on reaching the cloud without compromising security. Cloud adoption has become an integral part of modern business strategies, and for SAP-based operations, it's no different. However, security concerns often arise when considering the migration to the cloud. Today, we'll showcase cutting-edge security solutions tailored specifically for SAP businesses, ensuring that your data remains protected and confidential throughout the cloud journey. . . Change is constant, and businesses must adapt quickly to stay ahead of the curve. To take charge of change effectively and securely, we'll introduced you to the Fortinet Security Fabric designed to securely expedite innovation within your SAP environment. With this fabric, you'll have the agility, flexibility, and security required to implement changes swiftly and efficiently, empowering your organization to embrace new technologies and accelerate growth while not compromising security. . . As data becomes increasingly valuable, safeguarding your SAP applications and data against cybersecurity threats is paramount. Today, we'll explore embedded cybersecurity measures that seamlessly integrate with your SAP ecosystem, providing proactive protection against evolving cyber threats. Additionally, we'll highlight the significance of automated data protection compliance, ensuring that your organization meets regulatory requirements without compromising efficiency or productivity.
  • #16: While SAP is primarily known for its enterprise resource planning software, it also provides some offerings related to cybersecurity. This includes Identity and Access Management that help organizations manage user identities, access privileges, and authentication mechanisms. SAP also offers data protection and encryption solutions to secure sensitive information, and solutions for security monitoring and analytics, enabling organizations to detect and respond to security incidents.
  • #17: But SAP Security isn’t like other Security. Customers need visibility into SAP protocols and communications, allowing them to monitor and analyze network traffic specific to SAP systems. This visibility enables detection of suspicious activities, such as unauthorized access attempts, data exfiltration, or abnormal network behavior within SAP environments. By gaining insights into SAP-specific protocols and communications, organizations can proactively identify potential security threats and take appropriate measures to mitigate them. SAP acknowledges the existence of specific vulnerabilities and potential attacks that are unique to SAP systems. Customers need comprehensive vulnerability management solutions that help organizations identify and address these specific vulnerabilities, reducing the risk of exploitation. These solutions often include regular security patches and updates tailored to address known SAP vulnerabilities, ensuring the systems are protected against potential attacks. SAP customers have the need for both North South and East West security within organizations' network architectures. This is about protecting the boundary between the internal network and external entities, such as the internet, by implementing firewalls, intrusion detection systems, and access controls. Organizations need to establish layered defenses to protect their SAP systems from external and internal threats. To allow customers to detect reconnaissance activities aimed at gathering information about SAP systems, specialized solutions are needed that deploy SAP-specific honeypots and lures, designed to attract and deceive attackers conducting reconnaissance activities. These honeypots and lures mimic legitimate SAP components, enticing attackers to interact with them and providing organizations with valuable insights into potential threats and their tactics. By detecting and analyzing reconnaissance activities, organizations can proactively strengthen their defenses and protect against targeted attacks on their SAP systems SAP emphasizes the need for tested and validated security architectures for protecting SAP systems. Fortinet provides guidance, best practices, and frameworks for designing, implementing, and validating security architectures specific to SAP environments. These security architectures encompass a combination of technical controls, processes, and policies tailored to mitigate risks associated with SAP systems. Organizations can leverage Fortinet's expertise and resources to ensure their security architectures are robust, effective, and aligned with industry standards and regulations. As you learned now, SAP Security isn’t like other Security. It requires a Security Fabric from Fortinet.
  • #18: Fortinet’s holistic security coverage protects your journey to securing SAP with a unified security policy that extends from on-premises across your hybrid deployments to provide seamless, enterprise-class security for your mission-critical SAP deployments. With deep integrations into your SAP systems, the Fortinet Security Fabric delivers protection by sharing threat intelligence with SAP Enterprise Threat Detector (ETD) to address some of SAP’s most common and emerging threats, even on an API level. Let’s have a look at this from a solutions point of view. HOW FORTINET SECURES ENTERPRISES: FortiGate Next-Generation Firewall is an SAP-aware firewall that recognizes, manages, and secures SAP traffic and ports, including SAP specific protocols. Enterprises can use it to secure both North South and East West traffic, create segmented security zones, gain real-time SAP threat intelligence, and deploy virtual patching to block attacks. FortiGate is the cornerstone of the Fortinet Security Fabric. HOW FORTINET secures SAP Solutions in a hybrid world: Fortinet not only protects your SAP applications between exploit and patch, it also can defend non-SAP applications that may serve as a springboard to an SAP attack. The Fortinet Security Fabric works seamlessly across clouds and data centers defending applications and the APIs they rely on while integrating into your SAP infrastructure to dynamically apply security policies as business needs change. HOW FORTINET enhances SAP Identity Management: Fortinet’s zero trust solutions for SAP provide authentication, authorization, and shrinking implicit trust zones to apply zero trust policies across your entire enterprise. Fortinet supports both client and clientless deployments. Either can ensure that all users and devices are validated and secured each time they access an SAP system. HOW FORTINET ENHANCES SAP SECURITY Operations: FortiSOAR extends the Fortinet Security Fabric into your SOC, providing security orchestration, automation, and response (SOAR) as well as innovative case management, automation, and orchestration. FortiSOAR integrates with SAP Enterprise Threat Detector (ETD) to provide automated interactions with the SAP ETD server using FortiSOAR playbooks. Fortinet FortiSIEM is a highly scalable multi-tenant Security Information and Event Manager (SIEM) that integrates into FortiSOAR to provide real-time infrastructure and user awareness for accurate threat detection, analysis, and reporting. FortiCNP adds to this with deep analysis of your security posture in the cloud. HOW FORTINET ENHANCES SAP SECURITY for RISE: SAP provides some security services for RISE-based deployments, including security monitoring, breach notification, threat management, and patch management. The customer is responsible for securing access to the cloud, ensuring that SAP instances are protected from web-based attacks, and building a Zero Trust infrastructure to prevent breaches.
  • #19: Looking at these solutions in more detail, you will now learn about our use cases for securing SAP deployments. With our SAP intrusion prevention and content inspection, Fortinet's Security Fabric can understand and recognize the SAP traffic on the network. We know if network traffic belongs to SAP HANA, to the SAP message server, if it's created by SAP RFC, SAP Fiori, or any other SAP component. We understand what type of traffic is trying to reach the SAP systems, and our SAP intrusion prevention solution comes with specific signatures on the network that help identify threats coming toward an SAP system. Before these packets reach the SAP landscape, we are able to block them. Application protection for SAP ensures the secure delivery of SAP applications to end users. Typically, there is little to no security in place to guarantee the integrity of the traffic and prevent unauthorized access. Our solution addresses this issue by incorporating a small yet powerful tool that routes users to the appropriate application servers and enhances security measures. This added layer of security ensures that the traffic remains protected and immune to potential threats. Additionally, our SAP web protection feature goes beyond safeguarding user traffic. It recognizes that a significant portion of communication within SAP systems occurs between different systems rather than individual users. These system-to-system communications rely on SAP APIs to access data. With our solution, we can effectively safeguard these SAP APIs by granting access only to authorized systems. This approach streamlines administration for SAP enterprise landscapes while simultaneously bolstering security measures. Now let's talk about SAP threat hunting. Imagine that you have identified a potential intrusion within your network. In such a situation, what can you do with the threat actor? One option is to put them into a hunting scenario. To facilitate this, we have developed SAP decoys. These decoys are designed to appear as if they are legitimate components. However, they are not real; their purpose is to mislead the attacker. We can confuse the threat actor and capture their actions by deploying these SAP decoys. These decoys cover common threat vectors within SAP, such as the SAP router, SP dispatcher, Fiori Launchpad, and more. Implementing this solution offers several benefits. Firstly, it allows for early detection of attackers in the kill chain, enabling swift action. Secondly, it misleads the attacker into an environment far removed from the actual production environment of SAP systems. Although it convincingly resembles the production environment, it is a controlled environment created solely for trapping and analyzing threat actors. Now, let's explore SAP vulnerability scanning. One major challenge SAP systems face is the constant need to maintain them at the correct patch level. However, accomplishing this is almost impossible because bringing down SAP systems frequently for patching is impractical. So, what can be done to address this issue? In addition to our previously mentioned solutions, we offer a penetration testing solution specifically designed for SAP systems. This solution examines your deployed SAP systems and tests them against known vulnerabilities related to SAP. By doing so, it assesses whether your systems are adequate. The results of these tests can be obtained through an automated report. With our vulnerability scanning solution, you can effectively evaluate the security status of your SAP systems without disrupting their operation. This empowers you to proactively identify and address potential vulnerabilities, ensuring your SAP environment's continued security and integrity. Let's now dive into the topic of SAP SaaS monitoring and compliance. Every SAP customer relies on SAP SasS (Software as a Service) applications such as Ariba, Fieldglass, Concur, or SuccessFactors. To enhance security, we have seamlessly integrated our solution with the SAP Identity Authentication service, leveraging our fabric technology. This integration enables us to protect a wide range of SAP solutions. Furthermore, we have successfully integrated our solution even more into SAP SuccessFactors, allowing us to monitor the activities and behaviors of SAP users. This proactive monitoring ensures no malicious software can infiltrate or compromise these SAP SaaS systems. For instance, it prevents scenarios where malware could be uploaded via a compromised resumé document, thus safeguarding the integrity of the systems. SAP automated response addresses incidents within SAP enterprise landscapes, ranging from threat actor activities to accidental user access beyond their authorized rights. In conjunction with SAP Enterprise Threat Detection, our solution enables automatic responses to these incidents using predefined playbooks. This robust and intelligent automation consolidates various solutions, allowing for a unified and automated response to multiple incidents. By leveraging SAP automated response, you can streamline incident management and mitigation processes, significantly reducing response times and enhancing overall security.
  • #20: These seven use cases are driven by Fortinet products like FortiGate, FortiADC, FortiWeb, and others. As mentioned earlier, all the products you see here are built with integration and automation in mind to share threat intelligence, correlate data, and mitigate threats in SAP solutions across any network, endpoint, and cloud.
  • #21: SAP and Fortinet are committed to providing comprehensive and secure solutions for organizations operating in the cloud. Recognizing the increasing adoption of cloud computing and the diverse cloud environments that businesses leverage, SAP and Fortinet have ensured compatibility and support across all major cloud providers. Both SAP and Fortinet have established partnerships and integrations with leading cloud service providers, including but not limited to Amazon Web Services, Microsoft Azure, and Google Cloud Platform. This collaboration enables customers to deploy SAP applications and Fortinet's security solutions seamlessly within their chosen cloud environments. Furthermore, SAP and Fortinet's commitment to cloud compatibility extends beyond infrastructure support. Both companies have worked diligently to ensure that their software and security solutions are designed to optimize performance, reliability, and security in cloud environments. This includes leveraging cloud-native technologies, integrating with cloud management frameworks, and aligning with industry best practices for cloud deployments.
  • #22: What are now the major benefits of using Fortinet for your SAP business? 1st . Versality: Upgrade and adapt your SAP network security in real time to meet the evolving needs of your business. Our solutions offer flexibility and agility, allowing you to adjust security measures as your organization grows and changes. 2nd Multi-layer protection: Our comprehensive approach provides multi-layer protection for your SAP business. By examining traffic at different levels, we ensure thorough security coverage. Gain better control and transparency over the flow of data and users, enabling you to identify and address potential risks more effectively. 3rd Simple cloud infrastructure: Experience streamlined SAP network security with our solutions. They simplifiy the deployment of new security policies across your entire network, ensuring consistent protection throughout. Enjoy the benefits of centralized management and effortless scalability as your business grows. 4th Updated thread protection: Stay one step ahead of emerging threats with our seamlessly integrated security measures. We embed advanced threat protection capabilities into our product fabric, offering an increased level of security across all components. Benefit from enhanced cooperation among different security features to fortify your SAP network against sophisticated attacks. 5th and last but not least, No performance impact: .Boost the deployment of your network protection without sacrificing speed. Our solution enables you to improve and expand your security measures while maintaining the optimal performance of your SAP business operations. Rest assured that your SAP network is safeguarded, and your processes remain fast and efficient.
  • #23: Fortinet solutions and products for SAP are used by many customers worldwide, like Zuellig Pharma, one of the largest healthcare groups in Asia. . . Having migrated their SAP solutions to Microsoft Azure protected by Fortinet, they use our Cloud Security offerings to protect their SAP deployments across public and private cloud infrastructures. Fortinet offers them the broadest set of security offerings for securing workloads both on-premises and on any cloud. With Fortinet, they gained unified visibility and control without hindering their ability to deliver seamless user experience to their customers worldwide. . . This is a true customer success story with Fortinet for SAP.
  • #24: This concludes our presentation of “Cybersecurity for SAP, Everywhere You Need It.”. Here are again the key messages to take with you: 1st . . SAP systems are mission critical, and SAP security failures lead to business disruption. 2nd . . SAP secures their solutions. The customer is responsible to secure the whole business. 3rd . .Only Fortinet offers a comprehensive protection for your SAP landscapes. 4th . . Fortinet is securing people, device and data everywhere.
  • #25: To experience our solutions for SAP security in a more interactive way, please have a look at the eBook “Your Journey to Securing SAP” at https://FortinetSecuresSAP.com.
  • #26: Thanks a lot for watching this presentation about “Cybersecurity for SAP, Everywhere You Need It.” If you want to learn more about Fortinet’s solutions for SAP and how we can help you with your specific needs for SAP security, please reach out to us via email to SAP-request@fortinet.com.