As the digital attack surface continues to evolve, it’s crucial to stay ahead of the curve in terms of cybersecurity. That’s why we are excited to share with you the advancements we’ve made to our platform to better protect our customers from cyber threats. In this blog series, we will continuously highlight the newest features and updates that make the smarterSec Security Platform even more powerful for safeguarding your digital assets. From enhanced threat detection to improved user experience, our improvements will help our customers to stay one step ahead of potential security breaches. Whether you’re a current user or just interested in learning more about smarterSec, this blog series is for you. Your feedback is more than welcome. So, join us as we take a closer look at the latest innovations for the smarterSec Security Platform.
If you want to dive deeper into the functionalities of the smarterSec Security Platform, you can find more information here: smarterSec Security Platform
New features & improvements
- Addition of 161 detailed testcase documentations, making them available for all testcases.
This release takes the transparency and usability of our smarterSec Security Platform to a new level. With the addition of 161 testcase documentations, we have completed the documentation of all existing testcases. New testcases will only be shipped with existing documentation. The documentation clearly explains what each testcase checks, how to reproduce potential findings and, of course, how to mitigate those findings.
Review documentation when selecting testcases
Gain insight into how to mitigate findings
Get detailed reports of the findings with detailed steps on how to reproduce and how to mitigate them
- “IIOP request size must be limited”: The maximum size of a IIOP-request that will be accepted by the SAP Internet Communication Manager (ICM). If it is not set properly, the system is vulnerable to a Denial-of-Service attack.
- “P4 request size must be limited”: The maximum size of a P4-request that will be accepted by the SAP Internet Communication Manager (ICM). If it is not set properly, the system is vulnerable to a Denial-of-Service attack.
We will update you on our new platform features regularly here in this blog – stay tuned and give us a follow on LinkedIn to not miss any further updates!