MUNICH & HEIDELBERG, Germany--(EON: Enhanced Online News)--The European Patent Office has granted Virtual Forge a patent for an innovative method for Data Leak Prevention (DLP) in SAP systems. The new method, which is based on Virtual Forge’s security software CodeProfiler for ABAP, identifies the data leakage channels of sensitive data in the ABAP source code.
“The DLP method taken by Virtual Forge follows an innovative approach that brings additional, unique advantages for security analyses of business applications.”
Virtual Forge uses what is called a static DLP analysis. This is initialized much earlier in the process than other methods, which merely monitor the potential SAP data leakage exit points in the company network. A proactive approach is taken to detect the points within the ABAP source code which could be used fraudulently by an attacker or inadvertently by an employee. The result is a report for customers that identifies the weak points in the SAP source code and provides concrete action recommendations for remediation.
“SAP applications are increasingly in the focus of hackers and attackers, which, in turn, elevates the probability of attacks,” according to the patent specification of the European Patent Office (EPO) in Munich, Germany. “The DLP method taken by Virtual Forge follows an innovative approach that brings additional, unique advantages for security analyses of business applications.” To this, Dr. Markus Schumacher, Managing Director at Virtual Forge, adds, “That the European patent has been granted to us demonstrates just how innovative our DLP approach is for SAP security. It protects a key building block of our offering and strengthens our market position.”
Virtual Forge GmbH
Virtual Forge is an independent provider of security, compliance, and quality assurance products for SAP systems and applications. Its portfolio is designed to help companies minimize the risks that arise through customization and configuration. Virtual Forge solutions thus offer effective protection against unauthorized access, cyberattacks, espionage, and system downtime.