Services
Five services. One specialist. Every ERP platform.
Our services cover the full ERP security lifecycle — from the cloud infrastructure your ERP sits on, to the AI tools connecting to it.
Cloud Infrastructure Review
The layer beneath your ERP that most organisations assume is handled
Platforms: SAP RISE (ECS) · AWS · Microsoft Azure · Google Cloud · Oracle Cloud Infrastructure
Deliverable: Infrastructure security baseline report, risk-rated findings, remediation roadmap
Duration: 2–4 weeks | Fixed price after scoping call
What we cover
- Web Application Firewall (WAF) — rules configured and active?
- Security groups and network ACLs — least privilege applied?
- Firewall and FWaaS configuration
- Proxy and Web Dispatcher settings
- Backup immutability and recovery configuration
- Logging and SIEM integration
- Encryption in transit and at rest
SAP specialist?
Our dedicated SAP cybersecurity practice covers S/4HANA, RISE, BTP, IAS/IAG and GRC in depth. Visit sapcyberx.com →
ERP Cyber Assessment
Know exactly where you're exposed — before an attacker does
Platforms: SAP S/4HANA · Oracle Fusion · Microsoft Dynamics 365 · TechnologyOne · NetSuite · Infor · MYOB Acumatica · Pronto Xi
Deliverable: Assessment report, risk register (Critical/High/Medium/Low), 90-day remediation roadmap, executive summary
Duration: 2–3 weeks | Fixed price after scoping call
What we cover
- System hardening and parameter configuration
- User access and authorisation design
- Privileged access management
- Authentication and SSO configuration
- Interface and API security
- Custom code and integration risk
- Patch and vulnerability management maturity
- Audit logging and monitoring coverage
SAP specialist?
Our dedicated SAP cybersecurity practice covers S/4HANA, RISE, BTP, IAS/IAG and GRC in depth. Visit sapcyberx.com →
ERP Penetration Testing
We simulate a real attack — so the real thing doesn't catch you off guard
Platforms: SAP S/4HANA · SAP RISE · Oracle Fusion · Microsoft Dynamics 365 · TechnologyOne · NetSuite
Deliverable: Penetration test report, CVSS-scored findings, remediation guidance, retest available
Duration: 2–4 weeks | Fixed price after scoping call
What we cover
- Application authentication and session management
- Authorisation model — privilege escalation, SoD bypass
- API security — REST, OData, RFC, SOAP
- Custom code and extension vulnerabilities
- Integration security — middleware, ETL, connectors
- Business logic abuse — transaction manipulation
- Identity and access — user enumeration, credential exposure
- Fiori and web interface security
SAP specialist?
Our dedicated SAP cybersecurity practice covers S/4HANA, RISE, BTP, IAS/IAG and GRC in depth. Visit sapcyberx.com →
Security Architecture & IAM Design
Security built in from the start costs a fraction of security remediated after go-live
Platforms: SAP S/4HANA · Oracle Fusion · Microsoft Dynamics 365 · TechnologyOne · Any cloud ERP
Deliverable: Architecture design documents, role design framework, IAM runbook, go-live security checklist
Duration: 4–12 weeks | Fixed price after scoping call
What we cover
- Role and authorisation framework — least-privilege design
- Identity lifecycle — joiner, mover, leaver across HR, directory, ERP
- SSO and MFA architecture — IAS, Entra ID, Okta, Ping
- Privileged and emergency access management
- Segregation of duties framework and conflict matrix
- API and interface security design
- Go-live security readiness review
SAP specialist?
Our dedicated SAP cybersecurity practice covers S/4HANA, RISE, BTP, IAS/IAG and GRC in depth. Visit sapcyberx.com →
AI + ERP Security
You're giving AI access to your most sensitive business data. Who's checking the security?
Platforms: SAP Joule · Microsoft Copilot · Oracle AI Agents · NetSuite AI · Azure OpenAI · AWS Bedrock · Custom LLMs
Deliverable: AI security assessment report, AI identity and access design, risk register
Duration: 2–4 weeks | Fixed price after scoping call
What we cover
- AI agent identity and access — what can the AI see and do in your ERP?
- Least-privilege design for AI service accounts and API connections
- Data exposure mapping — what ERP data flows into AI models?
- Prompt injection risk assessment
- Audit and monitoring for AI-driven activity
- Vendor AI security posture review
- AI integration security architecture
Ready to get started?
Book a free 30-minute scoping call. We'll work out exactly which service fits your situation and give you an indicative scope and price — no obligation.
Book a scoping call →