Subscribe to our newsletter and stay informed

Check out our list of top companies

Check out our carefully compiled lists of the most relevant and impactful companies within their fields.

Check out our list of top unicorns

Read and learn about the biggest companies that various countries have produced, how they made it, and what the future looks like for them.
May 10, 2023

Rev-Trac and Turnkey Consulting Team Up to Tackle SAP Cyber-Attacks

The partnership offers enhanced security tools and expertise to SAP-using organizations, helping reduce risk and ensure compliance

Rev-Trac, a leading provider of SAP change management and DevOps orchestration, has joined forces with Turnkey Consulting, a global risk management consultancy, to combat the growing threat of cyber-attacks on the SAP application layer.

This strategic partnership aims to help SAP-using organizations reduce risk exposure and manage user access more effectively by providing enhanced tools and expertise to secure their business-critical applications. As per the agreement, Turnkey will offer Rev-Trac Platinum to its customers, allowing them to build advanced security and GRC practices into the SAP change management process.

Rev-Trac Platinum is an automated SAP change control platform that enables organizations to significantly reduce risk and guarantee compliance, thereby preventing harm to the production system. Users can collaborate and establish workflows and practices to overcome the challenges of delivering secure application changes and development projects for SAP.

Founded in 2004, Turnkey Consulting specializes in risk and security, providing information security solutions for systems running complex ERP and business-critical solutions. With a global presence, the company works with service providers, audit partners, blue-chip companies, government agencies, and systems integrators to deliver specialized services around risk, security, and identity management.

The partnership comes at a time when the ERP industry is undergoing a significant transformation due to the rapid acceleration of digital and cloud technologies. As a result, organizations must rethink their approach to cybersecurity, unauthorized access, and other vulnerabilities, and integrate security practices into the development process to avoid code vulnerabilities migrating to production.

Elitsa Kaleva
Elitsa Kaleva
Content Writer at TechNews180
Back to top

Related articles

chevron-down linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram