Join us for a discussion on how security minded organizations can best tailor their practices to meet NIS2 requirements.


This discussion will provide a comprehensive overview of how NIS2 differs from the original NIS Directive and what these changes mean for organizations relying on SAP systems. Organizations across the EU are going to be impacted when NIS2 goes into effect and need to be aware of the impact it will have on SAP system landscape.

Patch Tuesdays

September’s Patch Tuesday is Here!


SAP has published nineteen new and updated SAP Security Notes in its September Patch Day, including updates to one HotNews Note and one High Priority Note. A significant number of the SAP Security Notes patches are Missing Authorization Check vulnerabilities in RFC-enabled function modules. Check out our blog for more information.

Maximizing Application Security in RISE with SAP


Enhancing your SAP application security during a RISE with SAP migration is a shared responsibility. We’ve teamed up with SAP and Deloitte to provide users with a clear understanding of your application security responsibilities. Join our webinar to witness firsthand the synergy between SAP, Onapsis, and Deloitte and how this relationship helps clients enhance overall application security. Attendees will walk away with practical, actionable strategies for implementation to ensure your enterprise-wide SAP application security framework is up to par within your organization.

Webinar
Defenders Digest

The Newest Defenders Digest has Arrived


Paul & JP are back to walk through September’s Patch Tuesday findings. They also have some details to share around new blog posts from our Onapsis Research Labs team.

Securing SAP Remote Function Calls: The Crucial Role of S_ICF Authorization


In SAP landscapes, securing Remote Function Call (RFC) destinations is crucial to prevent lateral movement attacks. A key strategy involves using the S_ICF authorization object to restrict access to RFC destinations based on user privileges. By assigning RFC destinations to authorization groups, organizations can add an extra layer of security, preventing unauthorized access to critical systems. Check out our most recent blog to learn how S_ICF plays a vital role in mitigating RFC hopping and securing your SAP environment.

Blog
Report

Dig into the Anatomy of a Command and Control Attack


Onapsis Research Labs routinely runs penetration tests to track and monitor both existing and new threats to the ERP ecosystem. During one of their recent tests, they witnessed an attack carry out a command and control attack in under 20 minutes. Our team took this incident and created a report to detail the anatomy of the attack and provide analysis, findings, and recommendations for safeguarding your SAP application landscape.

New Study: ERP Security in the Age of Ransomware


A recent study of 500 cybersecurity practitioners shows that ransomware is hitting harder than ever. While this isn’t surprising to defenders, we did find some noteworthy trends as it applies to ERP systems:

  • 46% of enterprises faced four or more attacks last year. And 89% of those attacks impacted ERP systems.
  • Can your business afford 24 hours of downtime? That’s what 61% of companies experienced after an attack.
Infographic

Get Systems Cloud-Ready and Keep Them Protected

Need to simplify your SAP and Oracle cloud migration?  We secure and ensure compliance for your critical systems before and during the move, minimizing risks and delays. Once in the cloud, we help you maintain strong security and compliance, keeping your systems safe and optimized.

Upcoming Events

Discover more about the SAP security from the Onapsis team during our in-person and virtual events.