Inside Our Q1 2026 Feature Release: Empowering Teams with Granular Control and Intelligent Automation

Your security is our priority. This Q1, we’re launching new, high-impact features designed to streamline your SAP cyber defense and provide the industry’s most proactive protection.

At a Glance: Q1 2026 Release Highlights

  • New enhanced customization capabilities to tailor your defense, eliminate manual efforts, and focus efforts on what matters most to your business
  • Next wave of Rapid Controls for Onapsis Defend focused on overly privileged users
  • Extended transport guard with new application security testing for SAP cTMS, enabling  automated and secure transport of custom code

As the only SAP Endorsed App for cybersecurity, Onapsis remains deeply committed to securing the world’s most business-critical landscapes. This Q1, we are doubling down on that mission by launching new, high-impact features designed to bridge the gap between sophisticated threat protection and operational efficiency. From intelligent automation that streamlines compliance to granular controls that allow for a perfectly tailored security posture, our latest innovations ensure your modern SAP environment remains resilient, compliant, and agile in an evolving threat landscape.

To help you stay ahead of evolving threats while reducing manual overhead, our latest release focuses on three key themes: 

  • Expanded Platform Customization: Tailor your defense with granular access controls, flexible out-of-the-box vulnerability scans, and focused event muting to align perfectly with your unique security posture.
  • Proactive Threat Defense: Protect against internal risks with specialized Rapid Controls designed to identify and mitigate overly privileged users.
  • Unified Transport Governance: Streamline compliance and change management through seamless SAP cTMS integration, enforcing automated security guards across your entire transport pipeline

Enhanced Platform Customization in Onapsis Assess and Defend

These customization updates are all about making it easier to tailor Onapsis solutions to fit your needs and were inspired by direct feedback from our customers.  The new features allow you to reduce manual efforts and focus your resources on the high-impact vulnerabilities and threats that truly matter to your specific security posture.

  • Additional access controls for the Onapsis Platform: Enable broader team collaboration within Onapsis solutions, ensuring users have the visibility they need without compromising security or violating least privilege principles.
  • Streamlined vulnerability scan optimization in Assess: We’ve always offered the flexibility of custom scans and checks. Now, we’re making that precision effortless. By modifying baseline policies directly, you can ensure vulnerability scans are laser-focused on your environment without maintenance overhead.
  • Intelligent event tuning in Defend: Allow your team to focus on their efforts on what matters most to your organization and security posture by instantly muting lower priority activities detected in SAP application logs (e.g., known-safe activity on DEV systems).

Proactive Threat Defense – Onapsis Defend Rapid Controls for Over-Privileged Users 

Following the successful Q3 ’25 launch of exploit-based compensating controls, our latest wave of Defend Rapid Controls shifts the focus from external vulnerabilities to internal risk management. While the first phase allowed customers to immediately monitor for exploit activity targeting unpatched vulnerabilities, this new release addresses the risk of over-privileged or “super users”.

When Onapsis Assess identifies highly privileged or default accounts within your landscape, you can now instantly deploy a compensating control in Onapsis Defend to monitor and alert on subsequent, potentially suspicious user activity related to those accounts. For example, if Assess identifies that a default, highly privileged user is active on a system, with the click of a button, you can have Defend start alerting on logins of that user to inform and accelerate incident response. 

Unified Transport Governance – New SAP cTMS Integration for Onapsis Control

Building on our proven transport security for the classic SAP TMS, we are extending our protection to the SAP Business Technology Platform (BTP). This ensures that every change, whether within your on-premises core or on the path to the cloud, is governed by the same rigorous security standards. By providing an enhanced transport guard, Onapsis Control ensures that change management always maintains compliance and system integrity, regardless of which transport service is in use.

This new integration allows for automated security validation directly within SAP cTMS import queues and serves as the foundation for security within SAP Cloud ALM. By scanning ABAP Cloud transports before they are deployed, you can identify and block critical vulnerabilities in real time, preventing risky code from ever reaching your production environments. This proactive approach ensures that your cloud-native developments meet the highest security standards from day one, identifying unauthorized access patterns and compliance violations before they can impact your business.

Availability 

All features mentioned here will reach general availability (GA) by the end of Q1 2026. Exact GA release dates may vary based on product, capabilities, and release cadence. Contact an Onapsis sales representative or authorized systems integrator for pricing and further details.

FAQs

The Onapsis Platform supports a number of platform-level access controls to help you manage your team within the Onapsis interface. These include:

Granular User Roles: Newly enhanced for Q1, these allow you to assign specific permissions so users only see the data and functions necessary for their job.

Segmented Visibility: You can restrict access so that certain team members can only see specific SAP assets or business units, ensuring sensitive data stays in the right hands.

Password policies are one of the most common reasons that we hear from our customers. We’ll use the SAP Security Baseline Template as an example. This is SAP’s officially published framework for defining the minimum security configurations, parameters, etc. required to protect SAP systems from vulnerabilities and threats. 


Many organizations want to align with SAP’s recommendations, and we have an out-of-the-box Assess scan to help them implement the SAP Security Baseline. However, there are times when a company’s internal policy might be different than what is recommended by SAP (e.g., password length, password change interval). In this case, it is extremely helpful for the customer to be able to modify the parameters of the checks within our out-of-the-box scan to match their specific standards. This way they can use one scan and be confident that they are meeting both SAP’s recommendations and, where applicable, their own requirements as well. By modifying the out-of-the-box policy directly, they are able to eliminate ongoing manual maintenance typically required to keep custom scans relevant.

This seamless synergy between Assess and Defend helps address the following scenarios:

The “blind spot” between scheduled scans: While a point-in-time vulnerability scan from Onapsis Assess might show a clean list of privileged users, sophisticated threats often exploit the window between scans, temporarily elevating permissions to perform unauthorized actions before reverting them to avoid detection. Deploying a Rapid Control monitors and alerts on those actions in real time, providing continuous oversight and empowering faster detection and response.

Coverage while you remediate the issue: It can take time to address incorrect user privileges and roles. While your teams work on fixing them, you can use Rapid Controls to alert on any suspicious activity in the meantime. 

Dual-layered approach for ITGC efforts: Validate your compliance posture through Assess while simultaneously being alerted to potential violations via Defend, ensuring your ITGC framework remains robust even against stealthy permission changes that might otherwise go undetected.

As organizations transition to the SAP Business Technology Platform (BTP), the velocity of change increases significantly. Without integrating automated security into this new pipeline, you risk creating a “blind spot” where unverified ABAP Cloud code can bypass traditional controls. By extending your transport guard to cTMS now, you ensure your cloud governance is as mature as your on-premise environment from day one. This Shift Left approach allows you to identify and fix vulnerabilities during the development phase rather than after deployment. By catching risks early, you significantly reduce the time and high costs associated with emergency patches and system downtime, ensuring a faster, more secure path to the cloud.

Under the RISE with SAP shared responsibility model, SAP manages the infrastructure and platform uptime, but the security and compliance of your custom code and configurations remain your responsibility. Even in a managed cloud environment, malicious or poorly written ABAP Cloud code can lead to data breaches or operational outages. Onapsis Control provides the essential “Application Security” layer that RISE doesn’t cover out-of-the-box, ensuring that every change moving through cTMS is automatically vetted against your specific security and compliance policies.