Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
          Vulnerability management for SAP systems.
        • Defend
          Real-time SAP threat detection & response.
        • Control
          SAP transport analysis & code security.
        • Security Advisor
          AI-powered SAP security guidance.
      • Specialized Solutions
        • Onapsis for SAP BTP
          Purpose-built security for SAP Business Technology Platform.
        • Assess for SAP Success Factors
          Automated security for SAP SuccessFactors HR cloud apps.
        • Premium Add-Ons
          Enhance protection with premium tools & integrations.
      Interactive

      SAP Security & Compliance Evaluation

      Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

      Start Now

      Platform Overview

  • SolutionsExpand
      • By Initiative
        • Accelerate SAP S/4HANA Transformations
          Secure your SAP S/4HANA migration from start to finish.
        • Achieve Automated Compliance
          Automate audits and continuous SAP compliance.
        • Cyber Resilience for RISE with SAP
          Secure your RISE with SAP cloud migration and deployment.
        • Incident Response
          Rapid response and forensics for SAP security breaches.
        • Strengthen DevSecOps
          Shift SAP security left to find flaws in custom ABAP code and BTP.
        • Threat Detection & Response
          Continuous threat monitoring to stop active SAP exploits.
        • Vulnerability Management
          Discover, prioritize, and remediate SAP vulnerabilities.
      • By Industry
        • Automotive Manufacturing
          Protect automotive SAP systems and supply chain data.
        • Financial Services
          Secure banking SAP systems to protect financial data.
        • Food & Beverage Manufacturing
          Secure food manufacturing ERP’s and ensure compliance
        • Government
          Secure public sector SAP systems against advanced threats.
        • Healthcare
          Protect critical healthcare ERP’s and patient data systems.
        • Heavy Manufacturing
          Protect industrial SAP systems and manufacturing uptime.
        • Oil & Gas
          Secure energy sector SAP systems and ensure uptime.
        • Pharmaceuticals
          Secure life science SAP systems, IP, and regulatory compliance.
        • Electric & Utilities
          Defend critical infrastructure and utility SAP systems.
        • Retail Manufacturing
          Secure retail SAP systems and protect supply chain data.
      Webinar

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      Learn how to build cyber resilience during your SAP cloud migration journey.

      Watch Now

  • ResourcesExpand
      • Learn
        • Blog
          Expert insights and industry trends
        • Webinar
          Watch presentations on-demand
        • Videos
          Product demos and tutorials
        • Knowledge Articles
          Educational guides on core SAP security concepts
      • Read
        • Case Studies
          Real-world customer success stories
        • E-Books
          In-depth security guides
        • White Papers
          Research and analysis reports
        • Solution Briefs
          Product capabilities overview
      • Resources
        • Datasheets
          Product specifications
        • Infographics
          Visual data and statistics
        • Threat Reports
          SAP threat landscape analysis
        • The Defenders Digest
          Monthly security newsletter
      Threat Report

      SAP Cyber Attack Compromises Global Manufacturer

      Executive overview of a reported SAP cyber attack that severely impacted business operations.

      Read Now

      View all resources

  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
          Leaders in offensive SAP security research
        • RECON
          Remotely Exploitable Code On NetWeaver
        • CVE-2025-31324 & CVE-2025-42999
          The SAP zero-day that changed everything.
        • C2 Incident on SAP
          Anatomy of a command and control attack
        • CH4TTER
          Threat actors attacking SAP for profit
        • ICMAD
          Internet Communication Manager vulnerabilities
        • P4CHAINS
          P4CHAINS family of vulnerabilities
        • 10KBLAZE
          Critical security configuration risk
      Docuseries

      Hacking & Defending SAP Applications – Live

      We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

      Watch Now

      Subscribe to SAP Security Note Newsletter

  • CompanyExpand
      • Company
        • Leadership
          Meet our executives
        • Recognition
          Awards & accolades
        • Careers
          Join our team
        • News & Press
          View latest announcements
        • Partners
          Our partner ecosystem
        • Giving Back
          OneCares community engagement
        • Events
          Conferences & meetings
        • Contact Us
          Get in Touch
      Solution Brief

      10 Reasons Why More Companies Choose Onapsis

      Discover why leading enterprises tryst Onapsis to secure their most critical business applications

      Read More

  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
Search
  • How a Canadian Media Giant Passed Its PCI DSS Audit with Automated Code Analysis
    Case Studies

    How a Canadian Media Giant Passed Its PCI DSS Audit with Automated Code Analysis

    This Canadian media corporation company needed to ensure their ABAP code was compliant with PCI DSS requirements and Onapsis provided reports to help them automate this process.

    Read More How a Canadian Media Giant Passed Its PCI DSS Audit with Automated Code AnalysisContinue

  • Large utility company builds SAP vulnerability management program, reduces remediation time by 80%
    Case Studies

    Large utility company builds SAP vulnerability management program, reduces remediation time by 80%

    This large utility company improved their SAP security programs to prepare for their move to S/4HANA and ensure systems are maintained and secure.

    Read More Large utility company builds SAP vulnerability management program, reduces remediation time by 80%Continue

  • Multinational Food Manufacturing Company Case Study
    Case Studies

    Multinational Food Manufacturing Company Case Study

    This multi-national food production company was able to keep their global SAP stable, protected and compliant with security baselines by using Onapsis.

    Read More Multinational Food Manufacturing Company Case StudyContinue

  • Fortune 250 Biotech Case Study
    Case Studies

    Fortune 250 Biotech Case Study

    This biotech company protected its business-critical SAP system by maintaining up-time and security with Onapsis.

    Read More Fortune 250 Biotech Case StudyContinue

  • Why I Joined Onapsis, Dave DeWalt
    Videos

    Why I Joined Onapsis, Dave DeWalt

    Dave DeWalt, Vice Chair of the Onapsis Board of Directors, talks about the urgent need to protect business applications and why he joined Onapsis.

    Read More Why I Joined Onapsis, Dave DeWaltContinue

  • SAPinsider S/4HANA in the Cloud
    White Papers

    SAPinsider S/4HANA in the Cloud

    Read the recent survey from SAPinsider to see how organizations are tackling cloud migrations and S/4HANA.

    Read More SAPinsider S/4HANA in the CloudContinue

  • Automobile Manufacturer increases visibility to proactively manage business risks
    Case Studies

    Automobile Manufacturer increases visibility to proactively manage business risks

    This large automobile manufacturer worked with Onapsis to expand their cybersecurity program to include SAP systems and ensure they were optimized to stay secure and online.

    Read More Automobile Manufacturer increases visibility to proactively manage business risksContinue

  • Global advertising company saves time and money migrating to SAP HANA with Onapsis
    Case Studies

    Global advertising company saves time and money migrating to SAP HANA with Onapsis

    This billion dollar advertising company used Onapsis to enable their migration of SAP ECC to HANA by ensuring security and compliance, resulting in a more stable system.

    Read More Global advertising company saves time and money migrating to SAP HANA with OnapsisContinue

  • Defend by Onapsis
    Datasheets

    Defend by Onapsis

    Continuous threat monitoring for business-critical SAP applications. Customizable research-based alerts, descriptions of root cause, and remediation guidance accelerate analysis and incident response.

    Read More Defend by OnapsisContinue

Page navigation

Previous PagePrevious 1 … 37 38 39 40 41 … 44 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
Platform
Solutions
Resources
Threat Research
Company
Go Back
  • Platform
    • Assess
      Vulnerability management for SAP systems.
    • Defend
      Real-time SAP threat detection & response.
    • Control
      SAP transport analysis & code security.
    • Security Advisor
      AI-powered SAP security guidance.
  • Specialized Solutions
    • Onapsis for SAP BTP
      Purpose-built security for SAP Business Technology Platform.
    • Assess for SAP Success Factors
      Automated security for SAP SuccessFactors HR cloud apps.
    • Premium Add-Ons
      Enhance protection with premium tools & integrations.
Interactive

SAP Security & Compliance Evaluation

Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

Start Now

Platform Overview

  • By Initiative
    • Accelerate SAP S/4HANA Transformations
      Secure your SAP S/4HANA migration from start to finish.
    • Achieve Automated Compliance
      Automate audits and continuous SAP compliance.
    • Cyber Resilience for RISE with SAP
      Secure your RISE with SAP cloud migration and deployment.
    • Incident Response
      Rapid response and forensics for SAP security breaches.
    • Strengthen DevSecOps
      Shift SAP security left to find flaws in custom ABAP code and BTP.
    • Threat Detection & Response
      Continuous threat monitoring to stop active SAP exploits.
    • Vulnerability Management
      Discover, prioritize, and remediate SAP vulnerabilities.
  • By Industry
    • Automotive Manufacturing
      Protect automotive SAP systems and supply chain data.
    • Financial Services
      Secure banking SAP systems to protect financial data.
    • Food & Beverage Manufacturing
      Secure food manufacturing ERP’s and ensure compliance
    • Government
      Secure public sector SAP systems against advanced threats.
    • Healthcare
      Protect critical healthcare ERP’s and patient data systems.
    • Heavy Manufacturing
      Protect industrial SAP systems and manufacturing uptime.
    • Oil & Gas
      Secure energy sector SAP systems and ensure uptime.
    • Pharmaceuticals
      Secure life science SAP systems, IP, and regulatory compliance.
    • Electric & Utilities
      Defend critical infrastructure and utility SAP systems.
    • Retail Manufacturing
      Secure retail SAP systems and protect supply chain data.
Webinar

Securing Your Future: Preparing for a Successful SAP RISE Transformation

Learn how to build cyber resilience during your SAP cloud migration journey.

Watch Now

  • Learn
    • Blog
      Expert insights and industry trends
    • Webinar
      Watch presentations on-demand
    • Videos
      Product demos and tutorials
    • Knowledge Articles
      Educational guides on core SAP security concepts
  • Read
    • Case Studies
      Real-world customer success stories
    • E-Books
      In-depth security guides
    • White Papers
      Research and analysis reports
    • Solution Briefs
      Product capabilities overview
  • Resources
    • Datasheets
      Product specifications
    • Infographics
      Visual data and statistics
    • Threat Reports
      SAP threat landscape analysis
    • The Defenders Digest
      Monthly security newsletter
Threat Report

SAP Cyber Attack Compromises Global Manufacturer

Executive overview of a reported SAP cyber attack that severely impacted business operations.

Read Now

View all resources

  • Threat Research
    • Onapsis Research Labs
      Leaders in offensive SAP security research
    • RECON
      Remotely Exploitable Code On NetWeaver
    • CVE-2025-31324 & CVE-2025-42999
      The SAP zero-day that changed everything.
    • C2 Incident on SAP
      Anatomy of a command and control attack
    • CH4TTER
      Threat actors attacking SAP for profit
    • ICMAD
      Internet Communication Manager vulnerabilities
    • P4CHAINS
      P4CHAINS family of vulnerabilities
    • 10KBLAZE
      Critical security configuration risk
Docuseries

Hacking & Defending SAP Applications – Live

We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

Watch Now

Subscribe to SAP Security Note Newsletter

  • Company
    • Leadership
      Meet our executives
    • Recognition
      Awards & accolades
    • Careers
      Join our team
    • News & Press
      View latest announcements
    • Partners
      Our partner ecosystem
    • Giving Back
      OneCares community engagement
    • Events
      Conferences & meetings
    • Contact Us
      Get in Touch
Solution Brief

10 Reasons Why More Companies Choose Onapsis

Discover why leading enterprises tryst Onapsis to secure their most critical business applications

Read More

Customer Portal
Partner Portal

Contact Us