Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
        • Defend
        • Onapsis for SAP BTP
        • Control
        • Assess for SAP Success Factors
        • Security Advisor
        • Premium Add-Ons
      Request a demo
      Onapsis Webinar
      Webinars

      Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management

      WATCH NOW Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management
  • SolutionsExpand
      • Solutions
        • By Initiative
          • Accelerate SAP S/4HANA Transformations
          • Achieve Automated Compliance
          • Building Cyber Resilience for RISE with SAP
          • Incident Response
          • Secure SAP Cloud Migration & Operation
          • Strengthen DevSecOps
          • Strengthen SAP Security for NIS2 Compliance
          • Threat Detection & Response
          • Vulnerability Management
        • By Industry
          • Financial Services
          • Food & Beverage Manufacturing
          • Government
          • Healthcare
          • Heavy Manufacturing
          • Industrial Chemicals
          • Pharmaceuticals
          • Electric & Utilities
          • Oil & Gas
          • Personal Care Manufacturing
          • Retail Manufacturing
      Onapsis Webinar
      Webinars

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      WATCH NOW Securing Your Future: Preparing for a Successful SAP RISE Transformation
  • ResourcesExpand
      • Resources
        • Blog
        • Case Studies
        • Datasheets
        • eBooks
        • Infographics
        • Knowledge Articles
        • Podcasts
        • Publications
        • Security Advisories
        • Solution Briefs
        • Threat Reports
        • Videos
        • Webinars
        • White Papers
      Subscribe To Our Newsletter
      Datasheets

      Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer

      READ NOW Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer
  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
        • CVE-2025-31324 & CVE-2025-42999
        • CH4TTER
        • C2 Incident on SAP
        • P4CHAINS
        • ICMAD
        • RECON
        • 10KBLAZE
      Watch The Defenders Digest
      Onapsis Webinar
      Webinars

      Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)

      WATCH NOW Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)
  • CompanyExpand
      • Company
        • Partners
        • Giving Back
        • Leadership
        • Careers
        • Events
        • News & Press
        • Recognition
        • Contact Us
      Subscribe to Our Newsletter
      Solution Briefs

      10 Reasons Why More Companies Choose Onapsis

      READ MORE 10 Reasons Why More Companies Choose Onapsis
  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
Search
  • Volume XIV: Setup Trusted RFC in SAP GRC
    Publications

    Volume XIV: Setup Trusted RFC in SAP GRC

    In February 2017, SAP released Security Note 2413716 regarding configuration changes to secure Trusted RFC for GRC Access Control (AC) Emergency Access Management (EAM), which was a High Priority note. The EAM module provides SAP GRC AC with the ability to determine how access can be granted in case of an emergency, however, you must…

    Read More Volume XIV: Setup Trusted RFC in SAP GRCContinue

  • MercadoLibre
    Case Studies

    MercadoLibre

    MercadoLibre is the largest e-commerce ecosystem in Latin America. It offers a wide range of services, including marketplace, payments, advertising and e-building solutions. Learn how they were able to secure their SAP systems during digital transformation to the cloud with the Onapsis Security Platform.

    Read More MercadoLibreContinue

  • Volume XIII: SAP HANA System Security Review – Part 2
    Publications

    Volume XIII: SAP HANA System Security Review – Part 2

    SAP HANA is being pushed by SAP as the absolute in-memory database for its products and more recently, as a standalone platform. The vast majority of companies who have already adopted it are leveraging its capabilities to support business-critical applications. Due to its nature, SAP HANA stores an organization’s most important assets, thus requiring large…

    Read More Volume XIII: SAP HANA System Security Review – Part 2Continue

  • Blueprint for CIS Control Application: Securing the SAP Landscape
    White Papers

    Blueprint for CIS Control Application: Securing the SAP Landscape

    Any data breach can be expensive, but the potential cost rises with the value orexploitability of the data targeted in an attack.

    Read More Blueprint for CIS Control Application: Securing the SAP LandscapeContinue

  • The Tip of the Iceberg: Wild Exploitation & Cyberattacks on SAP Business Applications
    Reports

    The Tip of the Iceberg: Wild Exploitation & Cyberattacks on SAP Business Applications

    Understanding the DHS US-CERT Alert on SAP Cybersecurity

    Read More The Tip of the Iceberg: Wild Exploitation & Cyberattacks on SAP Business ApplicationsContinue

  • Onapsis’ Mariano Nunez talks with Richard Stiennon
    Videos

    Onapsis’ Mariano Nunez talks with Richard Stiennon

    Richard Stiennon interview Mariano Nunez, CEO and Co-founder of Onapsis, as part of IT-Harvest’s 2016 Video Interview Series.

    Read More Onapsis’ Mariano Nunez talks with Richard StiennonContinue

  • Volume XII: SAP HANA System Security Review – Part 1
    Publications

    Volume XII: SAP HANA System Security Review – Part 1

    SAP HANA is being pushed by SAP as the absolute in-memory database for its products and more recently as a standalone platform. The vast majority of companies who have already adopted it are leveraging its capabilities to support business-critical applications. Due to its nature, SAP HANA stores an organization’s most important assets, thus requiring large…

    Read More Volume XII: SAP HANA System Security Review – Part 1Continue

  • Volume XI: SAP End-User Tools: The Weakest Link to Sensitive Data
    Publications

    Volume XI: SAP End-User Tools: The Weakest Link to Sensitive Data

    When thinking of SAP security we tend to always think of SAP servers and pay little attention to the tools used by end-users that connect to most of our SAP Systems, as well as the way those tools are used. Outside the SAP security world it is well accepted that attackers are no longer targeting…

    Read More Volume XI: SAP End-User Tools: The Weakest Link to Sensitive DataContinue

  • Volume X: Pivoting Through SAP Systems
    Publications

    Volume X: Pivoting Through SAP Systems

    Every organization running SAP to support its business-critical processes has typically implemented several systems in complex scenarios. Depending on the sizeof the company, the number of SAP Systems, Instances and Products used can be quite large. All of these systems are interconnected and there are different components involved in regards to the connections such as…

    Read More Volume X: Pivoting Through SAP SystemsContinue

Page navigation

Previous PagePrevious 1 … 38 39 40 41 42 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Solutions
    • Solutions Overview
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Industries Overview
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Resources
    • Resources Overview
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • Watch the Defenders Digest
  • Threat Research
    • Threat Research Overview
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
    • 10KBlaze
  • Company
    • Company Overview
    • Become a Partner
    • Giving Back
    • Leadership
    • Careers
    • Events
    • News & Press
    • Contact Us
    • Recognition
Customer Portal
Partner Portal

Contact Us