Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
          Vulnerability management for SAP systems.
        • Defend
          Real-time SAP threat detection & response.
        • Control
          SAP transport analysis & code security.
        • Security Advisor
          AI-powered SAP security guidance.
      • Specialized Solutions
        • Onapsis for SAP BTP
          Purpose-built security for SAP Business Technology Platform.
        • Assess for SAP Success Factors
          Automated security for SAP SuccessFactors HR cloud apps.
        • Premium Add-Ons
          Enhance protection with premium tools & integrations.
      Interactive

      SAP Security & Compliance Evaluation

      Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

      Start Now

      Platform Overview

  • SolutionsExpand
      • By Initiative
        • Accelerate SAP S/4HANA Transformations
          Secure your SAP S/4HANA migration from start to finish.
        • Achieve Automated Compliance
          Automate audits and continuous SAP compliance.
        • Cyber Resilience for RISE with SAP
          Secure your RISE with SAP cloud migration and deployment.
        • Incident Response
          Rapid response and forensics for SAP security breaches.
        • Strengthen DevSecOps
          Shift SAP security left to find flaws in custom ABAP code and BTP.
        • Threat Detection & Response
          Continuous threat monitoring to stop active SAP exploits.
        • Vulnerability Management
          Discover, prioritize, and remediate SAP vulnerabilities.
      • By Industry
        • Automotive Manufacturing
          Protect automotive SAP systems and supply chain data.
        • Financial Services
          Secure banking SAP systems to protect financial data.
        • Food & Beverage Manufacturing
          Secure food manufacturing ERP’s and ensure compliance
        • Government
          Secure public sector SAP systems against advanced threats.
        • Healthcare
          Protect critical healthcare ERP’s and patient data systems.
        • Heavy Manufacturing
          Protect industrial SAP systems and manufacturing uptime.
        • Oil & Gas
          Secure energy sector SAP systems and ensure uptime.
        • Pharmaceuticals
          Secure life science SAP systems, IP, and regulatory compliance.
        • Electric & Utilities
          Defend critical infrastructure and utility SAP systems.
        • Retail Manufacturing
          Secure retail SAP systems and protect supply chain data.
      Webinar

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      Learn how to build cyber resilience during your SAP cloud migration journey.

      Watch Now

  • ResourcesExpand
      • Learn
        • Blog
          Expert insights and industry trends
        • Webinar
          Watch presentations on-demand
        • Videos
          Product demos and tutorials
        • Knowledge Articles
          Educational guides on core SAP security concepts
      • Read
        • Case Studies
          Real-world customer success stories
        • E-Books
          In-depth security guides
        • White Papers
          Research and analysis reports
        • Solution Briefs
          Product capabilities overview
      • Resources
        • Datasheets
          Product specifications
        • Infographics
          Visual data and statistics
        • Threat Reports
          SAP threat landscape analysis
        • The Defenders Digest
          Monthly security newsletter
      Threat Report

      SAP Cyber Attack Compromises Global Manufacturer

      Executive overview of a reported SAP cyber attack that severely impacted business operations.

      Read Now

      View all resources

  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
          Leaders in offensive SAP security research
        • RECON
          Remotely Exploitable Code On NetWeaver
        • CVE-2025-31324 & CVE-2025-42999
          The SAP zero-day that changed everything.
        • C2 Incident on SAP
          Anatomy of a command and control attack
        • CH4TTER
          Threat actors attacking SAP for profit
        • ICMAD
          Internet Communication Manager vulnerabilities
        • P4CHAINS
          P4CHAINS family of vulnerabilities
        • 10KBLAZE
          Critical security configuration risk
      Docuseries

      Hacking & Defending SAP Applications – Live

      We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

      Watch Now

      Subscribe to SAP Security Note Newsletter

  • CompanyExpand
      • Company
        • Leadership
          Meet our executives
        • Recognition
          Awards & accolades
        • Careers
          Join our team
        • News & Press
          View latest announcements
        • Partners
          Our partner ecosystem
        • Giving Back
          OneCares community engagement
        • Events
          Conferences & meetings
        • Contact Us
          Get in Touch
      Solution Brief

      10 Reasons Why More Companies Choose Onapsis

      Discover why leading enterprises tryst Onapsis to secure their most critical business applications

      Read More

  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
Search
  • Assess by Onapsis
    Datasheets

    Assess by Onapsis

    Vulnerability management for business-critical applications such as SAP and Oracle, including deep visibility into the entire application landscape, automated assessments with detailed solutions and descriptions of associated risk and business impact.

    Read More Assess by OnapsisContinue

  • 5 HERAUSFORDERUNGEN FÜR DEN CIO
    E-Books

    5 HERAUSFORDERUNGEN FÜR DEN CIO

    The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity in recent years. This e-book reviews five challenges CIOs face when dealing with SAP security, including recommendations for overcoming these challenges.

    Read More 5 HERAUSFORDERUNGEN FÜR DEN CIOContinue

  • United States Department of Defense saves time, increases ABAP code quality, and proves it meets DoD standards with Onapsis
    Case Studies

    United States Department of Defense saves time, increases ABAP code quality, and proves it meets DoD standards with Onapsis

    The US Department of Defense (DOD) Health Agency needed to prove the ABAP code for their SAP-based logistics system was secure and met strict DOD Authority to Operate (ATO) standards.
    Discover how Onapsis code analysis enabled the DOD to prove its ABAP code met these standards, while also saving developers significant time compared to manual analysis and improving overall code quality.

    Read More United States Department of Defense saves time, increases ABAP code quality, and proves it meets DoD standards with OnapsisContinue

  • ERP Security: The Reality of Business Critical Application Protection
    Infographics

    ERP Security: The Reality of Business Critical Application Protection

    IDC survey of 430 IT decision makers reveals 64% have reported a breach in their SAP or Oracle E-Business Suite (EBS) systems in the past 24 months.

    Read More ERP Security: The Reality of Business Critical Application ProtectionContinue

  • Maintaining the Security Posture of Oracle E-Business Suite and Other business critical applications
    White Papers

    Maintaining the Security Posture of Oracle E-Business Suite and Other business critical applications

    Onapsis has worked together with the Oracle E-Business Suite (EBS) security team to jointly produce a new white paper about Oracle EBS security.

    Read More Maintaining the Security Posture of Oracle E-Business Suite and Other business critical applicationsContinue

  • Top 20 Critical Controls for Cloud ERP Customers
    White Papers

    Top 20 Critical Controls for Cloud ERP Customers

    Cloud technologies are being increasingly adopted by organizations, regardless of their size, location or industry.

    Read More Top 20 Critical Controls for Cloud ERP CustomersContinue

  • Why is Protecting ERP Critical to Businesses?
    Videos

    Why is Protecting ERP Critical to Businesses?

    Hear from Mariano Nunez, CEO, Onapsis, about how Onapsis is helping organizations protect their business-critical ERP systems and why it’s critical for success.

    Read More Why is Protecting ERP Critical to Businesses?Continue

  • How Secure Are Your Custom SAP Implementations?
    Videos

    How Secure Are Your Custom SAP Implementations?

    Frederik Weidemann, Chief Evangelist for Onapsis (formerly of Virtual Forge) talks about value of CodeProfiler and the ability to scan custom code to identify vulnerabilities in SAP.

    Read More How Secure Are Your Custom SAP Implementations?Continue

  • A Security-by-Design Approach to Protecting Your Business-Critical Applications
    White Papers

    A Security-by-Design Approach to Protecting Your Business-Critical Applications

    Attacks against ERP systems have seen a rise in the recent decade and traditional security approaches don’t do enough to secure the ERP layer. This white paper reviews the challenges organizations face when securing these business-critical applications and how to implement a successful security program.

    Read More A Security-by-Design Approach to Protecting Your Business-Critical ApplicationsContinue

Page navigation

Previous PagePrevious 1 … 38 39 40 41 42 … 44 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
Platform
Solutions
Resources
Threat Research
Company
Go Back
  • Platform
    • Assess
      Vulnerability management for SAP systems.
    • Defend
      Real-time SAP threat detection & response.
    • Control
      SAP transport analysis & code security.
    • Security Advisor
      AI-powered SAP security guidance.
  • Specialized Solutions
    • Onapsis for SAP BTP
      Purpose-built security for SAP Business Technology Platform.
    • Assess for SAP Success Factors
      Automated security for SAP SuccessFactors HR cloud apps.
    • Premium Add-Ons
      Enhance protection with premium tools & integrations.
Interactive

SAP Security & Compliance Evaluation

Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

Start Now

Platform Overview

  • By Initiative
    • Accelerate SAP S/4HANA Transformations
      Secure your SAP S/4HANA migration from start to finish.
    • Achieve Automated Compliance
      Automate audits and continuous SAP compliance.
    • Cyber Resilience for RISE with SAP
      Secure your RISE with SAP cloud migration and deployment.
    • Incident Response
      Rapid response and forensics for SAP security breaches.
    • Strengthen DevSecOps
      Shift SAP security left to find flaws in custom ABAP code and BTP.
    • Threat Detection & Response
      Continuous threat monitoring to stop active SAP exploits.
    • Vulnerability Management
      Discover, prioritize, and remediate SAP vulnerabilities.
  • By Industry
    • Automotive Manufacturing
      Protect automotive SAP systems and supply chain data.
    • Financial Services
      Secure banking SAP systems to protect financial data.
    • Food & Beverage Manufacturing
      Secure food manufacturing ERP’s and ensure compliance
    • Government
      Secure public sector SAP systems against advanced threats.
    • Healthcare
      Protect critical healthcare ERP’s and patient data systems.
    • Heavy Manufacturing
      Protect industrial SAP systems and manufacturing uptime.
    • Oil & Gas
      Secure energy sector SAP systems and ensure uptime.
    • Pharmaceuticals
      Secure life science SAP systems, IP, and regulatory compliance.
    • Electric & Utilities
      Defend critical infrastructure and utility SAP systems.
    • Retail Manufacturing
      Secure retail SAP systems and protect supply chain data.
Webinar

Securing Your Future: Preparing for a Successful SAP RISE Transformation

Learn how to build cyber resilience during your SAP cloud migration journey.

Watch Now

  • Learn
    • Blog
      Expert insights and industry trends
    • Webinar
      Watch presentations on-demand
    • Videos
      Product demos and tutorials
    • Knowledge Articles
      Educational guides on core SAP security concepts
  • Read
    • Case Studies
      Real-world customer success stories
    • E-Books
      In-depth security guides
    • White Papers
      Research and analysis reports
    • Solution Briefs
      Product capabilities overview
  • Resources
    • Datasheets
      Product specifications
    • Infographics
      Visual data and statistics
    • Threat Reports
      SAP threat landscape analysis
    • The Defenders Digest
      Monthly security newsletter
Threat Report

SAP Cyber Attack Compromises Global Manufacturer

Executive overview of a reported SAP cyber attack that severely impacted business operations.

Read Now

View all resources

  • Threat Research
    • Onapsis Research Labs
      Leaders in offensive SAP security research
    • RECON
      Remotely Exploitable Code On NetWeaver
    • CVE-2025-31324 & CVE-2025-42999
      The SAP zero-day that changed everything.
    • C2 Incident on SAP
      Anatomy of a command and control attack
    • CH4TTER
      Threat actors attacking SAP for profit
    • ICMAD
      Internet Communication Manager vulnerabilities
    • P4CHAINS
      P4CHAINS family of vulnerabilities
    • 10KBLAZE
      Critical security configuration risk
Docuseries

Hacking & Defending SAP Applications – Live

We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

Watch Now

Subscribe to SAP Security Note Newsletter

  • Company
    • Leadership
      Meet our executives
    • Recognition
      Awards & accolades
    • Careers
      Join our team
    • News & Press
      View latest announcements
    • Partners
      Our partner ecosystem
    • Giving Back
      OneCares community engagement
    • Events
      Conferences & meetings
    • Contact Us
      Get in Touch
Solution Brief

10 Reasons Why More Companies Choose Onapsis

Discover why leading enterprises tryst Onapsis to secure their most critical business applications

Read More

Customer Portal
Partner Portal

Contact Us