The State of Enterprise Resource Planning Security in the Cloud
This white paper aims to help organizations develop best practices to secure their ERP (and other business-critical applications) when undergoing complex cloud migrations.
This white paper aims to help organizations develop best practices to secure their ERP (and other business-critical applications) when undergoing complex cloud migrations.
In February 2017, SAP released Security Note 2413716 regarding configuration changes to secure Trusted RFC for GRC Access Control (AC) Emergency Access Management (EAM), which was a High Priority note. The EAM module provides SAP GRC AC with the ability to determine how access can be granted in case of an emergency, however, you must…
MercadoLibre is the largest e-commerce ecosystem in Latin America. It offers a wide range of services, including marketplace, payments, advertising and e-building solutions. Learn how they were able to secure their SAP systems during digital transformation to the cloud with the Onapsis Security Platform.
SAP HANA is being pushed by SAP as the absolute in-memory database for its products and more recently, as a standalone platform. The vast majority of companies who have already adopted it are leveraging its capabilities to support business-critical applications. Due to its nature, SAP HANA stores an organization’s most important assets, thus requiring large…
Any data breach can be expensive, but the potential cost rises with the value orexploitability of the data targeted in an attack.
Understanding the DHS US-CERT Alert on SAP Cybersecurity
Richard Stiennon interview Mariano Nunez, CEO and Co-founder of Onapsis, as part of IT-Harvest’s 2016 Video Interview Series.
SAP HANA is being pushed by SAP as the absolute in-memory database for its products and more recently as a standalone platform. The vast majority of companies who have already adopted it are leveraging its capabilities to support business-critical applications. Due to its nature, SAP HANA stores an organization’s most important assets, thus requiring large…
When thinking of SAP security we tend to always think of SAP servers and pay little attention to the tools used by end-users that connect to most of our SAP Systems, as well as the way those tools are used. Outside the SAP security world it is well accepted that attackers are no longer targeting…