Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
          Vulnerability management for SAP systems.
        • Defend
          Real-time SAP threat detection & response.
        • Control
          SAP transport analysis & code security.
        • Security Advisor
          AI-powered SAP security guidance.
      • Specialized Solutions
        • Onapsis for SAP BTP
          Purpose-built security for SAP Business Technology Platform.
        • Assess for SAP Success Factors
          Automated security for SAP SuccessFactors HR cloud apps.
        • Premium Add-Ons
          Enhance protection with premium tools & integrations.
      Interactive

      SAP Security & Compliance Evaluation

      Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

      Start Now

      Platform Overview

  • SolutionsExpand
      • By Initiative
        • Accelerate SAP S/4HANA Transformations
          Secure your SAP S/4HANA migration from start to finish.
        • Achieve Automated Compliance
          Automate audits and continuous SAP compliance.
        • Cyber Resilience for RISE with SAP
          Secure your RISE with SAP cloud migration and deployment.
        • Incident Response
          Rapid response and forensics for SAP security breaches.
        • Strengthen DevSecOps
          Shift SAP security left to find flaws in custom ABAP code and BTP.
        • Threat Detection & Response
          Continuous threat monitoring to stop active SAP exploits.
        • Vulnerability Management
          Discover, prioritize, and remediate SAP vulnerabilities.
      • By Industry
        • Automotive Manufacturing
          Protect automotive SAP systems and supply chain data.
        • Financial Services
          Secure banking SAP systems to protect financial data.
        • Food & Beverage Manufacturing
          Secure food manufacturing ERP’s and ensure compliance
        • Government
          Secure public sector SAP systems against advanced threats.
        • Healthcare
          Protect critical healthcare ERP’s and patient data systems.
        • Heavy Manufacturing
          Protect industrial SAP systems and manufacturing uptime.
        • Oil & Gas
          Secure energy sector SAP systems and ensure uptime.
        • Pharmaceuticals
          Secure life science SAP systems, IP, and regulatory compliance.
        • Electric & Utilities
          Defend critical infrastructure and utility SAP systems.
        • Retail Manufacturing
          Secure retail SAP systems and protect supply chain data.
      Webinar

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      Learn how to build cyber resilience during your SAP cloud migration journey.

      Watch Now

  • ResourcesExpand
      • Learn
        • Blog
          Expert insights and industry trends
        • Webinar
          Watch presentations on-demand
        • Videos
          Product demos and tutorials
        • Knowledge Articles
          Educational guides on core SAP security concepts
      • Read
        • Case Studies
          Real-world customer success stories
        • E-Books
          In-depth security guides
        • White Papers
          Research and analysis reports
        • Solution Briefs
          Product capabilities overview
      • Resources
        • Datasheets
          Product specifications
        • Infographics
          Visual data and statistics
        • Threat Reports
          SAP threat landscape analysis
        • The Defenders Digest
          Monthly security newsletter
      Threat Report

      SAP Cyber Attack Compromises Global Manufacturer

      Executive overview of a reported SAP cyber attack that severely impacted business operations.

      Read Now

      View all resources

  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
          Leaders in offensive SAP security research
        • RECON
          Remotely Exploitable Code On NetWeaver
        • CVE-2025-31324 & CVE-2025-42999
          The SAP zero-day that changed everything.
        • C2 Incident on SAP
          Anatomy of a command and control attack
        • CH4TTER
          Threat actors attacking SAP for profit
        • ICMAD
          Internet Communication Manager vulnerabilities
        • P4CHAINS
          P4CHAINS family of vulnerabilities
        • 10KBLAZE
          Critical security configuration risk
      Docuseries

      Hacking & Defending SAP Applications – Live

      We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

      Watch Now

      Subscribe to SAP Security Note Newsletter

  • CompanyExpand
      • Company
        • Leadership
          Meet our executives
        • Recognition
          Awards & accolades
        • Careers
          Join our team
        • News & Press
          View latest announcements
        • Partners
          Our partner ecosystem
        • Giving Back
          OneCares community engagement
        • Events
          Conferences & meetings
        • Contact Us
          Get in Touch
      Solution Brief

      10 Reasons Why More Companies Choose Onapsis

      Discover why leading enterprises tryst Onapsis to secure their most critical business applications

      Read More

  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
Search
  • ERP Security and Compliance: Sarbanes-Oxley (SOX)
    White Papers

    ERP Security and Compliance: Sarbanes-Oxley (SOX)

    This white paper discusses the approach publicly traded companies should be taking to secure their ERP systems and maintain regulatory compliance in regard to SOX. Organizations can define an automated, repeatable method for continually improving and maintaining security and compliance requirements with The Onapsis Platform.

    Read More ERP Security and Compliance: Sarbanes-Oxley (SOX)Continue

  • The Secure Transformation to HANA®
    White Papers

    The Secure Transformation to HANA®

    As many organizations make the move to HANA, whether on-premises or in the cloud, it’s imperative to consider how cybersecurity plays a role in the migration’s success. We created this guide to assist those using the SAP Activate methodology during their transformation and supported each phase with a security component.

    Read More The Secure Transformation to HANA®Continue

  • Onapsis Appoints Gerhard Eschelbeck to Board
    Videos

    Onapsis Appoints Gerhard Eschelbeck to Board

    Onapsis has announced the appointment of former Google Vice President of Security & Privacy Engineering (CISO) Gerhard Eschelbeck to the company’s board of directors.

    Read More Onapsis Appoints Gerhard Eschelbeck to BoardContinue

  • 10KBLAZE Threat Report
    Reports

    10KBLAZE Threat Report

    Based on hundreds of SAP implementation assessments and the proprietary threat intelligence of Onapsis, we estimate these exploits could affect 9 out of 10 SAP systems of more than 50,000 customers worldwide. We recommend you review and apply all relevant SAP security notes immediately.

    Read More 10KBLAZE Threat ReportContinue

  • Why Securing ERP Systems is Critical for CISOs
    Videos

    Why Securing ERP Systems is Critical for CISOs

    Jason Fruge, CISO at Fossil, discusses the importance of securing business-critical ERP systems, such as SAP and Oracle, and how they’ve become a blind spot in the overall IT strategy. Hear his advice on how to overcome the challenge and take on ERP security in your organization.

    Read More Why Securing ERP Systems is Critical for CISOsContinue

  • How ERP Security Enables Audit and Compliance
    Videos

    How ERP Security Enables Audit and Compliance

    Larry Harrington, Former Chair of the Institute of Internal Auditors and Former Chief Audit Executive for Raytheon Company, discusses how ERP security enables the audit and compliance process within organizations, aligning CISOs with the internal audit team and maintaining compliance 24/7.

    Read More How ERP Security Enables Audit and ComplianceContinue

  • CSA ERP Security Survey
    White Papers

    CSA ERP Security Survey

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, has released a survey to give more insights into securely moving ERP applications to the cloud.

    Read More CSA ERP Security SurveyContinue

  • SAP & GDPR: Keeping Your Organization Ahead of the Upcoming EU Law
    White Papers

    SAP & GDPR: Keeping Your Organization Ahead of the Upcoming EU Law

    With the GDPR enforcement date of May 2018 and steep fines of up to 4% of profit or €20 million looming, organizations are still struggling to understand this complicated policy and how they will adhere to it. This guide aims to provide SAP customers an overview of GDPR, how it affects them and how they can begin a plan to become compliant.

    Read More SAP & GDPR: Keeping Your Organization Ahead of the Upcoming EU LawContinue

  • An Introduction to Oracle EBS Application Security
    White Papers

    An Introduction to Oracle EBS Application Security

    Download this publication to become informed with the latest information about current and future risks facing Oracle applications, allowing different actors (financial managers, information security managers, Oracle administrators, auditors, consultants and others) to better understand the techniques and tools available to assess and mitigate them.

    Read More An Introduction to Oracle EBS Application SecurityContinue

Page navigation

Previous PagePrevious 1 … 39 40 41 42 43 44 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
Platform
Solutions
Resources
Threat Research
Company
Go Back
  • Platform
    • Assess
      Vulnerability management for SAP systems.
    • Defend
      Real-time SAP threat detection & response.
    • Control
      SAP transport analysis & code security.
    • Security Advisor
      AI-powered SAP security guidance.
  • Specialized Solutions
    • Onapsis for SAP BTP
      Purpose-built security for SAP Business Technology Platform.
    • Assess for SAP Success Factors
      Automated security for SAP SuccessFactors HR cloud apps.
    • Premium Add-Ons
      Enhance protection with premium tools & integrations.
Interactive

SAP Security & Compliance Evaluation

Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

Start Now

Platform Overview

  • By Initiative
    • Accelerate SAP S/4HANA Transformations
      Secure your SAP S/4HANA migration from start to finish.
    • Achieve Automated Compliance
      Automate audits and continuous SAP compliance.
    • Cyber Resilience for RISE with SAP
      Secure your RISE with SAP cloud migration and deployment.
    • Incident Response
      Rapid response and forensics for SAP security breaches.
    • Strengthen DevSecOps
      Shift SAP security left to find flaws in custom ABAP code and BTP.
    • Threat Detection & Response
      Continuous threat monitoring to stop active SAP exploits.
    • Vulnerability Management
      Discover, prioritize, and remediate SAP vulnerabilities.
  • By Industry
    • Automotive Manufacturing
      Protect automotive SAP systems and supply chain data.
    • Financial Services
      Secure banking SAP systems to protect financial data.
    • Food & Beverage Manufacturing
      Secure food manufacturing ERP’s and ensure compliance
    • Government
      Secure public sector SAP systems against advanced threats.
    • Healthcare
      Protect critical healthcare ERP’s and patient data systems.
    • Heavy Manufacturing
      Protect industrial SAP systems and manufacturing uptime.
    • Oil & Gas
      Secure energy sector SAP systems and ensure uptime.
    • Pharmaceuticals
      Secure life science SAP systems, IP, and regulatory compliance.
    • Electric & Utilities
      Defend critical infrastructure and utility SAP systems.
    • Retail Manufacturing
      Secure retail SAP systems and protect supply chain data.
Webinar

Securing Your Future: Preparing for a Successful SAP RISE Transformation

Learn how to build cyber resilience during your SAP cloud migration journey.

Watch Now

  • Learn
    • Blog
      Expert insights and industry trends
    • Webinar
      Watch presentations on-demand
    • Videos
      Product demos and tutorials
    • Knowledge Articles
      Educational guides on core SAP security concepts
  • Read
    • Case Studies
      Real-world customer success stories
    • E-Books
      In-depth security guides
    • White Papers
      Research and analysis reports
    • Solution Briefs
      Product capabilities overview
  • Resources
    • Datasheets
      Product specifications
    • Infographics
      Visual data and statistics
    • Threat Reports
      SAP threat landscape analysis
    • The Defenders Digest
      Monthly security newsletter
Threat Report

SAP Cyber Attack Compromises Global Manufacturer

Executive overview of a reported SAP cyber attack that severely impacted business operations.

Read Now

View all resources

  • Threat Research
    • Onapsis Research Labs
      Leaders in offensive SAP security research
    • RECON
      Remotely Exploitable Code On NetWeaver
    • CVE-2025-31324 & CVE-2025-42999
      The SAP zero-day that changed everything.
    • C2 Incident on SAP
      Anatomy of a command and control attack
    • CH4TTER
      Threat actors attacking SAP for profit
    • ICMAD
      Internet Communication Manager vulnerabilities
    • P4CHAINS
      P4CHAINS family of vulnerabilities
    • 10KBLAZE
      Critical security configuration risk
Docuseries

Hacking & Defending SAP Applications – Live

We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

Watch Now

Subscribe to SAP Security Note Newsletter

  • Company
    • Leadership
      Meet our executives
    • Recognition
      Awards & accolades
    • Careers
      Join our team
    • News & Press
      View latest announcements
    • Partners
      Our partner ecosystem
    • Giving Back
      OneCares community engagement
    • Events
      Conferences & meetings
    • Contact Us
      Get in Touch
Solution Brief

10 Reasons Why More Companies Choose Onapsis

Discover why leading enterprises tryst Onapsis to secure their most critical business applications

Read More

Customer Portal
Partner Portal

Contact Us