2023 Wrapped: Most Viewed Blogs of 2023
It’s hard to believe that 2023 is over and we are helping our customers plan their 2024 SAP security strategies. As we continue to see an increase in threat activity targeting ERP applications, we know taking a look back can help us plan for the future. In light of this, we have pulled together our most viewed blogs from 2023 below to help you prepare for the new year:
3x’s the Reason to Celebrate: Onapsis Named to Inc. 5000 List for Third Year in a Row
In August 2023, we announced that Onapsis made the Inc. 5000 list for the third year in a row. The Inc. 5000 list is one of the most prestigious industry awards, representing a unique look at the most successful and fastest growing companies in the United States.
The Only ERP-focused Solution in Gartner’s Application Security Magic Quadrant, 3 years in a row!
Onapsis has once again been recognized in the Gartner® Magic Quadrant™ for Application Security Testing, making this the third consecutive year in a row. This repeated recognition by Gartner is a testament to not only the commitment and hard work of our product and engineering teams but also to the trust placed in us by our customers.
Better Together: A New Strategic Partnership Between Onapsis & SAP
We are thrilled to announce a new strategic partnership with SAP to address these challenges, building on more than a decade of strong collaboration on technology and cybersecurity research between our firms. Through this new partnership, the Onapsis Platform becomes the first and only cybersecurity and compliance solution endorsed by SAP, immediately available as an SAP Endorsed App on the SAP Store.
SAP Patch Day: September 2023
SAP has published eighteen new and updated Security Notes on its September Patch Day (including the notes that were released or updated since last Patch Tuesday.) This includes five HotNews Notes and two High Priority Notes.
On April 11, 2023, as part of the regular cadence of security patches, SAP released the patch for another security vulnerability identified by Pablo Artuso, part of Onapsis Research Labs, CVE-2023-28761. It may seem like business as usual in terms of security patches but let me explain why I believe it is not.