Part one of our blog series, Dangers in Transport Management, discusses circumventing Authority Checks.
SAP Security
SAP Change and Transport System
For SAP Transports - What you see is (NOT ALWAYS) what you get.
Dangers in SAP Transport Management An Intro
Across industries, organizations implement software solutions, IT controls, policies and procedures to secure their mission-critical applications. While dev, test and QA systems are not ignored, they are not always treated as equal.
Case Study: Multinational Chemical Company
A large, multi-national chemical company relies on SAP to support their mission-critical applications. While optimizing and maintaining these applications is critical t to business operations, the organization struggled to implement these changes without impacting system performance or introducing security or compliance problems.
DevOps + Security = DevSecOps
More and more companies are promoting close cooperation between development and operations to accelerate the delivery of high-quality software. But the fast DevOps environment requires an integrated security approach, bringing us DevSecOps.
Transaction Types and How to Automate SAP User Information System (SUIM) Queries with The Onapsis Platform
The SAP Security Admin utilizes SUIM in SAP systems manually, one SAP system/client at a time to gather this data for operational use and to report findings internally/externally to Compliance or Audit teams. This can be a time-consuming process.
Active Exploitation of the RECON Vulnerability
Threat actors are targeting SAP applications through scanning, exploiting and compromising systems vulnerable to RECON. It is expected that most unpatched internet-facing SAP applications have been already exploited and potentially compromised. Act now to protect your mission-critical applications!
Why the RECON Vulnerability Is a Before and After for SAP Cybersecurity Introduction
Anywhere from 2,500 up to potentially 10,000 internet-facing systems were exposed to RECON at the date of the release of the patch. Considering those numbers and that approximately 30% to 40% of the systems could still be vulnerable (based on estimations of diverse samples), that provides an enormous attack surface and risk. Learn more in our blog post here.
Why Our New Partnership With SAP Establishes Onapsis as the Standard for Mission-Critical Application Cybersecurity and Compliance
I am very excited to announce a new partnership with SAP that helps all SAP customers protect their business-critical information and processes, and enables them to securely accelerate their journeys to become intelligent enterprises at a much needed time.
10 Recommendations for Better ABAP
ABAP stands for Advanced Business Application Programming (originally german, Allgemeiner Berichts-Aufbereitungs-Prozessor) and is SAP’s proprietary programming language. ABAP was invented in the late 80s, and 35 years and millions of lines of code later, it’s still here!