What is SAP security? This blog provides six things every leader should be doing to secure their SAP environment.
This blog discusses technical considerations in SAP Change and Transport Systems to adhere to audit requirements.
Security is critical for an SAP S/4HANA migration. Here are key actions organizations can take from start to finish to ensure a secure SAP migration.
On August 18, 2022 the US Cybersecurity and Infrastructure Security Agency (CISA) added a critical SAP vulnerability–CVE-2022-22536–to its Known Exploited Vulnerabilities Catalog. Though this vulnerability was discovered earlier this year, this validation from CISA shows that organizations should prioritize action immediately.
Leveraging the NIST Cybersecurity Framework best practices can help teams eliminate blind spots and have a more secure, compliant environment for SAP systems.
The Table Change Logging feature in SAP provides options to track changes to individual tables and simple customized objects. Learn more about The Onapsis Platform for SAP security and how we're supporting SAP customers in monitoring all important aspects of Table Change Logging.
CTO JP Perez-Etchegoyen answers six questions around recent SAP application exploitation activity and shares tips for SAP security and next steps organizations can take to protect their critical systems.
The Australian Government has expanded and deepened cybersecurity obligations for the critical infrastructure sector under the SOCI Act. Here's how organizations can demonstrate compliance with positive security obligations for SAP business applications.
New Network Detection Rule Pack Extends Onapsis Threat Intelligence and Detection to the Network Layer
With the new Network Detection Rules Pack, Onapsis Defend customers can harness the power of Onapsis Research Labs' threat intelligence to their network monitoring technologies and gain pre-patch protection for the most critical and network-detectable vulnerabilities in SAP.