The Onapsis Blog

The world of business-critical application security and compliance is dynamic, with new developments happening on a continuous basis. Read our blog posts for recommendations, insights and observations on the latest news for safeguarding your SAP® and Oracle® applications.

Thumbnail

Onapsis Transport Inspection Capabilities Certified for Deployment on S/4HANA by SAP

On the heels of our recent certification announcement of our code analysis solutions, we are happy to share that another of our capabilities has been certified by SAP. Our transport inspection capabilities joins our HANA and ABAP code analysis solutions as certified for deployment on S4/HANA.
Thumbnail

Ebook: 5 Challenges for CIOs

As modern organizations adapt to the changing technological environment, the Chief Information Officer (CIO) has become a more important role than ever before. In addition to holding responsibility for all IT decisions affecting the company, a task that has increased in complexity since the early days of the internet, the CIO is also now faced with leading an organization through digital transformation.

Thumbnail

Securing Your SAP and Securing the Security of Your SAP

In June 2019, one month after the advisory from US-CERT regarding 10KBlaze, csoonline.com published an interview with Juan Perez-Etchegoyen, CTO of Onapsis, Jonathan Haun, senior director at Enowa LLC, and Gert Schroeter, vice president of security communications at SAP Global Security. In this interview they explained eight of the top most common configuration errors and security failures within enterprise SAP environments.
Thumbnail

TLS: Much More Than a Compliance Requirement

You may have heard about SSL/TLS, especially in 2018 when more widespread Secure Sockets Layer (SSL) adoption pushed by web browsers and PCI council advisory about the future deprecations of early versions of TLS (Transport Layer Security). This is a basic guide what it is, how it works, and why we should implement it in our SAP systems.
Subscribe to SAP Security

Request a
Business Risk Illustration

OPERATIONAL RESILIENCY ASSESSMENT

Prevent application downtime and costly business disruption

Request an Assessment
AUDIT EFFICIENCY ASSESSMENT

Eliminate resource consuming manual audit processes

Request an Assessment
CYBER RISK 
ASSESSMENT

Reduce vulnerabilities and misconfiguration to protect the business

Request an Assessment