Listen to the Head of SAP at Sanofi, Frederic Maille, discuss his journey to secure SAP, including how he aligned internal teams, utilized Onapsis to determine the company’s level of risk and took actions to implement a cybersecurity program for this business-critical application. “We are an SAP shop because we have SAP everywhere,” says Maille, “…from the CRM [to the] ERP.” “Onapsis helped me to go fast… when we started to identify that we have to secure our SAP system, we really didn’t know how to start…the first idea was to start to set up a detection part.” Listen to how the Onapsis acquisition of Virtual Forge also enabled Sanofi, a customer of theirs, to improve their ERP cybersecurity and compliance strategy.
About the Author
Virginia Satrom is an experienced marketing leader with a passion for driving growth, engagement, and customer retention. Specializing in digital marketing, content strategy, and brand management, Virginia has successfully led initiatives that amplify brand visibility and foster meaningful connections with target audiences. Her ability to craft compelling narratives and develop data-driven strategies makes her a key player in building impactful marketing campaigns that deliver results.
More about this author
Further Reading
What Is SAP Security? A Definitive Guide for 2025
SAP security is the comprehensive practice of protecting SAP applications, data, and the business processes they support from unauthorized access and cyber threats. Because SAP systems house an organization’s most business-critical information, including financial, customer, and HR data, ensuring that they’re properly secured is of the utmost importance. A strong SAP application security strategy is…
SAP Security Notes: December 2025 Patch Day
SAP Patch Day for December 2025 addresses several critical vulnerabilities across different SAP Applications
Embedded SAP Security vs. Independent Platforms: A Risk-Based Guide
When securing SAP, a debate often arises: is it better to use an “embedded” tool that runs inside SAP or an “independent” platform that runs outside of it? While embedded tools seem convenient, they present significant risks. A truly resilient and effective SAP security strategy requires an independent, external platform. This approach provides superior resilience…
