Protecting critical data from interconnected risk was SAP’s main motivation for introducing Read Access Logging (RAL). Learn how to use RAL to detect and analyze fraud or data theft to ensure SAP security.
Now is the time to secure your business-critical SAP applications.
Meet Onapsis at Black Hat 2021 for a training session on a complete approach for both Offensive and Defensive of SAP systems.
According to threat intelligence issued by SAP and Onapsis, there’s a critical cybersecurity blind spot impacting how many organizations protect their mission-critical SAP applications. At the same time, it’s clear that threat actors are active, capable, and widespread.
During our recent webinar covering our threat report, we received a lot of great questions from attendees. In this post, we are going to address some of the questions that were asked in the live session.
SAP has released 18 new and updated SAP Security Notes in its March 2021 patch release, including the notes that were released since last patch day. As part of this month’s patch release, there are four HotNews notes and one High Priority note.
SAP has released 20 new and updated SAP Security Notes on February’s Patch Day, including the notes that were released since last Patch Day.
Transaction Types and How to Automate SAP User Information System (SUIM) Queries with The Onapsis Platform
The SAP Security Admin utilizes SUIM in SAP systems manually, one SAP system/client at a time to gather this data for operational use and to report findings internally/externally to Compliance or Audit teams. This can be a time-consuming process.
Anywhere from 2,500 up to potentially 10,000 internet-facing systems were exposed to RECON at the date of the release of the patch. Considering those numbers and that approximately 30% to 40% of the systems could still be vulnerable (based on estimations of diverse samples), that provides an enormous attack surface and risk. Learn more in our blog post here.