With the new Network Detection Rules Pack, Onapsis Defend customers can harness the power of Onapsis Research Labs' threat intelligence to their network monitoring technologies and gain pre-patch protection for the most critical and network-detectable vulnerabilities in SAP.
Transports can be one of the easiest ways to introduce vulnerabilities, offering bad actors a way to exploit these systems. Learn how application security testing for code and transports helps you find errors and identify them earlier in the development cycle.
Protecting critical data from interconnected risk was SAP’s main motivation for introducing Read Access Logging (RAL). Learn how to use RAL to detect and analyze fraud or data theft to ensure SAP security.
On June 28, a number of our customers contacted us sharing unsolicited emails they received claiming to have knowledge about the existence of “research” describing “zero-day vulnerabilities” (dubbed Sleepy Leopard) in the on-premise software version of the Onapsis Platform. All the claims presented in the anonymous “research” are untrue.
Clean code is code that is easy to understand and follows secure coding best practices to minimize the risk of vulnerabilities. It is critical to scan existing custom-built code to identify and fix vulnerabilities as well as validate the quality. However, without the right tool, creating clean code can be challenging when faced with the overwhelming demand to build new functionality quickly and get it to production as fast as possible.