Protecting critical data from interconnected risk was SAP’s main motivation for introducing Read Access Logging (RAL). Learn how to use RAL to detect and analyze fraud or data theft to ensure SAP security.
Anonymous Claims Regarding The Security of The Onapsis Platform
On June 28, a number of our customers contacted us sharing unsolicited emails they received claiming to have knowledge about the existence of “research” describing “zero-day vulnerabilities” (dubbed Sleepy Leopard) in the on-premise software version of the Onapsis Platform. All the claims presented in the anonymous “research” are untrue.
Why You Need Application Security Testing for Business-Critical Applications: Part 3
Clean code is code that is easy to understand and follows secure coding best practices to minimize the risk of vulnerabilities. It is critical to scan existing custom-built code to identify and fix vulnerabilities as well as validate the quality. However, without the right tool, creating clean code can be challenging when faced with the overwhelming demand to build new functionality quickly and get it to production as fast as possible.
Four Ways The Onapsis Platform Can Help Mitigate Security Risk During an ERP Cloud Migration
There is no doubt that moving an ERP system to the cloud is a massively complex project for any organization. This blog offers a few tips on how to manage and mitigate the risks from start to finish to help ensure a successful migration and how The Onapsis Platform can help.
SAP Security Patch Day June 2022: Improper Access Control
In SAP's June Patch Day, there are 17 new and updated security patches. The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) also lists three well known vulnerabilities.