Bei Onapsis sind wir nicht nur führend im Bereich Lösungen - wir sind auch Vordenker. Hier finden Sie eine wachsende Bibliothek von Materialien, die Ihnen beim Aufbau Ihrer Cyber-Resilienz-Strategie helfen. Je mehr Transparenz wir zum Thema Sicherheit und Einhaltung geschäftskritischer Anwendungen schaffen können, desto besser können Sie Ihr Unternehmen zuversichtlich voranbringen.

Understanding and Securing Critical SAP Configuration Issue

Date: Tuesday, May 8th Time: 2pm ET

The Onapsis Research Labs has discovered a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a full system compromise. If exploited the impact could be full control of the system by hackers, putting business-critical ERP, HR, PII, Finance, and Supply Chain data and processes at risk. The vulnerability, mainly driven by a security configuration documented by SAP originally in 2005, is still present in the majority of SAP implementations, either from neglecting to apply security configurations or due to configuration drifts after the configuration was secured.

Download the Onapsis Threat Report now to learn more


Attend this webcast with the Onapsis experts to learn

  • If your SAP Landscape is vulnerable to this critical configuration
  • How to securely configure this so your organization is protected
  • Key reasons that systems suffer from configuration drift after secure configurations were implemented
  • Next steps to ensure your organization is protected from insecure configurations