Fireside Chat with Turnkey & Onapsis

From Threat to Defense: Understanding Ransomware

Join us for an interactive fireside chat with our partner Turnkey, where industry experts will delve into the ever-evolving threat of ransomware and its impact on business-critical applications. Attendees will walk away with expert insights, actionable defense strategies and get to question the experts live during a Q&A session.

Securing SAProuter

Securing SAProuter: How to Get More Complete Protection for This Critical SAP Asset


More organizations are responding to the elevated SAP threat landscape by turning their attention to hardening their SAP applications and investing in improving their SAP security postures. This applies not only to “traditional” assets across the SAP tech stack (ABAP, HANA, JAVA), but also specific applications, such as SAP SuccessFactors, SAP BTP, and SAProuter. Learn more about how to secure SAProuter in our most recent blog!

Patch Tuesday


June’s Patch Tuesday analysis is here! Highlights include:

  •  Twelve new and updated SAP security patches released, including two High Priority Notes
  • SAP High Priority Notes — SAP NetWeaver AS Java and SAP Financial Consolidation affected
  • Onapsis Research Labs Contribution — Our team supported SAP in patching 50% of all new SAP Security Notes in June
Patch Tuesdays
Defenders Digest

Defenders Digest Episode 10


Check out the latest episode to explore:

  • Patch Tuesday updates: Onapsis Research Labs was involved with a few of the latest patches in May.
  • The FCC has named its first officially designated robocall threat actor, “Royal Tiger”.

Discover the Power and Vulnerabilities of Your SAP System


Your SAP system is the powerhouse of your enterprise, much like a mighty fortress in space (rhymes with “Smeath Shtar”). But even the strongest defenses can have a fatal flaw, vulnerable to a single shot (just ask Luke). Join us for a session with Onapsis’ Jon Cooper and SAP’s Bo Baade-Pedersen on identifying and mitigating these critical weaknesses to protect against cyber threats. Don’t miss this opportunity to enhance your cybersecurity protocols and leave with a robust action plan. Strengthen your defenses today!

Discover the Power and Vulnerabilities of Your SAP System

Do you have Control over your Code?


Did you know that the average customer’s SAP system contains two million lines of custom code?
Onapsis research has found a critical security issue, as well as a critical performance issue, within every thousand lines of code. This translates to roughly 4,000 critical issues per system potentially introducing risk and business disruption. Onapsis Control eliminates the need for manual code reviews, scanning millions of lines of code within minutes. Control provides you and your team with peace of mind, scanning code as you go and automating fixes for common issues. With a reduction in repair time and possible downtime, you can feel good about your code and confident that bad transfers won’t affect your production environment.