En Onapsis, no solo somos líderes de soluciones, también somos líderes de pensamiento. Aquí encontrará una creciente biblioteca de materiales para ayudarlo a desarrollar su estrategia de ciberesiliencia. Con mayor claridad sobre la seguridad y el cumplimiento de las aplicaciones esenciales para el negocio podrá fomentar mejor y con confianza el desarrollo de su empresa.

Understanding and Securing Critical SAP Configuration Issue

Date: Tuesday, May 8th Time: 2pm ET

The Onapsis Research Labs has discovered a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a full system compromise. If exploited the impact could be full control of the system by hackers, putting business-critical ERP, HR, PII, Finance, and Supply Chain data and processes at risk. The vulnerability, mainly driven by a security configuration documented by SAP originally in 2005, is still present in the majority of SAP implementations, either from neglecting to apply security configurations or due to configuration drifts after the configuration was secured.

Download the Onapsis Threat Report now to learn more


Attend this webcast with the Onapsis experts to learn

  • If your SAP Landscape is vulnerable to this critical configuration
  • How to securely configure this so your organization is protected
  • Key reasons that systems suffer from configuration drift after secure configurations were implemented
  • Next steps to ensure your organization is protected from insecure configurations