Julie Anderson is a seasoned marketing expert and thought leader at Onapsis. She develops strategic content that educates security and IT leaders on the necessity of protecting SAP and business-critical applications. Julie’s work highlights how the Onapsis platform provides market-leading capabilities in vulnerability management, specialized threat detection, and continuous compliance. She is focused on communicating the value of bringing deep application security insights into existing enterprise security workflows to drive better risk mitigation and governance.
We’ve been raising awareness of rising cyber attacks targeting critical SAP systems for years now. Most recently, we partnered with Flashpoint on a new threat report that detailed alarming increases in ransomware incidents involving compromised SAP systems and proof that unpatched SAP vulnerabilities are actively being exploited for financial gain, espionage and sabotage. We’re happy…
Explore proactive ransomware mitigation strategies and learn how to continuously monitor SAP for threats with Onapsis Defend.
Secure your SAP applications against ransomware. Discover a game-changing solution with Onapsis Assess, an integral part of the SAP Endorsed Apps program.
Explore proactive strategies against ransomware, focusing on safeguarding the application layer. Address challenges and stay ahead in SAP cybersecurity.
With the new Network Detection Rules Pack, Onapsis Defend customers can harness the power of Onapsis Research Labs’ threat intelligence to their network monitoring technologies and gain pre-patch protection for the most critical and network-detectable vulnerabilities in SAP.
Learn how a CISO at a mid-size biotech company went from having a major cybersecurity blind spot around their critical SAP applications to quickly establishing a successful vulnerability management program with the help of Onapsis.
Understanding these fundamental terms is crucial for understanding how the latest vulnerability management tools and technologies work and keep your organization safe.
Security and compliance continue to be the top concerns for migrating to SAP S/4HANA in the cloud, even above performance, flexibility and cost. That’s because, ultimately, it’s still your responsibility to ensure the security of your data and applications—even if they reside in someone else’s datacenter. Fortunately, a strong cloud provider and the right tools can take security from a project roadblock to an accelerator, while keeping your data and applications protected along the way.
Our new e-book, DevSecOps for SAP S/4HANA Migrations for Dummies, walks through how applying DevSecOps approaches can facilitate SAP application development, while also improving security, compliance and quality throughout the development lifecycle.