ReportsActive Cyberattacks on Business-Critical SAP Applications
A critical cybersecurity blind spot impacting how many organizations protect their business-critical SAP applications is detailed in this joint report from Onapsis and SAP. Learn how threat actors are actively targeting these unprotected SAP applications.
WebcastAberdeen Onapsis Protecting Your Mission-Critical App: How to (Properly) Understand Your Risks
Evaluate and quantify the value of solutions that are designed to help manage your risks and reduce your operational costs by establishing a proper understanding of risk. Watch this webinar to learn how to protect your mission-critical applications and more.
ebookDevSecOps for SAP S/4HANA Migrations for Dummies
Accelerate and ensure successful SAP S/4HANA migration projects with a DevSecOps approach addressing security and compliance. Download our For Dummies book now for an easy-to-understand guide to learn how from development to production
PublicationsVolume XVII: Remote Function Call: The Whole Picture
The aim of this publication is to fully introduce and explain the concept of Remote Function Call (RFC) and the impact on the Gateway and Message Server.
PublicationsVolume XIV: Setup Trusted RFC in SAP GRC
In February 2017 SAP released Security Note 2413716 regarding configuration changes to secure Trusted RFC for GRC Access Control emergency access management (EAM), which was a High Priority note. This particular security note is quite complicated so, to help organizations understand the impact, we’ve created this guide to help you install it correctly.
VideoCybersecurity Experts Discuss How Businesses are Protecting Themselves to Remain Cyber Resilient
Hear from Khaja Ahmed, Head of Global Product and Application Security at SAP, and Onapsis General Manager of Product and Technology, Anshuman Kanwar, discuss the challenges and strategies companies have for protecting their mission-critical applications to maintain business success.
Solution BriefSAP Transport Inspection Application Note
Avoid import errors, business outages, downgrades, security vulnerabilities and compliance violations by inspecting all transports before import. Learn how Onapsis can help.
VideoWorking with Onapsis to Strategically Move to the Cloud
Hear from Preston Futrell, leader of the Global Business Services organization at IBM, as he discusses how they help customers develop their SAP implementations as they migrate to the cloud and how working with Onapsis enables them to assure that security is included.
PublicationsVolume XVI: SAP®️ Security In-Depth: Switchable Authorization Checks: New Workbench and Scenarios
This SAP Security In-depth attempts to fully introduce and explain the concept of Switchable Authorization Checks. How it works, why it’s important and how to implement a Switchable Authorization Checks SAP Security Note.