Onapsis Resources

Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.

Resource Placeholder

Your S/4HANA Cloud Journey

Join us for an exclusive session on how to Build Security Into Your S/4HANA Cloud Journey

Resource Placeholder

The Third Joint Guide From The Security Hub

In this guide, Turnkey, SailPoint and Onapsis give you practical advice for safeguarding SAP in an era of cyber legislation

Resource Placeholder

Gardez la main sur la sécurisation de vos environnements SAP !

Vous avez loupé notre webinar en collaboration avec Onapsis ? Pas de panique, nous vous mettons le replay à disposition !

Resource Placeholder

Onapsis SAP DevSecOps Cycle

To accelerate the delivery of high-quality software, companies are now promoting the intertwining of the development and operations departments—especially in the SAP environment. This new focus on speed requires an integrated security approach. Introducing DevSecOps.

Resource Placeholder

Mit verbundenen Augen: SAP als Blindspot auf der Securitylandkarte

Organisationen stehen zunehmend im Focus von Cyberangriffen. 65% der Angriffe erreichen auch die SAP Systeme der Unternehmen. Hier besteht dringend Handlungsbedarf, um relevante Unternehmensdaten und -werte zu schützen sowie den Unternehmensbetrieb nicht zu gefährden. Mit einem ganzheitlichen Ansatz  sowie dem Einsatz moderner Lösungen von Onapsis und maßgeschneiderten Managed Services von IBM gelingt es unseren Kunden, die Zahl der Angriffe zu reduzieren, Angriffe zu identifizieren und im Ernstfall diese schnell und effektiv zu bekämpfen.

Resource Placeholder

Battling Trojan Horses in Your SAP® Transports

Battling Trojan Horses in Your SAP® Transports
Changes to SAP production systems through SAP transports pose a high security risk. These potential “Trojan horses” sneak in malicious content or changes, providing a gateway for espionage, data theft and data manipulation. The damage to an affected company can be considerable, ranging from financial and reputation loss to substantial penalties associated with violations of legal data protection regulations. Nevertheless, many companies are still unaware of the potential dangers of transports for SAP security. In addition, conventional analysis tools are unable to identify the Trojans hidden in SAP transport files. Transport analysis from Onapsis closes this gap with minimal effort. Download the Battling Trojan Horses in Your SAP® Transports e-book now to learn more.

Resource Placeholder

A Year in Review with Onapsis Research Labs

JP Perez-Etchegoyen and Paul Laudanski from Onapsis Research Labs (ORL) recap SAP security trends from 2023 and provide best practices to prepare you for 2024.

Resource Placeholder

5 Challenges for CIOs E-book

The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity in recent years. This e-book reviews five challenges CIOs face when dealing with SAP security, including recommendations for overcoming these challenges.

Page 13 of 33