Onapsis Resources
Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.
Your S/4HANA Cloud Journey
Join us for an exclusive session on how to Build Security Into Your S/4HANA Cloud Journey
SAP Cybersecurity: Gestion des vulnérabilités dans vos développements SAP
Un webinar sur les outils Onapsis et Rev-Trac
The Third Joint Guide From The Security Hub
In this guide, Turnkey, SailPoint and Onapsis give you practical advice for safeguarding SAP in an era of cyber legislation
Gardez la main sur la sécurisation de vos environnements SAP !
Vous avez loupé notre webinar en collaboration avec Onapsis ? Pas de panique, nous vous mettons le replay à disposition !
Onapsis SAP DevSecOps Cycle
To accelerate the delivery of high-quality software, companies are now promoting the intertwining of the development and operations departments—especially in the SAP environment. This new focus on speed requires an integrated security approach. Introducing DevSecOps.
Mit verbundenen Augen: SAP als Blindspot auf der Securitylandkarte
Organisationen stehen zunehmend im Focus von Cyberangriffen. 65% der Angriffe erreichen auch die SAP Systeme der Unternehmen. Hier besteht dringend Handlungsbedarf, um relevante Unternehmensdaten und -werte zu schützen sowie den Unternehmensbetrieb nicht zu gefährden. Mit einem ganzheitlichen Ansatz sowie dem Einsatz moderner Lösungen von Onapsis und maßgeschneiderten Managed Services von IBM gelingt es unseren Kunden, die Zahl der Angriffe zu reduzieren, Angriffe zu identifizieren und im Ernstfall diese schnell und effektiv zu bekämpfen.
Battling Trojan Horses in Your SAP® Transports
Battling Trojan Horses in Your SAP® Transports
Changes to SAP production systems through SAP transports pose a high security risk. These potential “Trojan horses” sneak in malicious content or changes, providing a gateway for espionage, data theft and data manipulation. The damage to an affected company can be considerable, ranging from financial and reputation loss to substantial penalties associated with violations of legal data protection regulations. Nevertheless, many companies are still unaware of the potential dangers of transports for SAP security. In addition, conventional analysis tools are unable to identify the Trojans hidden in SAP transport files. Transport analysis from Onapsis closes this gap with minimal effort. Download the Battling Trojan Horses in Your SAP® Transports e-book now to learn more.
A Year in Review with Onapsis Research Labs
JP Perez-Etchegoyen and Paul Laudanski from Onapsis Research Labs (ORL) recap SAP security trends from 2023 and provide best practices to prepare you for 2024.
5 Challenges for CIOs E-book
The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity in recent years. This e-book reviews five challenges CIOs face when dealing with SAP security, including recommendations for overcoming these challenges.
