Onapsis Resources

Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.

Resource Placeholder

A Year in Review with Onapsis Research Labs Insights to Inform your 2024 ERP Security Strategy

2024 has just begun, but we are firm believers that the best way to prepare for the future is to evaluate the past and look ahead. Join JP Perez-Etchegoyen and Paul Laudanski from Onapsis Research Labs (ORL) as they recap trends from 2023 and provide best practices to prepare you for threats in 2024.

Resource Placeholder

ERP Security 101: 5 Things Every Leader & Organization Should Be Doing to Secure ERP

Traditional cybersecurity investments have focused on defending the perimeter with little attention paid to the application layer. More importantly, those applications enable the most critical business functions of your organization, such as financials, manufacturing, and the supply chain. With SAP as the core technology foundation for many large enterprises, it presents an attractive target for…

Resource Placeholder

Your S/4HANA Cloud Journey

Join us for an exclusive session on how to Build Security Into Your S/4HANA Cloud Journey

Resource Placeholder

The Third Joint Guide From The Security Hub

In this guide, Turnkey, SailPoint and Onapsis give you practical advice for safeguarding SAP in an era of cyber legislation

Resource Placeholder

Gardez la main sur la sécurisation de vos environnements SAP !

Vous avez loupé notre webinar en collaboration avec Onapsis ? Pas de panique, nous vous mettons le replay à disposition !

Resource Placeholder

Onapsis SAP DevSecOps Cycle

To accelerate the delivery of high-quality software, companies are now promoting the intertwining of the development and operations departments—especially in the SAP environment. This new focus on speed requires an integrated security approach. Introducing DevSecOps.

Resource Placeholder

Mit verbundenen Augen: SAP als Blindspot auf der Securitylandkarte

Organisationen stehen zunehmend im Focus von Cyberangriffen. 65% der Angriffe erreichen auch die SAP Systeme der Unternehmen. Hier besteht dringend Handlungsbedarf, um relevante Unternehmensdaten und -werte zu schützen sowie den Unternehmensbetrieb nicht zu gefährden. Mit einem ganzheitlichen Ansatz  sowie dem Einsatz moderner Lösungen von Onapsis und maßgeschneiderten Managed Services von IBM gelingt es unseren Kunden, die Zahl der Angriffe zu reduzieren, Angriffe zu identifizieren und im Ernstfall diese schnell und effektiv zu bekämpfen.

Resource Placeholder

Battling Trojan Horses in Your SAP® Transports

Battling Trojan Horses in Your SAP® Transports
Changes to SAP production systems through SAP transports pose a high security risk. These potential “Trojan horses” sneak in malicious content or changes, providing a gateway for espionage, data theft and data manipulation. The damage to an affected company can be considerable, ranging from financial and reputation loss to substantial penalties associated with violations of legal data protection regulations. Nevertheless, many companies are still unaware of the potential dangers of transports for SAP security. In addition, conventional analysis tools are unable to identify the Trojans hidden in SAP transport files. Transport analysis from Onapsis closes this gap with minimal effort. Download the Battling Trojan Horses in Your SAP® Transports e-book now to learn more.

Page 14 of 34