Onapsis Resources

Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.

Resource Placeholder

Volume XIV: Setup Trusted RFC in SAP GRC

In February 2017, SAP released Security Note 2413716 regarding configuration changes to secure Trusted RFC for GRC Access Control (AC) Emergency Access Management (EAM), which was a High Priority note. The EAM module provides SAP GRC AC with the ability to determine how access can be granted in case of an emergency, however, you must…

Resource Placeholder

MercadoLibre

MercadoLibre is the largest e-commerce ecosystem in Latin America. It offers a wide range of services, including marketplace, payments, advertising and e-building solutions. Learn how they were able to secure their SAP systems during digital transformation to the cloud with the Onapsis Security Platform.

Resource Placeholder

Volume XIII: SAP HANA System Security Review – Part 2

SAP HANA is being pushed by SAP as the absolute in-memory database for its products and more recently, as a standalone platform. The vast majority of companies who have already adopted it are leveraging its capabilities to support business-critical applications. Due to its nature, SAP HANA stores an organization’s most important assets, thus requiring large…

Resource Placeholder

Blueprint for CIS Control Application: Securing the SAP Landscape

Any data breach can be expensive, but the potential cost rises with the value orexploitability of the data targeted in an attack.

Resource Placeholder

Onapsis’ Mariano Nunez talks with Richard Stiennon

Richard Stiennon interview Mariano Nunez, CEO and Co-founder of Onapsis, as part of IT-Harvest’s 2016 Video Interview Series.

Resource Placeholder

Volume XII: SAP HANA System Security Review – Part 1

SAP HANA is being pushed by SAP as the absolute in-memory database for its products and more recently as a standalone platform. The vast majority of companies who have already adopted it are leveraging its capabilities to support business-critical applications. Due to its nature, SAP HANA stores an organization’s most important assets, thus requiring large…

Resource Placeholder

Volume XI: SAP End-User Tools: The Weakest Link to Sensitive Data

When thinking of SAP security we tend to always think of SAP servers and pay little attention to the tools used by end-users that connect to most of our SAP Systems, as well as the way those tools are used. Outside the SAP security world it is well accepted that attackers are no longer targeting…

Resource Placeholder

Volume X: Pivoting Through SAP Systems

Every organization running SAP to support its business-critical processes has typically implemented several systems in complex scenarios. Depending on the sizeof the company, the number of SAP Systems, Instances and Products used can be quite large. All of these systems are interconnected and there are different components involved in regards to the connections such as…

Page 31 of 33