Onapsis Security Advisor Overview Video
Filter By
Browse By
- SAP Analytics and AI
- SAP Application Development and Integration
- All SAP Application Development and Integration
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP API Management
- SAP BAPI
- SAP Basis
- SAP BRF
- SAP Business Application Studio
- SAP CMS
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP EAI
- SAP EDI
- SAP Extension Suite
- SAP Fiori
- SAP Fiori Elements
- SAP Integration Suite
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Netweaver
- SAP Release Management
- SAP UI5
- SAP Web Application Server
- SAP Web IDE
- SAP Business Process Management
- SAP Center of Excellence
- SAP CIO
- SAP Customer Experience
- SAP Data and Data Management
- All SAP Data and Data Management
- SAP BW
- SAP BW/4HANA
- SAP Crystal Reporting
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP DMS
- SAP Document Control
- SAP EIM
- SAP ETL
- SAP ETL Tools
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Studio
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP Enterprise Architect
- SAP Enterprise Asset Management
- SAP ERP
- SAP Finance
- All SAP Finance
- SAP Accounting
- SAP AR AP
- SAP Asset Accounting
- SAP Billing Systems
- SAP BPC
- SAP BRIM
- SAP Cash Management
- SAP Central Finance
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP e-invoicing
- SAP FICO
- SAP Finance Automation
- SAP Financial Closing Cockpit
- SAP Financial Consolidation
- SAP Financial Planning
- SAP FX Risk
- SAP General Ledger
- SAP Global Tax Management
- SAP Hyperion
- SAP Order to Cash
- SAP Payment Processing
- SAP Profitability Analysis
- SAP Rebate Management
- SAP S/4HANA Finance
- SAP Universal Journal
- SAP Governance Risk and Compliance
- SAP Human Capital Management
- SAP Intelligent Technologies
- SAP Platform and Technology
- All SAP Platform and Technology
- SAP Business Technology Platform
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP Container Platform
- SAP Digital Asset Management
- SAP Digital Integration Hub
- SAP Digital Signature
- SAP HANA Enterprise Cloud
- SAP HEC
- SAP Hyperscalers
- SAP Infrastructure
- SAP Messaging
- SAP Smart Forms
- SAP Quality and Testing
- SAP Security
- SAP Spend Management
- SAP Supply Chain Management
- All SAP Supply Chain Management
- SAP APO
- SAP Asset Management
- SAP Business Network
- SAP Digital Manufacturing Cloud
- SAP Digital Twin
- SAP EWM
- SAP IBP
- SAP Inventory Management
- SAP Label Printing
- SAP Logistics
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP MES
- SAP MII
- SAP MM
- SAP MRO
- SAP MRP
- SAP Order Management
- SAP Plant Maintenance
- SAP PLM
- SAP Production Planning
- SAP S&OP
- SAP SD
- SAP SPM
- SAP Supply Chain Planning
- SAP Track and Trace
- SAP Transportation Management
- SAP System Administration
47 results
-
10 tips to safeguard your critical business data in SAP systems
In an increasingly interconnected business landscape, prioritizing data security is paramount. Recent incidents, such as the SAP vulnerability leading to a significant data breach in New Zealand, underscore the urgency of proactive measures. Organizations must recognize the critical importance of securing SAP systems, as cyber threats continue to evolve. Implementing regular updates, segregation of duties,…
-
Three Initiatives to Secure Digital Transformation Projects
Digital transformation projects often face challenges when it comes to migrating custom code applications to S/4HANA with Rise with SAP.
-
How to Secure Your Business-Critical SAP Applications Against Modern Ransomware
Over the past year, it seems that everywhere you turn, there’s another story about a modern ransomware attacks on the business-critical systems that power our global economy. From fuel and energy companies to food processing corporations, no industry is immune. As threat actors target essential and larger organizations for increasing ransom values, it’s clear that…
-
-
Protect Your Sustainability Goals with SAP Cybersecurity
Security is a critical component of any SAP landscape. Many organizations likely have not considered the role that security plays in sustainability. Modern threats like ransomware can derail virtually every aspect of a business – including sustainability. In this article, SAPinsider expert Gaurav Singh lays out five key cyber hygiene practices that will protect your…
-
The Challenge of Patching
One of the biggest challenges that organizations face today with keeping their SAP systems secure is patching systems. In our recent research on Cybersecurity Threats to SAP Systems, respondents reported that keeping up with patches and updates was the second most important challenge they faced behind detecting potential threats, but for respondents in North America…...…
-
Proven Techniques and Strategies to Fortify Your SAP Landscape from Cybersecurity Threats
Modern cybersecurity threats are growing in complexity, scale, and speed. In this live Q&A, SAPinsider GRC 2017 speaker Peter Hobson dove into cybersecurity as it relates to your SAP landscape. Read the transcript to get expert answers to your questions on topics like role design, controls, vulnerability scans, supporting tools, and more. What type of…...…
-
Don’t Wait Until It’s Too Late
Despite the present and growing threat of cyberattacks — especially when it comes to ERP systems that contain mission-critical and sensitive information — many enterprises often fall behind in applying security patches to address identified vulnerabilities in their systems. So why do organizations struggle with this, and what can they do to overcome obstacles? This article…
-
-
Securing the Intelligent Enterprise from Cyberattacks
Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and respond to…
-
Managing Risk in the Cloud: Gaining Visibility and Threat Intelligence in the Cloud
Levi’s wanted to pilot a new SAP Hybrid Enterprise Cloud (HEC) instance, but the potential loss of visibility into its operating environment presented a concern and became a challenge that required additional education. This session examines how, by partnering with Onapsis, Levi’s gained visibility into its cloud environment in order to trust and verify that…
-
Has Your System Been Breached?
Since cyber attackers are aware of methods for breaking into SAP systems, companies need to take countermeasures. It is important that they know what data they should analyze to detect where their systems have been compromised, according to Juan Perez-Etchegoyen of Onapsis. In his upcoming Cybersecurity for SAP Customers 2018 session, “Detect and Respond: How…
Become a Member
Unlimited access to thousands of resources for SAP-specific expertise that can only be found here.
Upcoming Events
Related Vendors
Your request has been successfully sent