Preparing for NIS2 Compliance: Onapsis Solutions for NIS2 Readiness

1260 results

  1. ECC, IDM and AC 12.0 Farewell Tour: Seize the Moment to Implement the Compliance You’ve Always Wanted

    Organizations can seize the opportunity presented by SAP’s transitions, including the shift to SAP S/4 HANA, to enhance their risk and compliance strategies through centralized access governance, automation, and advanced access control solutions.

  2. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers...…

  3. Integrate Policy Management into Your Global Compliance Portfolio

    Discover how to use policy management with key elements of SAP Process Control to respond to risk events in your organization. Understand the ways in which policy management can be integrated into functional business processes. Key Concept SAP has developed a global compliance solution as part of Process Control 10.0 and 10.1. Managing company-wide policies...…

  4. Combat Chaos with a Lock-Down Security Policy in 12 Key Areas of Your SAP Environment

    Security policies and procedures should be a central concern of all employees of an organization. Review important areas of the SAP ERP system that has to be driven by effective security policies. Key Concept A security policy is a formal statement of principles, rules, goals, and objectives of an organization aimed at securing the assets...…

  5. Part 2: Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also learn how to assign the created profiles to specific users or groups of users. Finally, watch the accompanying demo video to learn how to use the security editor to create different security profiles. Key Concept The security editor...…

  6. A Guide to Passing an SAP HANA System Security Audit

    Follow these best practices to install, administer, and operate the SAP HANA system securely. More importantly, learn about control objectives that auditors check to gain assurance about controls in the SAP HANA system environment. Key Concept A system audit is an exercise performed to gain assurance that defined controls work as intended, thereby eliminating the...…

  7. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…

  8. The Power of Prevention

    The onset of COVID-19 in 2020 ushered a new workforce paradigm in which normal security patching operations were left vulnerable to cyberattacks. Today’s remote, cloud-based environment requires a level of security awareness and prevention that brings together SAP, customers and external security researchers. Aditi Kulkarni, Product Security Senior Specialist for SAP Labs India, provides a…

  9. Part 3: Implementing Security in BusinessObjects Universes with Security Tables

    Learn how to implement security in SAP BusinessObjects Universes using database security tables. Learn how to establish and create database security tables, store security information in those tables, import the tables into your Universe, and join the tables with your current Universe model by joining them with the corresponding tables in the Universe. Finally, find...…

  10. SAP Cybersecurity interview with ChatGPT

    AI is one of the leading topics in all technology industries. Companies of all kinds are looking for the best ways to leverage this rapidly-advancing technology. To take a look at how AI can help bolster cybersecurity, SAPinsider expert Bill Oliver posed some common SAP Cybersecurity questions to notable AI chat model ChatGPT. In this…