Protecting SAP Solutions from Cyber Threats with Onapsis

550 results

  1. How SAP Users Can Optimize Cloud Migration by Leveraging Partnerships

    The countdown toward the deadline for SAP ECC maintenance in 2027 is getting closer and closer for SAP users. Cloud migration is now one of the most discussed and sought-after ERP enhancements. Knowing how complex the transformation is going to be for many companies, SAP has been consistently developing and enhancing its RISE with SAP…

  2. Cybersecurity sessions

    Securing the Intelligent Enterprise with SAP’s Enterprise Threat Detection

    Reading time: 2 mins

    The heightened global prevalence of cyber threats has amplified the urgency for organizations to move beyond the traditional preventive measures. Organizations now need to adopt more stringent protocols for real-time monitoring, threat detection, and swift response in order to effectively protect their businesses. This article discusses SAP’s Enterprise Threat Detection, a comprehensive offering that enables…

  3. How to Configure SAP Enterprise Threat Detection for Increased Surveillance and Real-Time Analysis of Security Threats

    Mining of important security-related logs has always been a challenge for most enterprises in terms of how to gain appropriate security intelligence from collected data sets in order to forestall malicious attacks from within and outside an enterprise. Kehinde Eseyin shows how to set up the SAP Enterprise Threat Detection system landscape to facilitate log...…

  4. Rubrik Announces New Threat Detection and Recovery Solution

    Rubrik, Inc. has launched its new Rubrik Turbo Threat Hunting solution, designed to rapidly detect and quarantine threats while ensuring quick recovery from cyberattacks, with a beta release available now for Enterprise Edition and cloud customers ahead of a broader rollout expected by January 2025.

  5. Reinforcing SAP defenses with Splunk’s Advanced Threat Detection

    It’s Cybersecurity Awareness Month so no better time to highlight the importance of defending complex SAP systems from evolving digital threats by investing in proactive measures like Splunk Advanced Threat Detection and Splunk Mission Control, organizations can significantly enhance security and protect vital business data.

  6. Case study | Threat detection in SAP applications & implementation of SAP Enterprise Threat Detection

    An important component of a comprehensive security strategy is control over activities performed within the SAP environment to ensure landscape security . This includes monitoring applications behavior with respect to policies and regulatory requirements. This session will discuss three customer scenarios both before and after implementing SAP Enterprise Threat Detection. Scenario 1 Before implementing SAP…

  7. An Integrated Approach to Identifying Security Risks

    As technology becomes more sophisticated, so do the cyberattacks that aim to steal and even manipulate data. In response to this new rise in cybercrime, SAP released SAP Enterprise Threat Detection, a native SAP HANA application that quickly identifies suspicious patterns in log data and generates alerts to notify the appropriate personnel to take action.…

  8. Protect Your SAP Systems from Cyberattacks

    This article looks at how SAP Enterprise Threat Detection addresses organizations’ pressing needs for protecting modern SAP landscapes.

  9. How to identify suspicious activities with SAP Enterprise Threat Detection

    Click Here to View Session Deck. Designed to provide a hands-on understanding of SAP Enterprise Threat Detection (ETD), this session, led by a team of SAP ETD specialists will learn to effectively identify suspicious activities in SAP S/4HANA and implement proactive mitigation strategies to prevent data breaches. The session will equip attendees with the skills...…

  10. The business benefits of SAP Enterprise Threat Detection

    Nowadays, not a day goes by without a new data breach being reported in the news. Cyber-attacks often target our IT infrastructure using phishing, smishing, ransomware or malware. The goal is often to disrupt a company's operations, encrypt databases or block access to carry out extortion. The average time to contain a security breach is…