Protecting SAP Solutions from Cyber Threats with Onapsis

536 results

  1. How SAP Users Can Optimize Cloud Migration by Leveraging Partnerships

    The countdown toward the deadline for SAP ECC maintenance in 2027 is getting closer and closer for SAP users. Cloud migration is now one of the most discussed and sought-after ERP enhancements. Knowing how complex the transformation is going to be for many companies, SAP has been consistently developing and enhancing its RISE with SAP…

  2. Cybersecurity sessions

    Securing the Intelligent Enterprise with SAP’s Enterprise Threat Detection

    Reading time: 2 mins

    The heightened global prevalence of cyber threats has amplified the urgency for organizations to move beyond the traditional preventive measures. Organizations now need to adopt more stringent protocols for real-time monitoring, threat detection, and swift response in order to effectively protect their businesses. This article discusses SAP’s Enterprise Threat Detection, a comprehensive offering that enables…

  3. How to Configure SAP Enterprise Threat Detection for Increased Surveillance and Real-Time Analysis of Security Threats

    Mining of important security-related logs has always been a challenge for most enterprises in terms of how to gain appropriate security intelligence from collected data sets in order to forestall malicious attacks from within and outside an enterprise. Kehinde Eseyin shows how to set up the SAP Enterprise Threat Detection system landscape to facilitate log...…

  4. Case study | Threat detection in SAP applications & implementation of SAP Enterprise Threat Detection

    An important component of a comprehensive security strategy is control over activities performed within the SAP environment to ensure landscape security . This includes monitoring applications behavior with respect to policies and regulatory requirements. This session will discuss three customer scenarios both before and after implementing SAP Enterprise Threat Detection. Scenario 1 Before implementing SAP…

  5. An Integrated Approach to Identifying Security Risks

    As technology becomes more sophisticated, so do the cyberattacks that aim to steal and even manipulate data. In response to this new rise in cybercrime, SAP released SAP Enterprise Threat Detection, a native SAP HANA application that quickly identifies suspicious patterns in log data and generates alerts to notify the appropriate personnel to take action.…

  6. Protect Your SAP Systems from Cyberattacks

    This article looks at how SAP Enterprise Threat Detection addresses organizations’ pressing needs for protecting modern SAP landscapes.

  7. How to identify suspicious activities with SAP Enterprise Threat Detection

    Click Here to View Session Deck. Designed to provide a hands-on understanding of SAP Enterprise Threat Detection (ETD), this session, led by a team of SAP ETD specialists will learn to effectively identify suspicious activities in SAP S/4HANA and implement proactive mitigation strategies to prevent data breaches. The session will equip attendees with the skills...…

  8. The business benefits of SAP Enterprise Threat Detection

    Nowadays, not a day goes by without a new data breach being reported in the news. Cyber-attacks often target our IT infrastructure using phishing, smishing, ransomware or malware. The goal is often to disrupt a company's operations, encrypt databases or block access to carry out extortion. The average time to contain a security breach is…

  9. Case Study: Power-Up Your Defences: Leveraging SAP Enterprise Threat Detection – The Legend of Security at Nintendo

    Click Here to View Session Deck. Nintendo’s journey with SAP is a testament to the positive outcomes achievable when technology and security are given the attention they deserve. The session will display Nintendo’s experience to inspire others and showcase the impact of SAP Enterprise Threat Detection (ETD) in safeguarding critical assets. You will: Learn about...…

  10. Early Threat Detection with FortiDeceptor – The Key for keeping Enterprise Software Secure

    Cloud-based SAP platforms have inherent protection built in. However, as enterprises continue to grow and become more technically intricate, cyber defense systems need to be revisited and readjusted to adapt to modern threats. The best cyber security providers will have a proactive approach to security, rather than a reactive one. For example, cybersecurity firm, Fortinet,…