ERP Security for Utility Companies - Onapsis Partners with SNOPUD to Secure Critical SAP Applications

865 results

  1. How SAP Users Can Optimize Cloud Migration by Leveraging Partnerships

    The countdown toward the deadline for SAP ECC maintenance in 2027 is getting closer and closer for SAP users. Cloud migration is now one of the most discussed and sought-after ERP enhancements. Knowing how complex the transformation is going to be for many companies, SAP has been consistently developing and enhancing its RISE with SAP…

  2. Protect Your SAP Systems from Cyberattacks

    This article looks at how SAP Enterprise Threat Detection addresses organizations’ pressing needs for protecting modern SAP landscapes.

  3. An Integrated Approach to Identifying Security Risks

    As technology becomes more sophisticated, so do the cyberattacks that aim to steal and even manipulate data. In response to this new rise in cybercrime, SAP released SAP Enterprise Threat Detection, a native SAP HANA application that quickly identifies suspicious patterns in log data and generates alerts to notify the appropriate personnel to take action.…

  4. New Report Reveals Evidence of Increased Cybercriminal Interest in ERP Applications

    Novel research report from Onapsis and Flashpoint details increasing interest and value of ERP security application vulnerabilities for ransomware and data breaches.

  5. Managing Risk in the Cloud – Levi’s Gains Visibility & Threat Intelligence for SAP HEC

    Levi’s wanted to pilot a new SAP Hybrid Enterprise Cloud (HEC) instance, but the potential loss of visibility into its operating environment presented a concern and became a challenge that required additional education. This session examines how, by partnering with Onapsis, Levi’s gained visibility into its cloud environment in order to trust and verify that…

  6. Managing Risk in the Cloud: Gaining Visibility and Threat Intelligence in the Cloud

    Levi’s wanted to pilot a new SAP Hybrid Enterprise Cloud (HEC) instance, but the potential loss of visibility into its operating environment presented a concern and became a challenge that required additional education. This session examines how, by partnering with Onapsis, Levi’s gained visibility into its cloud environment in order to trust and verify that…

  7. Managing Risk in the Cloud with Global Apparel Manufacturer Gains Visibility and Threat Intelligence for SAP HEC

    A large international apparel manufacturer running multiple independent, in-house SAP systems around the world wanted to implement an additional system to cover new geographical regions, but this time running on the SAP HANA Enterprise Cloud (HEC).

  8. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers...…

  9. Vulnerability Management: A Cybersecurity Strategy That Pays Dividends

    In today’s rapidly evolving digital landscape, understanding the importance of vulnerability management is paramount. With interconnected systems and the escalating threat of cyberattacks, taking proactive measures to identify, prioritize, and address vulnerabilities is crucial for safeguarding your organization’s assets and reputation. Discover how implementing a comprehensive vulnerability management solution, such as Vulnerability Management by oXya,…

  10. SecurityBridge, Altum Collaborate to Better Secure SAP Environments

    SecurityBridge has partnered with Altum to bolster SAP cybersecurity through innovative solutions that enhance threat detection and mitigation, emphasizing the necessity for continuous monitoring and advanced security strategies in the face of rising cyber threats.