Roadshow Recap: Addressing the SAP Governance Gap

Onapsis has just completed its second annual North American Roadshow Series! With stops in the Bay Area, Houston, Chicago, and New York, this initiative was a huge success.

During this series, industry professionals and customers from some of the top F1000 organizations collaborated on how to address the growing SAP governance gap within their organizations. As the state of SAP cybersecurity continues to evolve, the SAP governance gap continues to be one of the most common challenges facing organizations across many different industries.

Reducing SAP Attack Exposure with Virtual SAP Security Patching

I’m excited to announce that Onapsis has just developed a new functionality to provide users with virtual patching for SAP systems. This new capability will allow organizations to have immediate protection from SAP specific vulnerabilities as soon as the Onapsis Security Platform identifies new cybersecurity risks and compliance violations. This is a huge achievement for business-critical application security! Now, information security and SAP BASIS teams will have the time they need to properly evaluate, test and apply the related SAP security notes/patches.

Who is Truly Responsible for Securing SAP Systems?

Not too long ago I published a blog which discussed operationalizing your SAP cybersecurity strategy. In that post I discussed the confusion around division of responsibilities, who should own SAP security, and how SAP security gets operationalized within the organization as this is a common problem my team and I have noticed across organizations.

Key Takeaways from Ponemon Institute’s New Study: Uncovering the Risks of SAP Cyber Breaches

Today, the Ponemon Institute has released its latest research study titled Uncovering the Risks of SAP Cyber Breaches. As the first independent research study on SAP cybersecurity trends, more than 600 global IT security practitioners were surveyed to uncover perceptions about the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes.

Operationalizing SAP Cybersecurity

Business-critical applications running on SAP such as enterprise resource planning (ERP), customer relationship management (CRM), human capital management (HCM), business intelligence (BI) and supply chain management (SCM) house an organization’s most valuable data and support mission-critical business processes. As we enter 2016, it’s no surprise that these systems have become major targets to nation-state attacks, intellectual property theft, financial fraud and sabotage.

Pages