New SAP & Onapsis Threat Intelligence: Active Cyberattacks on Business-Critical SAP Applications

Proving business-critical application security not only takes next-level solutions, it also takes thought leadership. Here you'll find a growing library of materials to help you build your business-critical application security strategy and drive your company forward, confidently.

Webcast

Q&A WITH SAP CISO AND ONAPSIS CEO

Listen to a Q&A session with Richard Puckett, CISO at SAP and Mariano Nunez, CEO at Onapsis to discuss the key findings and actions to take to immediately protect your business.

ebook

DevSecOps for SAP S/4HANA Migrations for Dummies

Accelerate and ensure successful SAP S/4HANA migration projects with a DevSecOps approach addressing security and compliance. Download our For Dummies book now for an easy-to-understand guide to learn how from development to production

Publications

Volume XIV: Setup Trusted RFC in SAP GRC

In February 2017 SAP released Security Note 2413716 regarding configuration changes to secure Trusted RFC for GRC Access Control emergency access management (EAM), which was a High Priority note. This particular security note is quite complicated so, to help organizations understand the impact, we’ve created this guide to help you install it correctly.

Solution Brief

SAP Transport Inspection Application Note

Avoid import errors, business outages, downgrades, security vulnerabilities and compliance violations by inspecting all transports before import. Learn how Onapsis can help.

Video

Working with Onapsis to Strategically Move to the Cloud

Hear from Preston Futrell, leader of the Global Business Services organization at IBM, as he discusses how they help customers develop their SAP implementations as they migrate to the cloud and how working with Onapsis enables them to assure that security is included.

Secure your
business-critical
SAP, Oracle, and SaaS apps

Get a firsthand look at the visibility, reporting and automation capabilities provided by The Onapsis Platform by scheduling a personalized demo with our application security experts.

Request a demo