Onapsis https://onapsis.com The Leading ERP Cybersecurity Solution for SAP and Oracle Fri, 13 Feb 2026 19:15:49 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.1 https://onapsis.com/wp-content/uploads/Onapsis-favicon-64x64-1-1.png Onapsis https://onapsis.com 32 32 SAP Security for Aerospace & Defense https://onapsis.com/resources/solution-briefs/sap-security-for-aerospace-defense/ Fri, 13 Feb 2026 19:07:45 +0000 https://onapsis.com/?p=35620 Cyber attacks targeting critical SAP applications, mission-critical innovation, and complex supply chain applications within the Aerospace and Defense (A&D) industry carry existential risks.

The post SAP Security for Aerospace & Defense appeared first on Onapsis.

]]>
Cyber attacks targeting critical SAP applications, mission-critical innovation, and complex supply chain applications within the Aerospace and Defense (A&D) industry carry existential risks. A successful breach doesn’t just impact the bottom line: it can compromise national security, leak sensitive military intellectual property (IP), and lead to debarment from government contracts. Not only this, but regulatory impacts with ITAR, EAR, NIST and their subsequent fines can be staggering. The A&D industry is also particularly susceptible to targeting with the rise in geopolitical conflicts, which are noted as the number one risk to the world according to the World Economic Forum. As A&D organizations accelerate their shift from legacy systems with modern digital transformation initiatives, they face the challenge of defending against state-sponsored actors, insider threats, all while navigating increasingly rigorous regulatory frameworks like CMMC 2.0.

Industry Impact at a Glance

  • 1 in 3 A&D organizations reported a significant increase in cyber attacks targeting their supply chain within the last year.
  • Top Threat: Theft of proprietary designs and sensitive defense data (ITAR/EAR) remains the primary objective for advanced persistent threats (APTs).
  • 210% increase in SAP identified vulnerabilities in 2025 compared to 2024. Three of the largest SAP CVEs to date (CVE-2017-12637, CVE-2025-31324, and CVE-2025-42999) were identified as being actively exploited in the wild in early 2025.

Key Risk Factors

State-Sponsored Threats & Espionage A&D is a prime target for nation-state actors seeking to leapfrog technological gaps. SAP systems housing design specifications, materials science data, and procurement lists are high-value targets for industrial and military espionage.

Rigorous Regulatory Compliance Maintaining “License to Operate” requires strict adherence to DFARS, ITAR, EAR, and the emerging CMMC 2.0 standards. Failure to secure the SAP systems that manage controlled unclassified information (CUI) can result in massive 100M euro fines and loss of contract eligibility.

Fragmented, Global Supply Chains Modern defense platforms rely on thousands of Tier 1-4 suppliers. This interconnectivity creates a “weakest link” problem where vulnerabilities in a supplier’s SAP can serve as a backdoor into the prime contractor’s secure network. 

Key Challenges

NIS2 Compliance Gaps While most A&D firms have strong perimeter security, many struggle to apply the granular controls required by NIST SP 800-171 to the application layer of their SAP systems, leaving a critical audit gap.

IT/OT Convergence Risk The integration of SAP systems with shop-floor Industrial Control Systems (ICS) for real-time production tracking has expanded the attack surface. Security teams often lack visibility into how a vulnerability in SAP could pivot into a production line disruption. An IT or OT attack could result in an undiscovered SAP disruption, resulting in data loss or operational halts.

Complexity of Secure Cloud Migration As agencies push for cloud-first initiatives, A&D firms are migrating legacy on-prem SAPs to GovCloud and SAP Sovereign Cloud environments. Ensuring security and compliance parity during and after this migration is a massive technical hurdle for under-resourced teams. And it doesn’t stop there–in the RISE with SAP shared responsibility model, SAP secures and operates the underlying cloud infrastructure, platform, and core technical controls, while A&D organizations remain responsible for securing their SAP applications, configurations, custom code, users, data, and compliance. For A&D environments, this means customers must actively monitor SAP-specific vulnerabilities, access risks, and threats across S/4HANA and BTP. 

Lack of Visibility SAP applications have traditionally been a blind spot for A&D. Between SIEM tools monitoring infrastructure, operating systems, and database layers, a gap has existed for the SAP application layer. Now, more than ever, it requires a tailored solution to gain a true visibility of your landscape and actionable guidance to manage risk.

The Onapsis Solution

A Better Approach to A&D SAP Security

Securing your mission-critical SAP landscape doesn’t have to compromise your agility. Onapsis provides a dedicated cyber security platform for SAP that is purpose-built to meet the high-stakes requirements of the defense industrial base.

  • Automate Compliance and Regulations: Map SAP security configurations directly to CMMC 2.0, NIST 800-171 controls, and NIST 800-53 policy, turning months of manual audit prep into automated, continuous monitoring. Onapsis also directly maps to SAP Baseline allowing our customers to automatically transition to scanning their systems against the latest SAP guidance with no operational burden.
  • Protect IP and CUI: Gain deep visibility into who is accessing sensitive technical data within your SAP, with real-time alerts for unauthorized exports or suspicious behavior.
  • Accelerate Secure Digital Transformation: Shift security left by integrating Onapsis into your DevSecOps pipeline, ensuring that custom code and system changes are secure before they ever touch your production environment. Onapsis also helps identify any inherent tech debt, allowing you to not only identify it, but resolve it. 
  • Mission-Ready Intelligence: Leverage threat intel from Onapsis Research Labs, the same team that discovered the most critical vulnerabilities in SAP and Oracle, to defend against A&D-specific attack vectors.
  • Proactive Threat Detection: Utilize the industry’s largest library (2,500+) of pre-built detection rules specific for SAP enterprise threat detection. A&D organizations are able to accelerate remediation by understanding the root cause of threats and receiving clear guidance on how to mitigate them. 

Case Study: Top-Tier Defense Contractor

Global Defense Leader Secures SAP GovCloud Migration and Achieves Audit Readiness

Challenge 

A leading defense contractor was migrating its core SAP environment to a secure cloud to meet new government requirements. Their security team lacked the specialized expertise to verify that the new cloud configuration met DFARS/ITAR standards, and manual auditing was causing significant project delays.

Solution

By implementing the Onapsis Platform, the contractor automated their vulnerability management and compliance reporting. They were able to identify and remediate over 200 high-risk misconfigurations in their new environment before going live.

Results

Improved developer skills by immediately flagging vulnerabilities with specific and actionable guidance for business risk and remediation.

  • 100% visibility into SAP application-layer risks across on-prem and cloud environments.
  • 85% faster audit preparation time for NIST 800-171 compliance.
  • Zero critical vulnerabilities in production following the go-live of their secure cloud instance.
  • Reduced effort and time spent on previously manual code reviews.

The post SAP Security for Aerospace & Defense appeared first on Onapsis.

]]>
From Discovery to Defense: SAP & Onapsis Joint Response to Zero-Day CVE-2025-31324 https://onapsis.com/resources/webinars/sap-onapsis-joint-response-to-zero-day-cve-2025-31324-webinar/ Thu, 05 Feb 2026 18:52:41 +0000 https://onapsis.com/?p=35424 In this webinar you’ll get a look at how responsible security research and collaboration worked to reduce risk and accelerate guidance, patching, and response.

The post From Discovery to Defense: SAP & Onapsis Joint Response to Zero-Day CVE-2025-31324 appeared first on Onapsis.

]]>

ON DEMAND WEBINAR

From Discovery to Defense: SAP & Onapsis Joint Response to Zero-Day CVE-2025-31324

The post From Discovery to Defense: SAP & Onapsis Joint Response to Zero-Day CVE-2025-31324 appeared first on Onapsis.

]]>
From Discovery to Defense: SAP & Onapsis Joint Response to Zero-Day CVE-2025-31324 https://onapsis.com/resources/webinars/sap-onapsis-joint-response-to-zero-day-cve-2025-31324-2/ Thu, 05 Feb 2026 17:11:19 +0000 https://onapsis.com/?p=35422 In this webinar you’ll get a look at how responsible security research and collaboration worked to reduce risk and accelerate guidance, patching, and response.

The post From Discovery to Defense: SAP & Onapsis Joint Response to Zero-Day CVE-2025-31324 appeared first on Onapsis.

]]>
On Demand

When zero-day CVE-2025-31324 surfaced, organizations had to react quickly. SAP and Onapsis worked closely to analyze the threat, validate exploitation activity, and deliver protections for customers worldwide.

In this joint session, you’ll get a behind-the-scenes look at how security research and collaboration accelerate guidance, patching, and response to this zero-day. Hear from the experts about what happened, what was learned, and what every SAP customer should be doing now to strengthen their landscape.

Key Takeaways:

Recommended steps SAP customers should take to reduce future risk

  • SAP’s quick response to address CVE-2025-31324
  • How SAP and Onapsis collaborated to better understand what threat actors were exploiting
  • Timeline walkthrough: from discovery to analysis to guidance
  • What active exploitation revealed about modern SAP threat actors
  • How SAP & Onapsis Research Labs collaboration strengthens enterprise resilience

The post From Discovery to Defense: SAP & Onapsis Joint Response to Zero-Day CVE-2025-31324 appeared first on Onapsis.

]]>
Defending What Matters Most: Smarter, Faster Incident Response with Onapsis and Microsoft Sentinel for SAP https://onapsis.com/resources/podcasts/defending-what-matters-most-smarter-faster-incident-response-with-onapsis-and-microsoft-sentinel-for-sap/ Thu, 15 Jan 2026 14:23:25 +0000 https://onapsis.com/?p=35321 2025 has proven to be a real “wake up call” for SAP security, marked by critical zero-days, public exploits, a significant rise in sophisticated threat actor activity, and hundreds of global enterprises compromised after waves of targeted attacks that continue to this day. Security teams are struggling to keep pace – especially when it comes...

The post Defending What Matters Most: Smarter, Faster Incident Response with Onapsis and Microsoft Sentinel for SAP appeared first on Onapsis.

]]>
2025 has proven to be a real “wake up call” for SAP security, marked by critical zero-days, public exploits, a significant rise in sophisticated threat actor activity, and hundreds of global enterprises compromised after waves of targeted attacks that continue to this day. Security teams are struggling to keep pace – especially when it comes to unfamiliar, complex software such as SAP. These teams frequently lack the deep SAP threat insights and specialized exploit detection that today’s modern SAP attack landscape requires in order to effectively defend these mission-critical business systems.

Speakers

  • Alex Horan
    VP of Product Management
    Onapsis
  • Martin Pankraz
    Integration Ninja Cat
    Microsoft

The post Defending What Matters Most: Smarter, Faster Incident Response with Onapsis and Microsoft Sentinel for SAP appeared first on Onapsis.

]]>
The Technology Leader’s 2025 Agenda for SAP https://onapsis.com/resources/podcasts/the-technology-leaders-2025-agenda-for-sap/ Thu, 15 Jan 2026 14:20:35 +0000 https://onapsis.com/?p=35318 This on-demand webinar delves into the key findings from the SAPinsider Benchmark Research report, “The Technology Leader’s 2025 Agenda for SAP.” This session will break down the strategies and investments that technology leaders are prioritizing as they navigate the shift to SAP S/4HANA and the growing influence of AI. In this session, we’ll cover: Speaker...

The post The Technology Leader’s 2025 Agenda for SAP appeared first on Onapsis.

]]>
This on-demand webinar delves into the key findings from the SAPinsider Benchmark Research report, “The Technology Leader’s 2025 Agenda for SAP.” This session will break down the strategies and investments that technology leaders are prioritizing as they navigate the shift to SAP S/4HANA and the growing influence of AI.

In this session, we’ll cover:

  • Business Priorities: Discover the top business priorities for technology leaders in 2025, with a deep dive into why increasing process efficiency and building an AI strategy are at the top of the list.
  • Investment Trends: Understand where technology leaders are directing their budgets, including strategic investments in current and new AI technologies, SAP S/4HANA, and data warehousing platforms.
  • The Talent Gap: Learn about the most in-demand SAP-related skills and how companies are preparing their teams for the challenges of SAP S/4HANA migration and AI deployment.
  • Overcoming Challenges: Hear about the biggest roadblocks to AI deployment, such as a lack of clean data and security concerns, and learn how to address them responsibly.

Speaker

Craig Powers
Research Analyst
SAP Insider

The post The Technology Leader’s 2025 Agenda for SAP appeared first on Onapsis.

]]>
Cybersecurity Threats and Challenges to SAP Systems 2025 https://onapsis.com/resources/podcasts/cybersecurity-threats-and-challenges-to-sap-systems-2025-2/ Thu, 15 Jan 2026 14:18:36 +0000 https://onapsis.com/?p=35316 Over 92% of organizations identify the data in their SAP systems as mission-critical or highly important. Yet, the cybersecurity landscape is more challenging than ever. Onapsis, in collaboration with SAPinsider, presents the findings of their latest research report, Cybersecurity Threats and Challenges to SAP Systems. In this on-demand webinar, you’ll gain crucial insights into the...

The post Cybersecurity Threats and Challenges to SAP Systems 2025 appeared first on Onapsis.

]]>
Over 92% of organizations identify the data in their SAP systems as mission-critical or highly important. Yet, the cybersecurity landscape is more challenging than ever. Onapsis, in collaboration with SAPinsider, presents the findings of their latest research report, Cybersecurity Threats and Challenges to SAP Systems.

In this on-demand webinar, you’ll gain crucial insights into the evolving threat landscape, including why data exfiltration has become the number one concern for SAP systems. We’ll also cover the number one challenge organizations face: keeping up with security notes and patches.

In this webinar, you’ll learn:

  • The top cybersecurity threats to SAP systems in 2025, and how they’ve shifted.
  • Key drivers behind your cybersecurity strategy, from protecting sensitive data to keeping systems online.
  • The biggest challenges organizations face in securing SAP systems, and how to overcome them.
  • The cybersecurity investments and actions leading professionals are prioritizing.
  • Actionable strategies to mature your defenses and take control of your SAP landscape’s security today.

Speakers

Robert Holland
Vice President and Research Director
SAP Insider

The post Cybersecurity Threats and Challenges to SAP Systems 2025 appeared first on Onapsis.

]]>
Securing Your Future: Preparing for a Successful SAP RISE Transformation https://onapsis.com/resources/podcasts/securing-your-future-preparing-for-a-successful-sap-rise-transformation/ Thu, 15 Jan 2026 14:16:38 +0000 https://onapsis.com/?p=35314 Understand how the shared responsibility model is essential to your SAP RISE transformationThe decision to migrate to SAP RISE represents a significant opportunity, but it also introduces a fundamental shift in how security is managed. A successful transformation hinges on a clear understanding of the SAP RISE shared responsibility model—who does what and when. A...

The post Securing Your Future: Preparing for a Successful SAP RISE Transformation appeared first on Onapsis.

]]>
Understand how the shared responsibility model is essential to your SAP RISE transformation
The decision to migrate to SAP RISE represents a significant opportunity, but it also introduces a fundamental shift in how security is managed. A successful transformation hinges on a clear understanding of the SAP RISE shared responsibility model—who does what and when. A proactive approach to this model is critical for laying a strong foundation and avoiding costly issues down the line.

This session will cover:

  • The key security differences between your current on-premise environment and a future cloud-based model, and how the shared responsibility model redefines your role.
  • How to assess your existing security posture and align it with the responsibilities you will retain in the SAP RISE cloud.
  • Best practices for developing a robust pre-migration security strategy that leverages the shared responsibility framework to minimize risk.
  • A roadmap for protecting your data and systems by clearly defining your duties and those of SAP.

Speakers

  • Marc Rosson
    Enterprise Architect
    Snohomish County PUD
  • Ashlee Fisher
    Strategic Account Manager
    Onapsis
  • Paul Kurchina | Moderator
    Enterprise Architect SAP Community Orchestrator and Evangelist
    Enterprise Architect SAP Community

The post Securing Your Future: Preparing for a Successful SAP RISE Transformation appeared first on Onapsis.

]]>
The SAP Zero-Day Wake-Up Call: What CISOs and CIOs Need to Know https://onapsis.com/resources/podcasts/the-sap-zero-day-wake-up-call-what-cisos-and-cios-need-to-know/ Thu, 15 Jan 2026 14:13:39 +0000 https://onapsis.com/?p=35312 In recent months, an unprecedented wave of SAP zero-day attacks exposed critical structural weaknesses in the security programs of hundreds of the world’s leading organizations—raising urgent questions about detection, response, and long-term resilience of their business-critical applications. And while this made major headlines, many business leaders are still scrambling to understand what happened, what this...

The post The SAP Zero-Day Wake-Up Call: What CISOs and CIOs Need to Know appeared first on Onapsis.

]]>
In recent months, an unprecedented wave of SAP zero-day attacks exposed critical structural weaknesses in the security programs of hundreds of the world’s leading organizations—raising urgent questions about detection, response, and long-term resilience of their business-critical applications. And while this made major headlines, many business leaders are still scrambling to understand what happened, what this means for their organization, and how to be protected against future attacks.

Cybersecurity leaders from EclecticIQ, Mandiant, NightDragon, and Onapsis come together to unpack these threats—from initial discovery of in-the-wild SAP exploitation and dissection of the first-ever SAP zero-day, to coordinated disclosure, patching, and proactive defense strategies.

What you will learn?
You will gain an inside look at how advanced threat actors are targeting SAP applications, what threat intelligence reveals about ongoing exploitation campaigns, and why traditional defenses often fall short. You’ll also walk away with practical guidance on how to assess risk, accelerate remediation, and harden SAP environments against future zero-day threats.

The post The SAP Zero-Day Wake-Up Call: What CISOs and CIOs Need to Know appeared first on Onapsis.

]]>
Enforce Secure Transport Workflows Across Your SAP Landscape https://onapsis.com/resources/solution-briefs/control-tms/ Thu, 18 Dec 2025 15:36:57 +0000 https://onapsis.com/?p=35056 Prevent Vulnerabilities Before They Ever Hit Production

The post Enforce Secure Transport Workflows Across Your SAP Landscape appeared first on Onapsis.

]]>
Prevent Vulnerabilities Before They Ever Hit Production

This document outlines Onapsis Control for securing SAP Transport Management System (TMS) workflows. SAP TMS is the backbone of change movement, but each transport can be a vector for risk, potentially introducing malicious, vulnerable, or poorly written code into production.

The Problem

  • Without transport-level security scanning, critical findings can be deployed to production.
  • This can lead to outages, data breaches, or compliance violations, which are significantly more expensive and disruptive to fix post-deployment.

Secure Transports with Onapsis Control: Onapsis Control integrates into SAP TMS to automatically scan transports before importing ABAP custom code or configuration changes.

  • It empowers teams to block transports when critical vulnerabilities are detected, ensuring only safe packages reach production.
  • Control checks each transport request against policies, test cases, and threat intelligence.
  • Transports with findings can be blocked, flagged for review, or overridden with documented exceptions, all without disrupting the existing SAP change workflow.

Key Features and Benefits

  • Embed Security into Transport Governance:
    • Instant scanning at import time.
    • Automatic blocking of risky transports.
    • Security gates and policy enforcement ensure consistent standards.
  • Save Cost and Avoid Production Disasters:
    • Preemptive failure detection reduces remediation cost.
    • Fewer rollback events and emergency fixes improve system stability.
  • Stay Updated with Latest Threats:
    • Continuous updates from Onapsis Research Labs ensure protection against the latest SAP-specific threats.
    • Audit-ready logs and reporting provide a comprehensive record of every scan, block, or override for traceability.

The post Enforce Secure Transport Workflows Across Your SAP Landscape appeared first on Onapsis.

]]>