BOSTON, July 11, 2018 - Onapsis, the global experts in ERP and business-critical application cybersecurity and compliance, and SAP partner, today announce the release of “Onapsis Secure SAP Activate.” This guide provides a comprehensive complement to the SAP Activate methodology, incorporating cybersecurity controls and checks across the different phases and tasks with the ultimate goal of increased security for implementations.
SAP Activate, the methodology which incorporates concepts of agile and iterative approaches, is a key component for supporting deployment of the latest SAP technologies, with a strong focus on SAP S/4HANA. Organizations are currently using this methodology to perform complex digital transformation or cloud migration projects to SAP S/4HANA and, while comprehensive, this set of guidelines does not include cybersecurity as part of the objectives of these projects. This could lead to costly delays, compliance failures or even the risk of data breaches.
“At Onapsis we have a lot of customers that are actively planning or are already in the middle of costly and complex digital transformation projects. While it is a best practice to use a methodology such as SAP Activate, organizations also need to ensure that security is something that is incorporated into these projects from the start and throughout all stages. With this guide we are hoping to utilize a framework that is already understood by our customers and add security as an enhancement to each stage, allowing them to achieve security and compliance of their critical applications,” said Juan Pablo Perez-Etchegoyen, CTO, Onapsis.
The Onapsis Secure SAP Activate guide is available on the Onapsis website. Additionally, Perez-Etchegoyen will be hosting a live webcast in conjunction with ASUG on August 22, 2018 to walk through each phase of the methodology and how organizations can save significant costs and time by applying security throughout each stage of the process.
About Onapsis
Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle ERP and business-critical applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses.
Headquartered in Boston, MA, Onapsis serves over 200 customers including many of the Global 2000. Onapsis's solutions are also the de-facto standard for leading consulting and audit firms such as Deloitte, IBM, Infosys and PwC.
Onapsis solutions include the Onapsis Security Platform™, which is the most widely-used SAP-certified cybersecurity solution on the market. Unlike generic security products, Onapsis's context-aware solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Through open interfaces, the platform can be integrated with leading SIEM, GRC and network security products, seamlessly incorporating enterprise applications into existing vulnerability, risk and incident response management programs.
These solutions are powered by the Onapsis Research Labs, who continuously provide leading intelligence on security threats affecting SAP and Oracle enterprise applications.
Experts at the Onapsis Research Labs were the first to lecture on SAP cyberattacks and have uncovered and helped fix hundreds of security vulnerabilities to-date affecting SAP Business Suite, SAP HANA, SAP Cloud and SAP Mobile applications, as well as Oracle JD Edwards and Oracle E-Business Suite platforms. This patented technology is well known, industry wide, and has gained Onapsis recognition on the Deloitte Technology Fast-500, as a Red Herring North America Top 100 company and a SINET 16 Innovator.
For more information, please visit www.onapsis.com, or connect with us on Twitter, Google+, or LinkedIn.
Onapsis and Onapsis Research Labs are registered trademarks of Onapsis, Inc. All other company or product names may be the registered trademarks of their respective owners.