{"id":149008,"date":"2025-02-17T07:00:00","date_gmt":"2025-02-17T06:00:00","guid":{"rendered":"https:\/\/e326.greatsolution.dev\/?p=149008"},"modified":"2025-02-12T09:56:57","modified_gmt":"2025-02-12T08:56:57","slug":"code-security-for-sap-btp","status":"publish","type":"post","link":"https:\/\/e326.greatsolution.dev\/en\/code-security-for-sap-btp\/","title":{"rendered":"Code security for SAP BTP"},"content":{"rendered":"<p>SAP continues to drive forward the introduction of the S\/4 ecosystem in the cloud. As a result, companies are increasingly turning to SAP BTP for the development of individual applications. Given the scale of these projects, it is more important than ever to ensure the security and consistency of the code. Onapsis, a global provider of SAP cybersecurity and compliance, has responded to this development by introducing a new solution package within its Control product line. This improves the functions for testing application security for the SAP Business Technology Platform (BTP).<\/p>\n\n\n\n<p>The new offering supports customers by enabling seamless, automated code scanning in SAP's most commonly used integrated development environments (IDEs) and Git repositories. This enables teams to accelerate development, automate manual tasks, increase security and minimize risk in their Rise-with-SAP and SAP BTP projects. Control supports SAP's most commonly used IDEs, including SAP Business Application Studio, Visual Studio Code and Eclipse, with Abap development tools. <\/p><div class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\" id=\"great-1115757884\"><a data-no-instant=\"1\" href=\"https:\/\/e326.greatsolution.dev\/en\/media-kit\/\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>This ensures that developers in Rise-with-SAP or SAP BTP environments can check their code for issues and vulnerabilities in the IDEs they are already using. \"We are excited to be the first provider of a comprehensive application security solution for BTP,\" said Sadik Al-Abdulla, Chief Product Officer at Onapsis. \"Companies are looking to modernize their legacy SAP ECC landscapes. Code security across the entire software development lifecycle has never been more important. With our advanced code security testing capabilities for BTP, developers can proactively find and fix vulnerabilities to deliver faster, more secure and successful Rise-with-SAP projects.\"<\/p>\n\n\n\n<p><a href=\"https:\/\/onapsis.com\/de\/\" target=\"_blank\" rel=\"noreferrer noopener\">onapsis.com\/en<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>New offering provides industry-leading application security testing for SAP BTP development.<\/p>","protected":false},"author":2368,"featured_media":149009,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[5,44060],"tags":[453,39870,20346],"coauthors":[39720],"class_list":["post-149008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management","category-mag-25-02","tag-abap","tag-btp","tag-cybersecurity","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"thumbnail":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-150x150.jpg",150,150,true],"medium":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-400x180.jpg",400,180,true],"medium_large":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-768x346.jpg",768,346,true],"large":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"image-100":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-100x45.jpg",100,45,true],"image-480":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-480x216.jpg",480,216,true],"image-640":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-640x288.jpg",640,288,true],"image-720":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-720x324.jpg",720,324,true],"image-960":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-960x432.jpg",960,432,true],"image-1168":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"image-1440":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"image-1920":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"1536x1536":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"2048x2048":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"bricks_large":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"bricks_large_square":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859.jpg",1000,450,false],"bricks_medium":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-600x450.jpg",600,450,true],"profile_24":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-24x24.jpg",24,24,true],"profile_48":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-48x48.jpg",48,48,true],"profile_96":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-96x96.jpg",96,96,true],"profile_150":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-150x150.jpg",150,150,true],"profile_300":["https:\/\/e326.greatsolution.dev\/wp-content\/uploads\/2025\/02\/shutterstock_2394268859-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Neues Angebot bietet branchenf\u00fchrende Tests der Anwendungssicherheit f\u00fcr die SAP-BTP-Entwicklung.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e326.greatsolution.dev\/en\/category\/it-management\/\" rel=\"category tag\">IT-Management<\/a>, <a href=\"https:\/\/e326.greatsolution.dev\/en\/category\/mag-25-02\/\" rel=\"category tag\">MAG 25-02<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e326.greatsolution.dev\/en\/author\/e3_magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/149008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/comments?post=149008"}],"version-history":[{"count":2,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/149008\/revisions"}],"predecessor-version":[{"id":149011,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/149008\/revisions\/149011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/media\/149009"}],"wp:attachment":[{"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/media?parent=149008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories?post=149008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/tags?post=149008"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e326.greatsolution.dev\/en\/wp-json\/wp\/v2\/coauthors?post=149008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}