The Onapsis Security Blog

The world of business-critical application security and compliance is dynamic, with new developments happening on a continuous basis. Read our blog posts for recommendations, insights and observations on the latest news for safeguarding your SAP® and Oracle® applications.

Thumbnail
Is Enabling the SSL Connection to your Java System Enough?

Is Enabling the SSL Connection to your Java System Enough?

Secure Sockets Layer (SSL)/Transport Layer Security (TLS) is a protocol used to encrypt communications between two entities by exchanging public and private keys to create secure sessions between them. In this blog, I will explain how you can enable SSL (Secure Socket Layer) in your SAP Java system and how you can redirect the HTTP requests to HTTPS protocol.
Thumbnail
ERP Security & IT General Controls: ‘Questions Every Organization Needs to Ask’

ERP Security & IT General Controls: Questions Every Organization Needs to Ask

A recent IDC survey reports that 64% of organizations have suffered an ERP system breach in the past 24 months. To ensure that your organization has the proper processes and controls in place to keep SAP and Oracle E-Business Suite business-critical applications secure and in compliance, we are providing guidance and questions to ask.
Thumbnail
Blog Banner

Automating SOX Controls Testing

With ERP systems, such as SAP and the Oracle E-Business Suite (EBS) at the core of your business, these systems also must be a focus of your SOX audit. Business-critical applications including your financials are supported by your ERP systems and issues can easily become material weakness. As a result, it is necessary to stay up-to-date regarding what different industries are doing to protect the integrity of financial statements while reducing the costs of implementing and testing the internal controls.
Subscribe to Research

Request a
Business Risk Illustration

Onapsis offers a complimentary assessment of your SAP and Oracle EBS systems to discover where risks and attack surfaces exist within your environment, including business impact, exploit potential, and compliance violations.

Request a Business Risk Illustration