Bei Onapsis sind wir nicht nur führend im Bereich Lösungen - wir sind auch Vordenker. Hier finden Sie eine wachsende Bibliothek von Materialien, die Ihnen beim Aufbau Ihrer Cyber-Resilienz-Strategie helfen. Je mehr Transparenz wir zum Thema Sicherheit und Einhaltung geschäftskritischer Anwendungen schaffen können, desto besser können Sie Ihr Unternehmen zuversichtlich voranbringen.

Webinars

Duration: 36 minutes
Available On Demand

Live on 10/29/2019

We highlight the ten patches released for Oracle E-Business Suite (EBS) and help you prioritize which ones to apply first. 

Solution Briefs

Changes to SAP production systems through SAP transports pose a high security risk. These potential “Trojan horses” sneak in malicious content or changes, providing a gateway for espionage, data theft and data manipulation. The damage to an affected company can be considerable, ranging from financial and reputation loss to substantial penalties associated with violations of legal data protection regulations.

Nevertheless, many companies are still unaware of the potential dangers of transports for SAP security. In addition, conventional analysis tools are unable to identify the Trojans hidden in SAP transport files. Transport analysis from Onapsis closes this gap with minimal effort.

Download the Battling Trojan Horses in Your SAP® Transports e-book now to learn more.

Case Studies
The US Department of Defense (DOD) Health Agency needed to prove the ABAP code for their SAP-based logistics system was secure and met strict DOD Authority to Operate (ATO) standards. Discover how Onapsis code analysis enabled the DOD to prove its ABAP code met these standards, while also saving developers significant time compared to manual analysis and improving overall code quality.
Webinars

Duration: 1 hour
Available On Demand

Live date: 10/10/2019

For your business to survive a security incident, it needs to get back to doing business as soon as possible --back to serving customers, cutting paychecks, and running production lines. If your organization were hit by a major incident, how badly would your operations be interrupted and how many customers would you lose for good? In this webinar, learn how to prepare today, to make your business more resilient to cyber attacks tomorrow.

Videos
The misconception about Enterprise Risk and ERP Applications. Chris Wysopal - Co-founder and CTO of cloud-based application security firm Veracode, and part of the Onapsis´Board of Advisors
Webinars

Duration: 1 hour, 30 minutes
Available On Demand

Live Date: 9/10/2019

Code Execution in Production Systems:
Anonymous, Unattended, Unnoticed. The SAP transport management system is a particularly attractive target for external attackers. In this hands-on presentation, we will discuss nine different ways an attacker can execute code directly in the production system.

Infographics
IDC survey of 430 IT decision makers reveals 64% have reported a breach in their SAP or Oracle E-Business Suite (EBS) systems in the past 24 months.
Webinars

Duration: 30 minutes
Available On Demand

Live Date: 9/17/2019

Join us for a 30-minute webinar analyzing these September patches and outlining how to implement them in your SAP system.

 

Videos
Corporate
Watch as the Head of SAP at Sanofi, Frederic Maille discusses his journey to secure SAP - how he aligned internal teams, utilized Onapsis to determine the company's level of risk and took actions to implement a cybersecurity program for this business-critical application.
White Papers

Onapsis has worked together with the Oracle E-Business Suite (EBS) security team to jointly produce a new white paper about Oracle EBS security. 

Webinars

Duration: 31 minutes
Available On Demand

Live Date: 8/23/2019.

Join us for a 30-minute webinar analyzing these August patches and outlining how to implement them in your SAP system.

 

Webinars

Duration: 1 hour, 30 minutes
Available On Demand

Live Date: 8/21/2019

Highlights from the CSA Cloud Working Group - This webinar will review the 20 most critical controls that organizations should take into account when trying to secure their business-critical applications in the cloud.

Fordern Sie eine kostenlose
Geschäftsrisiko-Illustration an

Untersuchen Sie die Sicherheitslage und das Risiko Ihrer geschäftskritischen Anwendungen, um die möglichen Auswirkungen eines Cyberangriffs auf Ihr Unternehmen zu ermitteln.

Engagieren