En Onapsis, no solo somos líderes de soluciones, también somos líderes de pensamiento. Aquí encontrará una creciente biblioteca de materiales para ayudarlo a desarrollar su estrategia de ciberesiliencia. Con mayor claridad sobre la seguridad y el cumplimiento de las aplicaciones esenciales para el negocio podrá fomentar mejor y con confianza el desarrollo de su empresa.

Case Studies
Cloud Security
MercadoLibre is the largest e-commerce ecosystem in Latin America. It offers a wide range of services, including marketplace, payments, advertising and e-building solutions. Learn how they were able to secure their SAP systems during digital transformation to the cloud with the Onapsis Security Platform.
Webinars
SAP Security
With the GDPR enforcement date of May 2018 and steep fines of up to 4% of profit or €20 million looming, organizations are still struggling to understand this complicated policy and how they will adhere to it.
Webinars
Oracle Security
With the recent announcement of Onapsis Security Platform (OSP) for Oracle E-Business Suite (EBS) applications, this webcast will demo and highlight the functionality that will enable organizations using Oracle EBS to manage the security and compliance of these critical yet complex applications within a constantly shifting threat landscape.
Webinars
Security teams seek to defend against cyber threats. Audit strives for compliance (and to avoid non-compliance) with industry and regulatory requirements. The CIO needs a modern business dependent on digital assets to run smoothly. And at the center of these concerns are the business-critical applications such as SAP and Oracle on which the organization depends for everything from strategic planning to everyday operations. Who is responsible for keeping these assets secure and assuring all these priorities – and how do they address the unique requirements of these platforms?
Webinars
Constant compliance with audit mandates facing the organization is a critical objective for all Internal Audit teams. With heightened regulatory scrutiny and new and evolving mandates, it is imperative to ensure that our most critical data is assessed for risk and compliance on a continuous basis.
Webinars
Join Onapsis CTO, JP Perez-Etchegoyen, for an overview of this critical vulnerability including what information can be compromised. He will discuss remediation steps to ensure your applications are safe and discuss best practices for a business critical application security program.
Webinars
SAP Security
With SAP cybersecurity becoming a boardroom level discussion, aligning internal teams to protect these critical assets can be a tricky task. CISO’s, Infosec/BASIS, and Audit/Compliance teams often face initiatives with competing priorities, making it difficult to implement targeted strategies to protect SAP systems in a rapidly-shifting threat landscape.
Webinars
SAP Security
Every enterprise uses cloud computing services to some degree – tools such as Gmail, Twitter, and Dropbox are ubiquitous; as are business applications like Salesforce, ServiceNow, and Quickbooks.
White Papers
Cloud Security, SAP Security
This whitepaper explores major security issues for SAP cloud deployments such as how cloud services are different, and then map existing security controls to fit within cloud deployments.
Infographics
SAP Security
HANA systems store and process the most critical business information in an organization. If an SAP/HANA platform is breached, an intruder would be able to perform different attacks such as espionage, sabotage and fraud.
Webinars
As organizations begin to migrate their SAP implementations to private, public, or hybrid cloud environments, security must remain a top priority. While migrating to the cloud is an organizational goal to maximize resources and data, it can be a complex process. If not securely done, mission-critical assets and processes remain at risk to cyberattack.
White Papers
SAP Security
10 einfache Fragen, die den Handlungsbedarf zum Thema Sicherheit bei Ihren geschäftskritischen Applikationen aufdecken

Solicitud de cortesía
Ilustración de Riesgos de Negocios

Examine la postura de seguridad y la exposición al riesgo de sus aplicaciones críticas para el negocio a fin de determinar el impacto potencial de un ataque cibernético en su organización.

Solicite una evaluación