At Onapsis, we’re not only solution leaders—we’re also thought leaders. Here you’ll find a growing library of materials to help you build your cyber resilience strategy. The more light we can shed on business-critical application security and compliance, the better you can drive your business forward, confidently.


Duration: 58 minutes
Available On Demand

Live Date: 12/04/2019

In this joint session you will learn from security experts from Onapsis and Oracle about how to secure your E-Business Suite environment, as well as actionable hardening recommendations.


Duration: 34 minutes
Available On Demand

Live Date: 11/21/2019

Learn why Security Solutions for SAP applications are essential to protect your sensitive data. Understand how to validate and remediate security vulnerabilities in your custom code to prevent external or internal attackers to get access to your sensitive HR or Financial Data. 



Duration: 36 minutes
Available On Demand

Live on 10/29/2019

We highlight the ten patches released for Oracle E-Business Suite (EBS) and help you prioritize which ones to apply first. 


Changes to SAP production systems through SAP transports pose a high security risk. These potential “Trojan horses” sneak in malicious content or changes, providing a gateway for espionage, data theft and data manipulation. The damage to an affected company can be considerable, ranging from financial and reputation loss to substantial penalties associated with violations of legal data protection regulations.

Nevertheless, many companies are still unaware of the potential dangers of transports for SAP security. In addition, conventional analysis tools are unable to identify the Trojans hidden in SAP transport files. Transport analysis from Onapsis closes this gap with minimal effort.

Download the Battling Trojan Horses in Your SAP® Transports e-book now to learn more.

Case Studies
The US Department of Defense (DOD) Health Agency needed to prove the ABAP code for their SAP-based logistics system was secure and met strict DOD Authority to Operate (ATO) standards. Discover how Onapsis code analysis enabled the DOD to prove its ABAP code met these standards, while also saving developers significant time compared to manual analysis and improving overall code quality.

Duration: 1 hour
Available On Demand

Live date: 10/10/2019

For your business to survive a security incident, it needs to get back to doing business as soon as possible --back to serving customers, cutting paychecks, and running production lines. If your organization were hit by a major incident, how badly would your operations be interrupted and how many customers would you lose for good? In this webinar, learn how to prepare today, to make your business more resilient to cyber attacks tomorrow.


Duration: 1 hour, 30 minutes
Available On Demand

Live Date: 9/10/2019

Code Execution in Production Systems:
Anonymous, Unattended, Unnoticed. The SAP transport management system is a particularly attractive target for external attackers. In this hands-on presentation, we will discuss nine different ways an attacker can execute code directly in the production system.

IDC survey of 430 IT decision makers reveals 64% have reported a breach in their SAP or Oracle E-Business Suite (EBS) systems in the past 24 months.

Duration: 30 minutes
Available On Demand

Live Date: 9/17/2019

Join us for a 30-minute webinar analyzing these September patches and outlining how to implement them in your SAP system.


Watch as the Head of SAP at Sanofi, Frederic Maille discusses his journey to secure SAP - how he aligned internal teams, utilized Onapsis to determine the company's level of risk and took actions to implement a cybersecurity program for this business-critical application.
White Papers

Onapsis has worked together with the Oracle E-Business Suite (EBS) security team to jointly produce a new white paper about Oracle EBS security. 


Duration: 31 minutes
Available On Demand

Live Date: 8/23/2019.

Join us for a 30-minute webinar analyzing these August patches and outlining how to implement them in your SAP system.


Request a
Business Risk Illustration


Prevent application downtime and costly business disruption

Request an assesment

Eliminate resource consuming manual audit processes

Request an assesment

Reduce vulnerabilities and misconfiguration to protect the business

Request an assesment