At Onapsis, we’re not only solution leaders—we’re also thought leaders. Here you’ll find a growing library of materials to help you build your cyber resilience strategy. The more light we can shed on business-critical application security and compliance, the better you can drive your business forward, confidently.

Publications
SAP Security
SAP HANA is being pushed by SAP as the absolute in-memory database for its products, and more recently, as a standalone platform.
Publications
SAP Security
When thinking of SAP security we tend to always think of SAP servers and pay little attention to the tools used by end-users that connect to most of our SAP Systems, as well as the way those tools are used.
Publications
SAP Security
Every organization running SAP to support its business-critical processes has typically implemented several systems in complex scenarios.
Videos
Corporate, SAP Security
IT Harvest 2015 Video Interview Series. San Francisco, CA.
Videos
Oracle Security, SAP Security
Core business data, processes and applications running on SAP systems are attractive targets of advanced threats and sophisticated attacks from cyber criminals. These areas of an enterprise house sensitive customer, financial, proprietary and employee data. With attackers employing more advanced techniques, such as attacking from inside the network or slow and stealthy advanced attacks, traditional modes of security are no longer effective to safeguard a company.
Videos
Oracle Security, SAP Security
In today's world, serious cyber-security breaches are almost inevitable. With business-critical applications such as CRM and ERP housing the “crown jewels” of anorganization, it is the biggest target for security breaches. Chris Christiansen, Program Vice President of Security Products and Services at IDC explains how organizations can take a more proactive stance on protecting their business-critical applications.
Videos
Corporate
As part of the NoSuchCon conference, 10 cyber-security experts were interviewed about their stance on the state of the industry. Check out Ezequiel Gutesman’s insight on industry hot topics, his expectations for the future of business-critical application security, and upcoming Onapsis projects.
Videos
SAP Security
Product Manager Alex Horan briefly demoing the Onapsis Security Platform
Videos
SAP Security
If your organization has implemented SAP BusinessObjects, you know that it is a multi-tiered web enabled product designed to analyze business data, and therefore processes the Business Intelligence information of your organization. Implementing proper security controls for a BusinessObjects implementation is a complex process.
Videos
SAP Security
From the HITB Conference - Onapsis discussion on Attacking the SAP Solution Manager. More info and assistance at http://www.sapsecurity.org
Case Studies
Cloud Security
MercadoLibre, Large Enterprise, E-Commerce Marketplace, is able to streamline the detection of SAP application security risks.

Request a
Business Risk Illustration

Examine the security posture and risk exposure of your business-critical applications to determine the potential impact of a cyberattack on your organization.

Engage