At Onapsis, we’re not only solution leaders—we’re also thought leaders. Here you’ll find a growing library of materials to help you build your cyber resilience strategy. The more light we can shed on business-critical application security and compliance, the better you can drive your business forward, confidently.

Webinars
Some of the largest global companies were impacted including 13 enterprises which each generate over $10B in annual revenue. The vulnerability being exploited has been identified as the Invoker Servlet vulnerability, which was patched by SAP in 2010, and is being leveraged in tandem with a sensitive SAP Java application to remotely gain full administrative access to the SAP systems.
Reports
SAP Security
Understanding the DHS US-CERT Alert on SAP Cybersecurity
Videos
Corporate, SAP Security
Richard Stiennon interview Mariano Nunez, CEO and Co-founder of Onapsis, as part of IT-Harvest's 2016 Video Interview Series.
Infographics
SAP Security
This infographic outlines why protecting your business-critical applications running on SAP and Oracle are vital steps of any security strategy.
Infographics
SAP Security

When it comes to SAP cybersecurity, there is a very clear gap in perception between SAP professionals, security operations professionals, and business executives on where the division of responsibility lies. This infographic outlines steps your organization can take to begin operationalizing your SAP security strategy.

Download (FR)
Download (DE)

Reports
SAP Security
How are organizations truly managing cybersecurity risks in their SAP ecosystem? Ponemon Institute’s latest study of 607 global IT security practitioners reveals senior level perceptions about SAP, its security challenges, and the risk of data breaches and cyberattacks.
Webinars
SAP applications are targets of a new breed of breaches that are stealthy and easy to execute. The impact on an organization can result in financial fraud, sabotage or economic espionage
Publications
SAP Security
SAP HANA is being pushed by SAP as the absolute in-memory database for its products, and more recently, as a standalone platform.
Publications
SAP Security
When thinking of SAP security we tend to always think of SAP servers and pay little attention to the tools used by end-users that connect to most of our SAP Systems, as well as the way those tools are used.
Publications
SAP Security
Every organization running SAP to support its business-critical processes has typically implemented several systems in complex scenarios.
Videos
Corporate, SAP Security
IT Harvest 2015 Video Interview Series. San Francisco, CA.

Request a
Business Risk Illustration

Examine the security posture and risk exposure of your business-critical applications to determine the potential impact of a cyberattack on your organization.

Engage