At Onapsis, we’re not only solution leaders—we’re also thought leaders. Here you’ll find a growing library of materials to help you build your cyber resilience strategy. The more light we can shed on business-critical application security and compliance, the better you can drive your business forward, confidently.

Publications
SAP Security
Implementing proper security controls for a BusinessObjects implementation is a complex process.
Publications
SAP Security
In all SAP implementations there are many reasons why organizations would need to make changes and updates on a regular basis.
Publications
SAP Security
By design the SAP Solution Manager is connected to all SAP systems (i.e. ERP, CRM, BI, etc), making it a critical component of any SAP implementation: if successfully exploited by an attacker, all the satellite SAP environments, and therefore their business information, could be completely compromised.
Publications
SAP Security
The SAProuter is one of the most critical components of any SAP implementation. Working as an application-level gateway, it is usually connected to untrusted networks and is intended to restrict access to the backend SAP systems.

Request a
Business Risk Illustration

Examine the security posture and risk exposure of your business-critical applications to determine the potential impact of a cyberattack on your organization.

Engage