ERP Security and Compliance: Sarbanes-Oxley (SOX)

Securing your Enterprise Resource Planning (ERP) systems: should you be concerned and what should you be doing?

This white paper discusses the approach publicly-traded companies should be taking to secure their ERP systems and maintain regulatory compliance. The paper reviews governance requirements for financial systems as identified by SOX as well as how to define an automated, repeatable method for continually improving and maintaining security and compliance requirements with The Onapsis Platform.

The Secure Transformation to HANA®

SAP® has approximately 380,000 customers and as of April 2019, only 10,900 were using S/4HANA®, the application that seamlessly builds on the HANA platform and has existed since 2015. Looking ahead, however, exponential growth is inevitably just around the corner as a result of SAP announcing that systems that are not based on HANA technologies will most likely no longer be supported after 2025. When properly planned and implemented, the switch to S/4HANA can be an important milestone toward a digital enterprise. To do this, companies must include a cybersecurity component to their move to S/4HANA. Using the SAP Activate methodology, we have analyzed each phase to include security in order to have a successful migration. Download our white paper to learn more.

Onapsis Appoints Gerhard Eschelbeck to Board

Onapsis has announced the appointment of former Google Vice President of Security & Privacy Engineering (CISO) Gerhard Eschelbeck to the company’s board of directors. Eschelbeck brings strong experience in transforming traditional security solutions and delivering them through the cloud, which will help Onapsis guide customers to the cloud with confidence. Hear what Gerhard has to say about joining the team.

Why Securing ERP Systems is Critical for CISOs

Jason Fruge, CISO at Fossil, discusses the importance of securing business-critical ERP systems, such as SAP and Oracle, and how they’ve become a blind spot in the overall IT strategy. Hear his advice on how to overcome the challenge and take on ERP security in your organization. 

How ERP Security Enables Audit and Compliance

Larry Harrington, Former Chair of the Institute of Internal Auditors and Former Chief Audit Executive for Raytheon Company, discusses how ERP security enables the audit and compliance process within organizations, aligning CISOs with the internal audit team and maintaining compliance 24/7.

10KBLAZE Threat Report

Based on hundreds of SAP implementation assessments and the proprietary threat intelligence of Onapsis, we estimate these exploits could affect 9 out of 10 SAP systems of more than 50,000 customers worldwide. We recommend you review and apply all relevant SAP security notes immediately.

CSA ERP Security Survey

Incidents and Misconceptions Both Increase as Critical ERP Systems Migrate

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment along with Onapsis are happy to present the findings from the first research survey on “Enterprise Resource Planning (ERP) Applications and Cloud Adoption.” The study offers greater insight into cloud preparation and migration, the features and benefits gained, and the security and privacy challenges for ERP systems in a cloud environment.

Download this document to get key findings and misconceptions that organizations have while moving their ERP applications to the cloud.

SAP & GDPR: Keeping Your Organization Ahead of the Upcoming EU Law

With the GDPR enforcement date of May 2018 and steep fines of up to 4% of profit or €20 million looming, organizations are still struggling to understand this complicated policy and how they will adhere to it. This guide aims to provide SAP customers an overview of GDPR, how it affects them and how they can begin a plan to become compliant.

By downloading this guide, you will learn:

  • Important details about GDPR
  • How to check if your organization manages EU citizen data
  • Which SAP systems handle citizen data
  • Methods to secure data housed in SAP systems
  • How to align your SAP security with GDPR compliance mandates

An Introduction to Oracle EBS Application Security

Until recently, Oracle security was regarded as database security or application roles and profiles by the majority of the information security community. While both of these security methods are certainly necessary, many threats to-date have been overlooked by auditing and information security practices, despite the fact that these threats could lead to greater business risk. 

The technical components of business-critical applications introduce specific security concerns that, if not mitigated properly, can be subject to cyberattacks with severe impact to the business. If vulnerabilities against these systems are exploited, confidentiality, integrity and/or availability of critical business information processed and stored in these systems are at risk of being compromised from internal or external attackers. 

Download this publication and become informed with the latest information about current and future risks facing Oracle applications, allowing different actors (financial managers, information security managers, Oracle administrators, auditors, consultants and others) to better understand the techniques and tools available to assess and mitigate them.