Top 20 Critical Controls for Cloud ERP Customers

Cloud technologies are being increasingly adopted by organizations, regardless of their size, location or industry. When it comes to business-critical applications, typically known as enterprise resource planning (ERP) applications, it is no different.

A Security-by-Design Approach to Protecting Your Business-Critical Applications

98% OF THE FORTUNE 100 USE SAP OR ORACLE EBS

77% OF THE WORLD’S TRANSACTION REVENUE TOUCHES THESE ERP SYSTEMS

We have seen an escalation in attacks against ERP systems in the recent decade. This has led the U.S. Department of Homeland Security to issue multiple CERT alerts around SAP cyber threats. Traditional approaches don’t do enough to secure the ERP layer. 

Download our white paper to learn:

  • The evolution of cyberattacks targeting business-critical applications
  • Why traditional cybersecurity approaches don’t work
  • How to create a programmatic approach to business application cybersecurity

ERP Security and Compliance: Sarbanes-Oxley (SOX)

Securing your Enterprise Resource Planning (ERP) systems: should you be concerned and what should you be doing?

This white paper discusses the approach publicly-traded companies should be taking to secure their ERP systems and maintain regulatory compliance. The paper reviews governance requirements for financial systems as identified by SOX as well as how to define an automated, repeatable method for continually improving and maintaining security and compliance requirements with The Onapsis Platform.

The Secure Transformation to HANA®

SAP® has approximately 380,000 customers and as of April 2019, only 10,900 were using S/4HANA®, the application that seamlessly builds on the HANA platform and has existed since 2015. Looking ahead, however, exponential growth is inevitably just around the corner as a result of SAP announcing that systems that are not based on HANA technologies will most likely no longer be supported after 2025. When properly planned and implemented, the switch to S/4HANA can be an important milestone toward a digital enterprise. To do this, companies must include a cybersecurity component to their move to S/4HANA. Using the SAP Activate methodology, we have analyzed each phase to include security in order to have a successful migration. Download our white paper to learn more.

Onapsis Appoints Gerhard Eschelbeck to Board

Onapsis has announced the appointment of former Google Vice President of Security & Privacy Engineering (CISO) Gerhard Eschelbeck to the company’s board of directors. Eschelbeck brings strong experience in transforming traditional security solutions and delivering them through the cloud, which will help Onapsis guide customers to the cloud with confidence. Hear what Gerhard has to say about joining the team.

Why Securing ERP Systems is Critical for CISOs

Jason Fruge, CISO at Fossil, discusses the importance of securing business-critical ERP systems, such as SAP and Oracle, and how they’ve become a blind spot in the overall IT strategy. Hear his advice on how to overcome the challenge and take on ERP security in your organization. 

How ERP Security Enables Audit and Compliance

Larry Harrington, Former Chair of the Institute of Internal Auditors and Former Chief Audit Executive for Raytheon Company, discusses how ERP security enables the audit and compliance process within organizations, aligning CISOs with the internal audit team and maintaining compliance 24/7.