The Onapsis Blog

The world of business-critical application security and compliance is dynamic, with new developments happening on a continuous basis. Read our blog posts for recommendations, insights and observations on the latest news for safeguarding your SAP® and Oracle® applications.

Alex Horan

Alex Horan

Vice President of Product Management

Alex Horan, Vice President of Product Management for Onapsis, is responsible for the development of ERP vulnerability assessment, testing and securing solutions. Alex has over 15 years of experience working within the IT security industry, covering both software and hardware. He brings a deep knowledge and understanding of vulnerability assessment and penetration testing, as well as systems and network administration and auditing, to his work at Onapsis. Alex has previously worked for mid- and large-sized companies helping to design and maintain their security posture.

Thumbnail

How the Proposed OWASP TOP 10 Changes Would Affect SAP and Oracle

While only in release candidate form, the current proposed changes to the OWASP Top 10 Application Security Risks provide clear guidance for any enterprise that needs to secure and protect their critical enterprise business applications. In general, the OWASP Top 10 and these two additions can be directly applied to an approach and methodology for securing ERP based business applications and systems.

Thumbnail

Now Announcing: Splunk Integration with OSP!

As the Onapsis Security Platform continues to become more widely adopted throughout global enterprises, we have received an overwhelming number of requests to integrate OSP with our customer’s existing SIEM solutions. Based on these requests, we are excited to announce that we have officially launched an integration with Splunk Enterprise. This marks our second SIEM integration following IBM’s QRadar which we launched earlier this month.  

Request a
Business Risk Illustration

OPERATIONAL RESILIENCY ASSESSMENT

Prevent application downtime and costly business disruption

Request an Assessment
AUDIT EFFICIENCY ASSESSMENT

Eliminate resource consuming manual audit processes

Request an Assessment
CYBER RISK 
ASSESSMENT

Reduce vulnerabilities and misconfiguration to protect the business

Request an Assessment