Onapsis, in collaboration with The Cloud Security Alliance (CSA), a not-for-profit, organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, has completed The Critical Controls Implementation for SAP white paper.
Cloud Security
Before You Migrate Critical Applications to the Cloud
In this post, we’ll explore some considerations for cloud migrations that help ensure security and success.
Webinar: Secure Migration Into The Cloud
Onapsis and Microsoft have partnered up to provide you with the most comprehensive cloud migration security information available on Thursday, August 27 at 10 AM ET.
Video: Cloud Security With Gerhard Eschelbeck
As organizations begin to make the natural move to the cloud, it’s important to remember that security will not be solved just by migrating.
Quantifying the Risk of ERP Downtime & the Quest for Operational Resiliency
How do you define downtime? In the world of IT, downtime is defined as “time during which a machine, especially a computer, is out of action or unavailable for use.” In a pre-cloud or pre-SAAS era, that definition provided an acceptable description of what actually took place. Then, everything changed.
Preparing Your Business-Critical Applications for a Cloud Migration
The cloud trend is unstoppable. More and more organizations are moving their on-premises business-critical applications to the cloud and starting to use native cloud solutions like SuccessFactors, Salesforce or Workday.
Helping Organizations Migrate ERP Systems to the Cloud—with Confidence
There is no doubt that moving an ERP system to the cloud is a massively complex project for any organization. The business-critical applications that run your business are most often supported by an ERP system such as SAP or the Oracle E-Business Suite. The success of this project is essential to the success of your organization.
The Forecast for Security is Cloud-y | Part 2
The leading cloud service providers take security very seriously. However, you can see in pretty much any cloud security survey, the biggest data breaches occur because of how customers adopt, configure and use the cloud.
The Forecast for Security is Cloud-y
Cloud transformation is one of the most important technology—and security—trends facing businesses today.
How to Secure SAP Cloud Extensions
As organizations mature their digital transformation initiatives and adopt innovation across business processes, there is often a cloud-based component in the equation. And when it comes to business processes, some of them can be adopted in a more standard fashion than others.