As organizations begin to make the natural move to the cloud, it’s important to remember that security will not be solved just by migrating. Security professionals still have to keep in mind the massive responsibility of keeping your customers’ personally identifiable information secure, even when in the cloud. That means building a partnership with the cloud provider, as well as maintaining security at the application layer. Watch the video below as Gerhard Eschelbeck, from Onapsis’s Board of Directors, discusses the importance of cloud security and protecting your mission-critical applications.

About the Author
As CEO and Co-Founder of Onapsis, Mariano drives the strategic direction of the company. Under his leadership, Onapsis has become one of the fastest-growing technology and cybersecurity companies in the world. With 20+ years of experience in the cybersecurity industry, both as an executive and as a cyber security expert, Mariano was the first to publicly present on cybersecurity risks affecting ERP platforms and how to mitigate them at major conferences such as RSA, Black Hat and SANS. Mariano’s contributions to the cybersecurity community include developing the first open-source SAP and ERP Penetration Testing frameworks, and uncovering critical zero-day vulnerabilities in SAP, Oracle, IBM, and Microsoft applications. Mariano’s insights are regularly featured in major media outlets such as CNN, Reuters, Wall Street Journal, Nasdaq, Fortune and The New York Times.
More about this author
Further Reading
What Is SAP Security? A Definitive Guide for 2025
SAP security is the comprehensive practice of protecting SAP applications, data, and the business processes they support from unauthorized access and cyber threats. Because SAP systems house an organization’s most business-critical information, including financial, customer, and HR data, ensuring that they’re properly secured is of the utmost importance. A strong SAP application security strategy is…
SAP Security Notes: December 2025 Patch Day
SAP Patch Day for December 2025 addresses several critical vulnerabilities across different SAP Applications
Embedded SAP Security vs. Independent Platforms: A Risk-Based Guide
When securing SAP, a debate often arises: is it better to use an “embedded” tool that runs inside SAP or an “independent” platform that runs outside of it? While embedded tools seem convenient, they present significant risks. A truly resilient and effective SAP security strategy requires an independent, external platform. This approach provides superior resilience…
