How do you currently secure your business-critical applications like SAP and Oracle EBS? Having a tool that knows how to assess and protect all the different customizations of your SAP and Oracle systems is not just important to protecting your crown jewels, but necessary. Securing Oracle and SAP systems has a blind spot in the overall IT strategy of many organizations, leaving them at risk for cyberattacks and hacks. Onapsis protects business-critical applications for the largest organizations in the world.
Listen to Onapsis CEO, Mariano Nunez, discuss how Onapsis helps organizations using SAP and Oracle EBS protect their systems from external attacks or internal misuse and abuse in the video below.
About the Author
As CEO and Co-Founder of Onapsis, Mariano drives the strategic direction of the company. Under his leadership, Onapsis has become one of the fastest-growing technology and cybersecurity companies in the world. With 20+ years of experience in the cybersecurity industry, both as an executive and as a cyber security expert, Mariano was the first to publicly present on cybersecurity risks affecting ERP platforms and how to mitigate them at major conferences such as RSA, Black Hat and SANS. Mariano’s contributions to the cybersecurity community include developing the first open-source SAP and ERP Penetration Testing frameworks, and uncovering critical zero-day vulnerabilities in SAP, Oracle, IBM, and Microsoft applications. Mariano’s insights are regularly featured in major media outlets such as CNN, Reuters, Wall Street Journal, Nasdaq, Fortune and The New York Times.
More about this author
Further Reading
Meet the Ona – Elke Bastian
Meet Elke Bastian: Background & Roots Hi, my name is Elke Bastian. I live in Saarbrücken, Germany, together with my partner and my 14-year-old daughter. We are located directly on the French border and also close to Luxembourg. From a professional perspective, I am a product marketing enthusiast and enjoy collaborating with all other marketing…
Common Vulnerabilities in SAP Systems
Missing Authorization Checks, Information Disclosure, and Cross-Site Scripting (XSS) were the top three patched vulnerabilities in 2025. Missing Authorization Checks alone accounted for nearly one-third of all security notes, as many SAP functionalities fail to default to protected states. These flaws leave systems exposed to data theft, unauthorized modification, and service disruption, making timely application…
10 Critical Questions to Ask Your SAP Security Vendor
Selecting an SAP security partner is a high-stakes decision. Generic cybersecurity tools cannot effectively secure the business-critical applications that run the global economy. When evaluating a vendor, determine if they simply scan for known issues or if they offer a comprehensive, research-driven platform capable of stopping sophisticated threats. Use these 10 questions to cut through…
