How do you currently secure your business-critical applications like SAP and Oracle EBS? Having a tool that knows how to assess and protect all the different customizations of your SAP and Oracle systems is not just important to protecting your crown jewels, but necessary. Securing Oracle and SAP systems has a blind spot in the overall IT strategy of many organizations, leaving them at risk for cyberattacks and hacks. Onapsis protects business-critical applications for the largest organizations in the world.
Listen to Onapsis CEO, Mariano Nunez, discuss how Onapsis helps organizations using SAP and Oracle EBS protect their systems from external attacks or internal misuse and abuse in the video below.
About the Author
As CEO and Co-Founder of Onapsis, Mariano drives the strategic direction of the company. Under his leadership, Onapsis has become one of the fastest-growing technology and cybersecurity companies in the world. With 20+ years of experience in the cybersecurity industry, both as an executive and as a cyber security expert, Mariano was the first to publicly present on cybersecurity risks affecting ERP platforms and how to mitigate them at major conferences such as RSA, Black Hat and SANS. Mariano’s contributions to the cybersecurity community include developing the first open-source SAP and ERP Penetration Testing frameworks, and uncovering critical zero-day vulnerabilities in SAP, Oracle, IBM, and Microsoft applications. Mariano’s insights are regularly featured in major media outlets such as CNN, Reuters, Wall Street Journal, Nasdaq, Fortune and The New York Times.
More about this author
Further Reading
SAP Security Notes: May 2026 Patch Day
SAP Patch Day for May 2026 addresses HotNews vulnerabilities in SAP Commerce Cloud and SAP S/4HANA
NIST: Applying the NIST Incident Response Lifecycle to SAP
Applying the NIST Incident Response Lifecycle to SAP environments provides organizations with a standardized methodology to prepare for, detect, and recover from severe cyberattacks. Because SAP systems house mission-critical data, integrating structured incident response protocols into an overarching SAP GRC strategy prevents catastrophic operational downtime and secures sensitive enterprise records. The Four Phases of SAP…
GDPR: Article 32 and the SAP Vulnerability Management Mandate
The General Data Protection Regulation (GDPR) imposes strict data protection requirements on global enterprises. Within this framework, GDPR Article 32 specifically mandates the “security of processing.” For organizations running SAP, which often serves as the central repository for highly sensitive employee and customer data, adhering to this article requires shifting from policy documentation to active,…
