Back To Resources

Resources

Upcoming Live Webinars
Onapsis Webinar

Anatomy of an Attack: Breaking Down a C2 Incident on SAP

Our team will review the details of this attack including source IP addresses, the malicious file, the installation of midnight commander, and cover the commands that were executed on the host system that included an assessment of the compromised SAP system during this session.

Strengthen SAP Security for NIS2 Compliance Infographic

Navigating the NIS2 Directive With Onapsis

Enterprise resource planning (ERP) systems, like SAP and Oracle E-Business Suite (EBS), are the operational engine of many organizations—running business-critical applications and holding the sensitive data needed for businesses to function.

Onapsis Webinar

SAP Security: Before, During, and After a RISE with SAP Migration Featuring Snohomish PUD

In this webinar explore how third-party security technology can bolster your transition to RISE with SAP. Learn how enhanced visibility, automated security scanning, and incident response can safeguard your data, increase business value, and mitigate risks during your digital transformation.

Nouvelle Vidéo d’Interview

Onapsis and Oracle partner to protect business applications that power the global economy. Learn more from this fireside chat.

Anatomy of an Attack: C2 Incident on SAP

Onapsis Research Labs latest report focuses on the real-world example and anatomy of a C2 Incident on SAP. Learn more from the webinar and report.

Onapsis Podcasts

Threat Actors Attacking SAP for Profit

Over the past few years, the threat landscape around SAP applications has evolved significantly. What has driven this change? Threat actors are increasingly seeing the profit derived from SAP applications, associated data they hold, and taking advantage of vulnerabilities. Pulling from Onapsis’ expertise in SAP cybersecurity and Flashpoint’s depth of threat intelligence, this webinar covers:

Onapsis Webinar

SAP Ransomware Fireside Chat with Turnkey & Onapsis

Join us for an interactive fireside chat with our partner Turnkey, where industry experts will delve into the ever-evolving threat of ransomware and its impact on business-critical applications.

Onapsis Webinar

Securing SAP Business Technology Platform (BTP)

In this session you will learn about how and why it is important to secure their SAP BTP environments against cyber threats, as well as practical strategies for fortifying the platform.

10 Reasons Why More Companies Choose Onapsis

1. Onapsis Is the ONLY SAP Cybersecurity & Compliance Solution Endorsed by SAP Itself Your enterprise deserves the highest quality solution for security and compliance. Onapsis maintains the highest possible level of security validation and integration by SAP through its rigorous, invitation-only Endorsed Apps certification process. SAP and Onapsis executive teams actively partner on joint…

Page 10 of 32