Bei Onapsis sind wir nicht nur führend im Bereich Lösungen - wir sind auch Vordenker. Hier finden Sie eine wachsende Bibliothek von Materialien, die Ihnen beim Aufbau Ihrer Cyber-Resilienz-Strategie helfen. Je mehr Transparenz wir zum Thema Sicherheit und Einhaltung geschäftskritischer Anwendungen schaffen können, desto besser können Sie Ihr Unternehmen zuversichtlich voranbringen.

Videos
Hear from Khaja Ahmed, Head of Global Product and Application Security at SAP, and Onapsis General Manager of Product and Technology, Anshuman Kanwar, discuss the challenges and strategies companies have for protecting their mission-critical applications to maintain business success.
Solution Briefs
Find quality, security and compliance issues in ABAP, SAPUI5 (FIORI), XSJS and SQLSCRIPT. Learn how Onapsis can help.
Solution Briefs
Avoid import errors, business outages, downgrades, security vulnerabilities and compliance violations by inspecting all transports before import. Learn how Onapsis can help.
White Papers
A two part implementation document to help organizations securely migrate to and operate ERP applications in the cloud
Videos
Hear from Preston Futrell, leader of the Global Business Services organization at IBM, as he discusses how they help customers develop their SAP implementations as they migrate to the cloud and how working with Onapsis enables them to assure that security is included.
Publications

This SAP Security In-depth attempts to fully introduce and explain the concept of Switchable Authorization Checks. How it works, why it’s important and how to implement a Switchable Authorization Checks SAP Security Note.

Solution Briefs
An unauthenticated attack exploiting a misconfiguration or vulnerability in your mission-critical applications, which many organizations use to manage supply chains with their partners, could allow malicious actors to manipulate underlying data without touching user applications or leaving an audit trail, violating DFARS.
Solution Briefs
The EU GDPR regulation requires companies to protect any personal data that is stored in their systems, from both theft and manipulation. Hackers could target a misconfiguration or vulnerability in the company’s mission-critical applications, and gain access to this data without using business applications or leaving an audit trail, violating GDPR.
Solution Briefs
An unauthenticated attack targeting a misconfiguration or vulnerability in your mission-critical applications could let hackers manipulate underlying financial data without touching financial applications or leaving an audit trail, violating ICFR and SOX.
Solution Briefs
Strong cybersecurity thwarts the manipulation of transactions used to disguise illicit payments and other actions that can compromise compliance. Read how cybersecurity plays a role in avoiding the violation of the Foreign Corrupt Practices Act and preventive steps your organization can take.
Webinars
Join our new webinar format. Q-Talks for CFOs only last 15 minutes. Reza our Chief Innovation Officer and moderator invites various experts to discuss high level CFO topics.
Infographics
An overview of the first half of 2020, including funding, customer numbers and threat research stats.

Fordern Sie eine kostenlose
Geschäftsrisiko-Illustration an

Untersuchen Sie die Sicherheitslage und das Risiko Ihrer geschäftskritischen Anwendungen, um die möglichen Auswirkungen eines Cyberangriffs auf Ihr Unternehmen zu ermitteln.

Assessment Anfordern