Bei Onapsis sind wir nicht nur führend im Bereich Lösungen - wir sind auch Vordenker. Hier finden Sie eine wachsende Bibliothek von Materialien, die Ihnen beim Aufbau Ihrer Cyber-Resilienz-Strategie helfen. Je mehr Transparenz wir zum Thema Sicherheit und Einhaltung geschäftskritischer Anwendungen schaffen können, desto besser können Sie Ihr Unternehmen zuversichtlich voranbringen.

Case Studies

This multi-national food production company was able to keep their global SAP stable, protected and compliant with security baselines by using Onapsis.
 

Case Studies

This biotech company protected its business-critical SAP system by maintaining up-time and security with Onapsis.

Case Studies

This large utility company improved their SAP security programs to prepare for their move to S/4HANA and ensure systems are maintained and secure.

White Papers
Read the recent survey from SAPinsider to see how organizations are tackling cloud migrations and S/4HANA.
Videos
Dave DeWalt, Vice Chair of the Onapsis Board of Directors, talks about the urgent need to protect business applications and why he joined Onapsis.
Webinars

Duration: 34 minutes
Available On Demand

Live Date: 2/18/2020

In this 30-minute webinar, we share our analysis of the 19 new Security Notes issued in February. This analysis will help guide you to prioritize and address the security notes in your own SAP systems.

Webinars

Duration: 41 minutes
Available On Demand

Live date: 2/13/2020

We invite you to join the Onapsis Research Labs, who found and reported this vulnerability to Oracle, on a webinar that will highlight the issue, discuss the business impact, stress the importance of patching and provide recommendations for keeping Oracle EBS protected.

Case Studies
This billion dollar advertising company used Onapsis to enable their migration of SAP ECC to HANA by ensuring security and compliance, resulting in a more stable system.
Case Studies
This large automobile manufacturer worked with Onapsis to expand their cybersecurity program to include SAP systems and ensure they were optimized to stay secure and online.
Datasheets

Many enterprise organizations have spent millions on perimeter security, and likely more on customizing business-critical SAP® and Oracle® E-Business Suite applications. Unfortunately, neither investment protects the ERP systems at the core of business operations and processes. These systems are a security blind spot and an operational vulnerability.

Datasheets

Business-critical applications and platforms such as SAP® and Oracle® EBS are highly customized to meet the operational business requirements of enterprise operational teams such as finance, supply-chain management and human resources. As process and workflows evolve, so must these applications. But change creates risk—risk of extended downtime, risk of system stability, risk of exposure to new vulnerabilities and risk of compliance violations.

Datasheets

From financial to privacy, governmental and industry-specific regulations, organizations are under increasing compliance stress. Manual reporting processes are consuming valuable resources, contributing to delays in innovation and transformation projects that promise business growth and efficiencies.

Fordern Sie eine kostenlose
Geschäftsrisiko-Illustration an

Untersuchen Sie die Sicherheitslage und das Risiko Ihrer geschäftskritischen Anwendungen, um die möglichen Auswirkungen eines Cyberangriffs auf Ihr Unternehmen zu ermitteln.

Assessment Anfordern