En Onapsis, no solo somos líderes de soluciones, también somos líderes de pensamiento. Aquí encontrará una creciente biblioteca de materiales para ayudarlo a desarrollar su estrategia de ciberesiliencia. Con mayor claridad sobre la seguridad y el cumplimiento de las aplicaciones esenciales para el negocio podrá fomentar mejor y con confianza el desarrollo de su empresa.

Reports
Onapsis has discovered and worked with SAP to release a patch for the RECON vulnerabilities, affecting a component included in many SAP applications.
Reports

Oracle BigDebIT vulnerabilities put thousands of organizations at risk. Onapsis threat research has discovered this major financial and compliance risk to companies who may not have the latest patch from Oracle.

Reports
Oracle PAYDAY vulnerabilities put thousands of organizations at risk. These unmitigated vulnerabilities can lead to cybersecurity risks; financial theft, fraud and business disruption.
Reports
Based on hundreds of SAP implementation assessments and the proprietary threat intelligence of Onapsis, we estimate these exploits could affect 9 out of 10 SAP systems of more than 50,000 customers worldwide. We recommend you review and apply all relevant SAP security notes immediately.
Reports
Oracle Security
How are organizations truly managing cybersecurity risks in their Oracle E-Business Suite ecosystem?
Reports
Cloud Security, Oracle Security, Research, SAP Security
Recent research from Onapsis and Digital Shadows provides evidence of how cybercriminals target and exploit SAP and Oracle ERP applications.
Reports
SAP Security
Understanding the DHS US-CERT Alert on SAP Cybersecurity
Reports
SAP Security
How are organizations truly managing cybersecurity risks in their SAP ecosystem? Ponemon Institute’s latest study of 607 global IT security practitioners reveals senior level perceptions about SAP, its security challenges, and the risk of data breaches and cyberattacks.

Solicitud de cortesía
Ilustración de Riesgos de Negocios

Examine la postura de seguridad y la exposición al riesgo de sus aplicaciones críticas para el negocio a fin de determinar el impacto potencial de un ataque cibernético en su organización.

Solicite una evaluación