Webcast
Active SAP Exploitation Activity Identified by the Onapsis Research LabsThis session with SAP, CISA and Onapsis covers the latest developments in the Threat Landscape for SAP business-critical applications.
Solution Brief
Asses: Vulnerability Management for Business-Critical ApplicationsEliminate the Cybersecurity Blind Spot Around Your Most Important Assets
Solution Brief
Defend: Threat Detection and Response for Business-Critical ApplicationsContinuously Monitor and Protect Your Most Important Assets from Threats
Solution Brief
Assess Baseline: Jumpstart Your SAP Application SecurityAccelerate Your SAP Vulnerability Management with Focus and Prioritization
Video
Onapsis and SAP Partner to Secure BusinessDid you know that Onapsis is SAP’s chosen partner for cybersecurity in business-crucial SAP applications? Hear directly from SAP on how we’re proactively working together to protect the global economy.
Webcast
Cyber Tech Talk Features: The Onapsis Research LabsIn this session learn more about the latest threat intelligence and receive security guidance from the Onapsis Research Labs to stay ahead of ever-evolving cybersecurity threats.
Webcast
Le paysage des menaces se transforme : mieux comprendre comment protéger les applications critiques SAP contre les menacesLes applications SAP hébergent les informations clients, ventes, finances, les produits, les services, les informations sur les employés et les secrets commerciaux - et les pirates informatiques s’intéressent à ces applications. Le groupe Elephant Beetle a exploité, entre autres, deux vulnérabilités SAP et ainsi voler des millions de dollars à des organisations financières.
Webcast
Cyber Tech Talk Series | The Elephant Beetle in the Room: An Advanced Financial Attack Leveraging SAP VulnerabilitiesLearn how SAP vulnerabilities were exploited to drain millions of dollars from major financial organizations by an advanced threat group dubbed ‘Elephant Beetle’. In this session we discuss their modus operandi, provide actionable guidelines on how to bolster SAP security processes and how to defeat attacks of this nature in case of a breach.
Webcast
ICMAD SAP Cybersecurity VulnerabilitiesWho Is at Risk & How to Protect Your Business-Critical SAP Applications. SAP CISO and Onapsis CEO deliver an executive webinar, sharing new threat intelligence about SAP vulnerabilities impacting Internet Communication Manager (ICM). Apply security patches to protect SAP applications and improve SAP security posture.
Reports
Who Is at Risk and How To Protect Your Business-Critical SAP ApplicationsOnapsis Research Labs’ thorough investigation of HTTP Response Smuggling over the last year led to the recent identification of the ICMAD vulnerabilities.
White Paper
5 Reasons Why You Need Application Security Testing for Business-Critical SAP ApplicationsBuild security into the development process. Here are five reasons why you need application security testing (AST) capabilities specifically designed for your business-critical SAP applications.
Solution Brief
Cyber Risk Assessment40,000+ ORGANIZATIONS USING SAP ARE AT RISK OF RECON VULNERABILITY Successful Exploit Could Allow Unauthenticated Full System Access; Impact Business Operations and Regulatory Compliance