Publications
Volume XVI: SAP®️ Security In-Depth: Switchable Authorization Checks: New Workbench and ScenariosThis SAP Security In-depth attempts to fully introduce and explain the concept of Switchable Authorization Checks. How it works, why it’s important and how to implement a Switchable Authorization Checks SAP Security Note.
Solution Brief
Defense Federal Acquisition Regulation SupplementAn unauthenticated attack exploiting a misconfiguration or vulnerability in your mission-critical applications, which many organizations use to manage supply chains with their partners, could allow malicious actors to manipulate underlying data without touching user applications or leaving an audit trail, violating DFARS.
Solution Brief
General Data Protection RegulationThe EU GDPR regulation requires companies to protect any personal data that is stored in their systems, from both theft and manipulation. Hackers could target a misconfiguration or vulnerability in the company’s mission-critical applications, and gain access to this data without using business applications or leaving an audit trail, violating GDPR.
Solution Brief
Internal Control Over Financial ReportingAn unauthenticated attack targeting a misconfiguration or vulnerability in your mission-critical applications could let hackers manipulate underlying financial data without touching financial applications or leaving an audit trail, violating ICFR and SOX.
Solution Brief
Foreign Corrupt Practices ActStrong cybersecurity thwarts the manipulation of transactions used to disguise illicit payments and other actions that can compromise compliance. Read how cybersecurity plays a role in avoiding the violation of the Foreign Corrupt Practices Act and preventive steps your organization can take.
Infographic
Onapsis First Half 2020 HighlightsAn overview of the first half of 2020, including funding, customer numbers and threat research stats.
Datasheets
The Onapsis Platform for SuccessFactorsThe Onapsis Platform for SAP SuccessFactors delivers actionable insight into your SaaS application and its interconnections so your IT operations, information security and audit and compliance teams can quickly and easily discover, assess, prioritize, and eliminate application misconfigurations and vulnerabilities.
Solution Brief
Securing Mission-critical Applications in the CloudAs business processes and functions move to cloud and SaaS environments, you need to reduce the risk of your extended business processes, enforce security and compliance baselines from the core to the cloud and monitor critical and potentially malicious activity in production. Learn how to protect your SaaS applications with Onapsis.
Case Study
Onapsis Case Study: Multinational Chemical CompanyThis chemical company built security, quality and compliance checks into their SAP change management processes to accelerate application delivery time and reduce costs.
Video
Partnering with Onapsis to Add Value for CustomersHear from James Carrigan at Verizon why they decided to partner with us to help their customers secure their mission-critical applications and add value to their offerings.
Video
Onapsis Risk Assessment Saves TimeChaitanya Geddam at Accenture talks about how the Onapsis risk assessment process helps their Oracle customers get answers in hours instead of years.