Onapsis Resources

Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.

Resource Placeholder

Umsetzung der NIS2-Richtlinie

Die Integration von SAP-Sicherheit in Ihr Unternehmen trägt zum Schutz Ihrer Systeme, Prozesse, Technologien und Mitarbeiter bei und hilft Ihnen, die Komplexität der NIS2- Compliance mit Leichtigkeit zu bewältigen.

Resource Placeholder

Navigating the NIS2 Directive with Onapsis

Building SAP security into your organization helps protect your systems, processes, technology, and personnel, helping you navigate the complexities of NIS2 compliance with ease.

Resource Placeholder

Siemens Healthineers’ New SAP Security Approach Powered by Onapsis

Learn how the company ensures resilience and robustness against evolving cyber threats and maintains operational continuity and compliance.

Resource Placeholder

Onapsis Assess for SAP BTP

Empower Your Business Users Without Sacrificing SAP Security with Onapsis Assess for SAP BTP

Resource Placeholder

ERP-Sicherheit in Zeiten von KI-gestützter Ransomware

Enterprise resource planning (ERP) systems, like SAP and Oracle E-Business Suite (EBS), are the operational engine of many organizations—running business-critical applications and holding the sensitive data needed for businesses to function.

Resource Placeholder

ERP Security in the Age of Ransomware

Find out how ransomware attacks are affecting enterprises. Learn valuable insights and discover how to protect your ERP applications.

Resource Placeholder

Anatomy of an Attack: Breaking Down a C2 Incident on SAP

Our team will review the details of this attack including source IP addresses, the malicious file, the installation of midnight commander, and cover the commands that were executed on the host system that included an assessment of the compromised SAP system during this session.

Resource Placeholder

Navigating the NIS2 Directive With Onapsis

Enterprise resource planning (ERP) systems, like SAP and Oracle E-Business Suite (EBS), are the operational engine of many organizations—running business-critical applications and holding the sensitive data needed for businesses to function.

Resource Placeholder

SAP Security: Before, During, and After a RISE with SAP Migration Featuring Snohomish PUD

In this webinar explore how third-party security technology can bolster your transition to RISE with SAP. Learn how enhanced visibility, automated security scanning, and incident response can safeguard your data, increase business value, and mitigate risks during your digital transformation.

Page 10 of 33