Onapsis Resources
Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.
Anatomy of an Attack: Breaking Down a C2 Incident on SAP
Our team will review the details of this attack including source IP addresses, the malicious file, the installation of midnight commander, and cover the commands that were executed on the host system that included an assessment of the compromised SAP system during this session.
Navigating the NIS2 Directive With Onapsis
Enterprise resource planning (ERP) systems, like SAP and Oracle E-Business Suite (EBS), are the operational engine of many organizations—running business-critical applications and holding the sensitive data needed for businesses to function.
SAP Security: Before, During, and After a RISE with SAP Migration Featuring Snohomish PUD
In this webinar explore how third-party security technology can bolster your transition to RISE with SAP. Learn how enhanced visibility, automated security scanning, and incident response can safeguard your data, increase business value, and mitigate risks during your digital transformation.
Nouvelle Vidéo d’Interview
Onapsis and Oracle partner to protect business applications that power the global economy. Learn more from this fireside chat.
Anatomy of an Attack: C2 Incident on SAP
Onapsis Research Labs latest report focuses on the real-world example and anatomy of a C2 Incident on SAP. Learn more from the webinar and report.
Threat Actors Attacking SAP for Profit
Over the past few years, the threat landscape around SAP applications has evolved significantly. What has driven this change? Threat actors are increasingly seeing the profit derived from SAP applications, associated data they hold, and taking advantage of vulnerabilities. Pulling from Onapsis’ expertise in SAP cybersecurity and Flashpoint’s depth of threat intelligence, this webinar covers:
SAP Ransomware Fireside Chat with Turnkey & Onapsis
Join us for an interactive fireside chat with our partner Turnkey, where industry experts will delve into the ever-evolving threat of ransomware and its impact on business-critical applications.
Securing SAP Business Technology Platform (BTP)
In this session you will learn about how and why it is important to secure their SAP BTP environments against cyber threats, as well as practical strategies for fortifying the platform.
10 Reasons Why More Companies Choose Onapsis
1. Onapsis Is the ONLY SAP Cybersecurity & Compliance Solution Endorsed by SAP Itself Your enterprise deserves the highest quality solution for security and compliance. Onapsis maintains the highest possible level of security validation and integration by SAP through its rigorous, invitation-only Endorsed Apps certification process. SAP and Onapsis executive teams actively partner on joint…
