Onapsis Resources

Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.

Resource Placeholder

Active SAP Exploitation Activity Identified by the Onapsis Research Labs

This session with SAP, CISA and Onapsis covers the latest developments in the Threat Landscape for SAP business-critical applications.

Resource Placeholder

Assess Baseline: Jumpstart Your SAP Application Security

Accelerate Your SAP Vulnerability Management with Focus and Prioritization

Resource Placeholder

Onapsis and SAP Partner to Secure Business

Did you know that Onapsis is SAP’s chosen partner for cybersecurity in business-crucial SAP applications? Hear directly from SAP on how we’re proactively working together to protect the global economy.

Resource Placeholder

Cyber Tech Talk Features: The Onapsis Research Labs

In this session learn more about the latest threat intelligence and receive security guidance from the Onapsis Research Labs to stay ahead of ever-evolving cybersecurity threats.

Resource Placeholder

Le paysage des menaces se transforme: Mieux comprendre comment protéger les applications critiques SAP contre les menaces

Les applications SAP hébergent les informations clients, ventes, finances, les produits, les services, les informations sur les employés et les secrets commerciaux – et les pirates informatiques s’intéressent à ces applications. Le groupe Elephant Beetle a exploité, entre autres, deux vulnérabilités SAP et ainsi voler des millions de dollars à des organisations financières.

Resource Placeholder

The Elephant Beetle in the Room: An Advanced Financial Attack Leveraging SAP Vulnerabilities

Learn about ‘Elephant Beetle’ & their SAP vulnerability exploitation techniques. Enhance your SAP security and prevent similar attacks.

Resource Placeholder

Log4j Vulnerability: Threat Intelligence and Mitigation Strategies to Protect Your SAP Applications

SAP and Onapsis share steps to protect business-critical SAP applications and improve SAP security to mitigate the threat of the Log4j vulnerability to the log4shell exploits.

Page 22 of 33