Onapsis Resources
Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.
Volume XIII: SAP HANA System Security Review – Part 2
SAP HANA is being pushed by SAP as the absolute in-memory database for its products and more recently, as a standalone platform. The vast majority of companies who have already adopted it are leveraging its capabilities to support business-critical applications. Due to its nature, SAP HANA stores an organization’s most important assets, thus requiring large…
Blueprint for CIS Control Application: Securing the SAP Landscape
Any data breach can be expensive, but the potential cost rises with the value orexploitability of the data targeted in an attack.
The Tip of the Iceberg: Wild Exploitation & Cyberattacks on SAP Business Applications
Understanding the DHS US-CERT Alert on SAP Cybersecurity
Onapsis’ Mariano Nunez talks with Richard Stiennon
Richard Stiennon interview Mariano Nunez, CEO and Co-founder of Onapsis, as part of IT-Harvest’s 2016 Video Interview Series.
Volume XII: SAP HANA System Security Review – Part 1
SAP HANA is being pushed by SAP as the absolute in-memory database for its products and more recently as a standalone platform. The vast majority of companies who have already adopted it are leveraging its capabilities to support business-critical applications. Due to its nature, SAP HANA stores an organization’s most important assets, thus requiring large…
Volume XI: SAP End-User Tools: The Weakest Link to Sensitive Data
When thinking of SAP security we tend to always think of SAP servers and pay little attention to the tools used by end-users that connect to most of our SAP Systems, as well as the way those tools are used. Outside the SAP security world it is well accepted that attackers are no longer targeting…
Volume X: Pivoting Through SAP Systems
Every organization running SAP to support its business-critical processes has typically implemented several systems in complex scenarios. Depending on the sizeof the company, the number of SAP Systems, Instances and Products used can be quite large. All of these systems are interconnected and there are different components involved in regards to the connections such as…
Onapsis CEO Mariano Nunez interviewed by Richard Stiennon
IT Harvest 2015 Video Interview Series. San Francisco, CA.
Volume IX: Assessing and Defending SAP BusinessObjects
Implementing proper security controls for a BusinessObjects implementation is a complex process. There are a number of moving parts, complicated Access Controls, and many client access points. For those tasked with auditing an implementation it can be difficult to know where to begin. In this white paper we discuss the BusinessObjects architecture landscape, discuss common…
