At Onapsis, we’re not only solution leaders—we’re also thought leaders. Here you’ll find a growing library of materials to help you build your cyber resilience strategy. The more light we can shed on business-critical application security and compliance, the better you can drive your business forward, confidently.

White Papers
Cloud Security, SAP Security
This whitepaper explores major security issues for SAP cloud deployments such as how cloud services are different, and then map existing security controls to fit within cloud deployments.
Infographics
SAP Security
HANA systems store and process the most critical business information in an organization. If an SAP/HANA platform is breached, an intruder would be able to perform different attacks such as espionage, sabotage and fraud.
Webinars
As organizations begin to migrate their SAP implementations to private, public, or hybrid cloud environments, security must remain a top priority. While migrating to the cloud is an organizational goal to maximize resources and data, it can be a complex process. If not securely done, mission-critical assets and processes remain at risk to cyberattack.
White Papers
SAP Security
10 einfache Fragen, die den Handlungsbedarf zum Thema Sicherheit bei Ihren geschäftskritischen Applikationen aufdecken
White Papers
SAP Security
10 questions simples levant le voile sur les défis en matière de sécurité des applications critiques des entreprises
Publications
SAP Security
SAP HANA is being pushed by SAP as the absolute in-memory database for its products, and more recently, as a standalone platform.
Webinars
Some of the largest global companies were impacted including 13 enterprises which each generate over $10B in annual revenue. The vulnerability being exploited has been identified as the Invoker Servlet vulnerability, which was patched by SAP in 2010, and is being leveraged in tandem with a sensitive SAP Java application to remotely gain full administrative access to the SAP systems.
Reports
SAP Security
Understanding the DHS US-CERT Alert on SAP Cybersecurity
Videos
Corporate, SAP Security
Richard Stiennon interview Mariano Nunez, CEO and Co-founder of Onapsis, as part of IT-Harvest's 2016 Video Interview Series.
Infographics
SAP Security
This infographic outlines why protecting your business-critical applications running on SAP and Oracle are vital steps of any security strategy.
Infographics
SAP Security

When it comes to SAP cybersecurity, there is a very clear gap in perception between SAP professionals, security operations professionals, and business executives on where the division of responsibility lies. This infographic outlines steps your organization can take to begin operationalizing your SAP security strategy.

Download (FR)
Download (DE)

Request a
Business Risk Illustration

OPERATIONAL RESILIENCY ASSESSMENT

Prevent application downtime and costly business disruption

Request an Assessment
AUDIT EFFICIENCY ASSESSMENT

Eliminate resource consuming manual audit processes

Request an Assessment
CYBER RISK 
ASSESSMENT

Reduce vulnerabilities and misconfiguration to protect the business

Request an Assessment