Back to Vendor Directory


Onapsis is more than your typical application cybersecurity company. We’re different because our solutions help eliminate the costs and risks preventing you from building better, smarter and more dynamic applications, faster and more securely. We protect you at the core of your business, keeping the business-critical applications you depend on daily secure, compliant and available. Because we’re application-focused, we’re also deeply invested in enabling your future—helping you build in the cyber resilience you need to pursue digital transformation.

Featured Content

  • Watch Out for Cyber Attackers Targeting Your SAP Applications

    A recent report shows that the attacks are now becoming more common and complex. Learn how to stay vigilant to avoid the new angles cyber attackers are incorporating while targeting ERP applications.

  • SAP GRC Cloud IAG Identity Access Governance Live Demo image

    Don’t Wait Until It’s Too Late

    This article shares insights from SAP experts on what gets in the way of security patching, considerations to keep in mind when migrating to SAP S/4HANA, and best practices for building a security patching framework.

Multimedia Center

Articles / Case Studies / Videos

  • tech execs

    How Tech Executives are Leading Organizational and Technology Change – CIO Benchmark Research

    Reading time: 1 mins

    Change has come in many forms for business and tech execs across all industries. Geopolitical events, market forces, changing consumer behavior, and commodity price fluctuations have all put various pressures on decision makers. Add to the fact that technology is rapidly evolving and transitions to new solutions such as SAP S/4HANA and the Cloud have…
  • How Business Leaders are Scaling Platforms and Innovation

    Reading time: 1 mins

    How Business Leaders are Scaling Platforms and Innovation Businesses today are driven to innovate by the pressure to achieve real-time analysis and insights. In response to dynamic requirements from customers and a desire to be agile and future-ready, they are moving to the cloud, to software-as-a-service environments, and adopting new technologies such as SAP S/4HANA.…
  • SAP change management automation – Why? image

    On-Demand: How Leaders Manage Organizational and Technological Change on the Path to S/4HANA and the Cloud

    How Leaders Manage Organizational and Technological Change on the Path to SAP S/4HANA and the Cloud Change and transformation have become clichés in today’s discussion of business and technology challenges. Leaders have never had to manage such a mix of economic, market, and geopolitical pressures. This has forced executives to rapidly renovate their core infrastructure…

    Join SAPinsider Preferred Membership for $199

  • Getting Ready for the SEC’s Proposed Rules on Cybersecurity

    Reading time: 8 mins

    Learn how to accommodate the potential new rules proposed by the SEC in March of 2020. The National Institute of Standards and Technology (NIST) had released its publication on Integrating Cybersecurity and Enterprise Risk Management (ERM). The intent highlighted there was to help organizations better “identify, assess, and manage their cybersecurity risks in the context…
  • security

    Cloud Security Fundamentals

    Reading time: 6 mins

    SAP workloads are moving to the cloud at an accelerating rate, with 50% of those currently running on-premise likely to move in the next two years. While some will go into software-as-a-service environments, the bulk of SAP workloads moving to the cloud will go into infrastructure-as-a-service environments. This type of environment requires a different approach…
  • Recap of “Evolving Your SAP Security and Compliance Strategy in the Era of Cloud and SAP S/4HANA”

    Reading time: 3 mins

    By Annie Kennedy, Associate Conference Producer Jason Fruge (JF), Vice President, Business Application Cybersecurity at ‎Onapsis, was the expert in the Q&A titled “Evolving Your SAP Security and Compliance Strategy in the era of Cloud & SAP S/4HANA,” which aired live on day 1 of SAPinsider’s 2020 Virtual Conference Experience. Although Jason is a more than 20-year security practitioner,…
  • Case Study – Global Advertising Company Saves Time and Money by Migrating to SAP HANA with Onapsis

    Reading time: 1 min

    THE CHALLENGE: Migrate SAP ECC to SAP HANA while ensuring security and compliance. THE SOLUTION: The Onapsis Platform enabled the firm to complete migration one year ahead of schedule due to stable, tested applications, while strengthening security and compliance Many large companies rely on SAP as a key component of their business. Learn how a…
  • Threat Report: 10KBLAZE

    Reading time: 1 mins

    In April 2019, several new exploits targeting SAP business applications were released in a public forum. Although the exploits target insecure configurations that have been reported by SAP SE in the past, their public release significantly increases the risk of successful cyberattacks against SAP implementations globally. Given the criticality of the risk posed by 10KBLAZE…
  • Top challenges of a CIO

    Reading time: 1 min

    The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity in recent years. This e-book reviews five challenges CIOs face when dealing with SAP security, including recommendations for overcoming these challenges.
  • The Secure Transformation to SAP HANA

    Reading time: 1 mins

    Is SAP HANA really the new big thing? Developed in 2008 by the Hasso Plattner Institute and Stanford University, SAP HANA was introduced in 2010—in the same year as the iPad. It’s hard to imagine our lives without the latter, but the adoption of SAP HANA technology is advancing much more slowly. SAP has approximately…
  • cybersecurity

    High Profile Vulnerabilities in SAP Applications and How to Be Prepared

    Reading time: 7 mins

    Enterprise software is complex due to its nature and interconnectivity to business processes. On top of that, software is created by humans, which means that vulnerabilities are inevitable. Those affect SAP technology will ultimately impact the business and should be properly managed from a risk perspective. This article, written by a cybersecurity expert, explains a…
  • Simply Securing a System Is No Longer Sufficient

    Reading time: 5 mins

    By Robert Holland, VP Research, SAPinsider Securing an SAP system used to involve checking access and process controls and ensuring that the most recent SAP Notes had been applied. Now it involves not only ensuring that the system itself is up to date but must address cybersecurity and compliance issues as well. The Threat Landscape…