|By Marketwired .||
|April 1, 2014 11:44 AM EDT||
CAMBRIDGE, MA--(Marketwired - April 01, 2014) - Onapsis Inc., the leading provider of solutions to audit and mitigate threats targeting ERP platforms, today announces the release of the ninth installment in the SAP Security In-Depth (SSID) publication series featuring SAP BusinessObjects. Because of the amount of moving parts, complicated processes and client access points, securely implementing or auditing a BusinessObjects implementation can be a trying task. With the relevant and actionable information provided in this SSID, SAP customers will gain a deeper understanding of strategies to proactively test and learn how to defend against attacks targeting their SAP BusinessObjects deployments.
Juan Pablo Perez-Etchegoyen, CTO of Onapsis, manages the Onapsis Research and Engineering teams. "At Onapsis, it is important to us that not only our customers, but ERP users worldwide can benefit from our continued research and development regarding SAP security. Offering our continued expertise allows SAP users to take the right steps towards securing their SAP implementations with confidence they are following best practices to ensure that that the business critical process and information stored in their SAP systems are secure. BusinessObjects is a critical system within the SAP ecosystem, and it is important that organizations understand the threats targeting them, and learn the mitigation steps to prevent attacks," stated Juan Pablo.
Mariano Nunez, CEO of Onapsis, leads the company's strategy and product direction. "At Onapsis, our goal is to empower SAP customers to understand that they need to holistically secure their SAP implementations, which means moving beyond Segregation of Duties (SoD) Controls and actively identifying and mitigating the risks affecting the technical layer of their implementation. For the past eight years, we have been releasing presentations and publicly speaking about this topic at major security conferences. With these publications, we are helping Information Security, Audit and SAP Security professionals understand this layer, and how to mitigate the risks they are faced with," commented Mariano.
The publication can be downloaded from the Onapsis website by Clicking Here. In addition to this, Onapsis is pleased to also announce that our Sr SAP Security Researcher, Will Vandevanter, will be presenting a one hour educational webcast reviewing the details of the publication and providing practical examples of the risks described in the paper and ways to mitigate them. The Webcast will take place on April 10
Onapsis Inc. is the leading provider of ERP cyber-security solutions. Our solutions empower information security and audit professionals to understand and efficiently mitigate the cyber security risks affecting their SAP and Oracle business platforms, preventing espionage, sabotage and financial fraud attacks while streamlining compliance with internal and regulatory requirements.
As the industry standard, trusted by the leading audit firms and deployed by Global 1000 and military organizations, Onapsis X1 is the most widely-used solution to detect cyber security risks and compliance violations affecting SAP business platforms. Unmatched by generic security monitoring products, Onapsis X1's unique SAP-certified capabilities integrate seamlessly into existing GRC and Risk Management practices, providing unprecedented visibility to protect critical business processes.
At the heart of the company, the Onapsis Research Labs consists of the thought-leaders that continue to redefine the ERP security industry. Being the first experts to uncover and report on critical ERP cyber security vulnerabilities, the team is continuously invited to lecture on current and future threats to SAP and Oracle business platforms at the world-leading security conferences. This laser-focused, innovative research is continuously incorporated into Onapsis products, enabling customers to rely on the most comprehensive and widely-adopted ERP cyber security solutions in the industry.
For more information please visit www.onapsis.com and follow us on Twitter: @onapsis
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Dec. 8, 2016 05:00 AM EST Reads: 2,158
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
Dec. 8, 2016 04:30 AM EST Reads: 725
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 04:15 AM EST Reads: 934
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Dec. 8, 2016 04:00 AM EST Reads: 3,793
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 04:00 AM EST Reads: 1,033
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Dec. 8, 2016 04:00 AM EST Reads: 4,812
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Dec. 8, 2016 02:45 AM EST Reads: 1,296
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 02:30 AM EST Reads: 1,117
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Dec. 8, 2016 01:45 AM EST Reads: 1,407
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 8, 2016 01:30 AM EST Reads: 1,922
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 8, 2016 01:00 AM EST Reads: 3,956
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dec. 8, 2016 12:30 AM EST Reads: 1,126
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 8, 2016 12:15 AM EST Reads: 1,347
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Dec. 7, 2016 10:30 PM EST Reads: 875
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 7, 2016 10:00 PM EST Reads: 1,196