• slide

Overview

Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP and Oracle cyber-security, Onapsis’ patented solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Headquartered in Boston, MA., Onapsis serves over 180 Global 2000 customers and are the de-facto standard for leading consulting and audit firms such as Accenture, IBM, Deloitte, E&Y, KPMG and PwC.

Products

  • Onapsis Security Platform for SAP

    The Onapsis Security Platform is SAP-certified and is the first solution that combines a preventative, behavioral-based and context-aware approach for detecting, identifying and mitigating security risks, compliance gaps and cyber-attacks on business-critical applications. These applications include ERP, CRM, HCM, SCM, SRM and BI solutions.

Terms

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

4400004253
May 01, 2009- Dec 19, 2021

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2021

News

Latest News

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today ...
READ MORE >

Resources

Datasheet

At Onapsis, we know that maintaining regulatory compliance while also preventing cyberattacks requires trade-offs between risk and resources. Compliance with internal audits or regulatory schemes often escalates a project’s priority, forcing enterprises to put time-consuming audit requests ahead o...

Infographic

HANA systems store and process the most critical business information in an organization. If an SAP/HANA platform is breached, an intruder would be able to perform different attacks such as…

When it comes to SAP cybersecurity, there is a very clear gap in perception between SAP professionals, security operations professionals, and business executives on where the division of responsibility lies. Leveraging a cross functional, well aligned team is key in setting up an effective SAP cyber...