Skip to content

Security and Compliance at SecurityBridge

Trust is everything to us, but you can’t have trust without security. That’s why we use independent experts to verify our security, privacy, and compliance controls.

Trusted by hundreds of SAP Teams

+5,000 SAP Systems Protected

Trusted by hundreds of customers worldwide, our native SAP platform is built by SAP experts to ensure every feature is valuable to our customers. We breathe SAP and strive to deliver an experience that resonates with and eases users’ workloads.

Inhouse SAP Expertise

SecurityBridge is built and run by SAP experts. We have some of the world’s most renowned SAP security talent in-house, working every day to secure our customers’ SAP systems. As the industry’s subject matter experts, we ensure that our platform delivers maximum value for our customers and truly understands the ins and outs of working with and within SAP.

SAP Certified to ensure protection and reliability

SAP Certification proves that our technology integrates smoothly with SAP solutions, giving customers confidence in their investment decisions. Certified solution providers must pass stringent qualification procedures based on SAP-endorsed integration technologies before receiving SAP-certified status.

SecurityBridge regularly recertifies our products (at minimum once per year, based on the available SAP certification programs) to ensure they are formally compatible with all new SAP products and versions.

We are pleased to hold the following SAP Certifications:

  • SAP S/4HANA Cloud, Private Edition
  • SAP S/4HANA Cloud, Extended Edition
SAP-Certified-SAP-S4HANA-Cloud

Your Security is Our Top Priority

Our vision is to bolster SAP systems to fight tomorrow’s cyber threats. As such, we are dedicated to building our products in a secure environment while deploying products that improve your systems’ reliability, security, and privacy. If you ever have questions about SecurityBridge security measures, please contact us.

Responsible Disclosure Policy

Updated and Effective: July 2024

As a leading solution provider of a cybersecurity platform for SAP customers, protecting our customers and partners is our highest goal. We use modern tools and processes to test our solutions for defects in the best possible way. Defined quality gates have been established to ensure that program errors that could lead to a vulnerability are detected early in development. Likewise, we undergo a separate testing protocol for each package leaving our premises, highlighting security aspects.

Data security is a top priority for SecurityBridge, and we believe that working with skilled security researchers can identify weaknesses in any technology.

If you believe you’ve found a security vulnerability, please notify us; we will work with you to resolve the issue promptly.

Disclosure Policy:

  • If you believe you’ve discovered a potential vulnerability, please email us at support@securitybridge.com. We will acknowledge your email within 24 hours.

  • Please give us reasonable time to resolve the issue before disclosing it to the public or a third party. We aim to resolve critical issues within 24 hours of disclosure.

  • Make a good faith effort to avoid violating privacy, destroying data, or interrupting or degrading the Issuer Direct service. Please only interact with accounts you own or have explicit permission from the account holder.

Research Policy:

While researching, please refrain from:

  • Distributed Denial of Service (DDoS)

  • Spamming

  • Social engineering or phishing of Issuer Direct employees or contractors

  • Any attacks against SecurityBridge’s physical property or data centers.

Thank you for helping to keep SecurityBridge Direct and our Customers safe!