Skip to content

What can SAP Security learn from successful...

It is reasonable to ask how much we can learn from winning teams when it comes to building a good SAP Security line-up and identifying important success factors required for the journey to SAP Security excellence.

Read More

5 Key Processes to Stay Secure with...

Now that you know how to secure SAP, it is time to discuss how to maintain that security and continuously improve your SAP Security posture.

Read More

How to Secure SAP Efficiently: Key Best...

In our recent article, we talked about how to kick-start your SAP Security posture within a day. This allows you to free up time and resources for the second phase of your journey towards SAP Security excellence, the hardening of your SAP landscape and the remediation of system vulnerabilities. So, let’s have a look at how this can be accomplished in a structured and efficient manner.

Read More

5 Steps for Kick-starting Holistic SAP Security...

SAP Security teams can kick-start a comprehensive security platform and gain significant improvements already within a day. What they need is a holistic platform and a guided approach to SAP Security.

Read More

Prerequisites for an AI-driven SAP Security –...

With the evolving success of AI, SAP customers want to understand more about the potential of AI to improve their SAP Security posture. However, some homework needs to be done to unleash the full potential of AI for protecting SAP environments. In the previous parts of this series of articles, we have already discussed two prerequisites for AI-driven SAP Security: system patching and hardening. In this article, we will look at vulnerabilities in the ABAP custom code.

Read More

Prerequisites for an AI-driven SAP Security –...

While Patch Management helps you implement code fixes for known vulnerabilities in the system code, your SAP system still has a huge number of parameters and settings that influence the behavior of the application. Quite a few of them are security-related and have a significant impact on your attack surface.

It is key for the security of your business-critical SAP systems that you harden them.

Read More

Prerequisites for an AI-driven SAP Security –...

In our last article, we talked about the potential of AI to improve your SAP Security posture. An AI-driven Threat Detection approach can help identify sophisticated cyberattacks, especially those leveraging a chain of vulnerability exploits. However, while AI can point you to those issues and may automatically block certain activities or user endpoints, the SAP Security team remains responsible for responding to the attack.

Read More

How can AI help improve your SAP...

This blog explores AI’s role in SAP Security, security platform challenges and the need for system hardening.

Read More

Why is User and Entity Behavior Analytics...

UEBA is a technology that analyzes the behavior patterns of users and entities, like IT-systems or applications, in an organization’s network and detects anomalies or deviations from the normal baselines.

Read More

5 Reasons to Choose the Software Subscription...

Software subscription can be the best option for cybersecurity solutions and platforms, as it offers several benefits over the conventional model of purchasing software licenses. Here are five reasons why you should regard software subscription as your preferred model for cybersecurity solutions.

Read More

Protecting SAP Against ICMAD Vulnerabilities: Effective and...

SAP ICMAD Vulnerabilities are those vulnerabilities that are present in the ICM component of SAP, including SAP NetWeaver, S/4HANA, and SAP Web Dispatcher.

Read More

Understanding the CVE-2022-22536 Vulnerability for SAP ...

Today we want to dive into one particular vulnerability which every SAP administrator needs to fix immediately by applying the appropriate patch. The CVE-2022-22536 is a critical vulnerability that has the potential to put your business-critical data at risk. In this article you learn how to mitigate it, and how SecurityBridge can help you to protect your systems from these vulnerabilities.

Read More