Skip to content

Christoph Nagy

My name is Christoph Nagy. I am the founder and managing director of SecurityBridge - NCMI GmbH. We develop strategic security solutions for our customers, enabling them to perform automated analysis of security settings and to detect and prevent cyber-attacks against SAP© in real-time.

SAP Cloud Connector

SAP Cloud Connector

Every organization constantly faces the challenge of minimizing the attack surface that an adversary could use to perform malicious operations. To do this, administrators must install the deployed components and understand them in detail to identify risks and proactively mitigate or prevent those. Today we are looking at what is necessary to protect the SAP Cloud Connector.

SAP Expert Search

How to use the SAP Expert Search to find Patch Notes

After many years in the SAP eco-system, I know many good and bad practices exist in the IT Departments of – to be frank – every organization on this planet. Initiated by the SAP Security Patch Day in September 2022, our team has nudged me to share some knowledge. In this short how-to description, we want to explain the correct usage of the SAP Launchpad Expert Search to get the most accurate result looking for SAP Security Notes. If you want to find out how this powerful tool works, keep on reading.

Cybersecurity insurance

Is cybersecurity insurance relevant for SAP?

Cybersecurity is a top-of-mind priority for organizations of all types. From businesses to government agencies and non-profits, leaders must consider a growing number of cyber threats, risks, and vulnerabilities. All organizations face uncertainty or risk. Typically, it is the risk manager’s job to guide the C-suite toward the most appropriate options for each identified hazard. The size and growth of the cybersecurity insurance market suggests an extraordinary demand.

SAP cyber resilience

How to achieve SAP cyber resilience

A wave is sweeping through IT organizations right now. Entrenched processes are being examined for effectiveness and efficiency and scrutinized from the economical perspective. It is common for cyber-attacks in the corporate infrastructure and, if worse, the enterprise applications to trigger this. Successful exploits prove the inefficiency of established security measures in the event of an attack. Upon closer inspection, it becomes apparent that the established processes and measures do not create resilience. So, what do you need to achieve SAP cyber resilience?

SAP Data Security

SAP Data Security 101: Importance of data security

This article is about data security and data protection, specifically for digital data collected and processed via SAP applications. SAP Data Security is important because plenty of business-critical information gets processed with the SAP ERP, CRM, and SRM applications. SAP Human Capital Management (HCM) manages employee matters from payroll to employment contracts. All this information is processed digitally and needs protection against unauthorized access, manipulation, or deletion.

SAP SIEM

SIEM, from log evaluation to SAP attack detection

To detect attacks on SAP, you need to evaluate the security logs in SAP.

While many organizations have spent the past few years protecting the perimeter, business-critical systems are now becoming the priority of security operations. In this article, we will look at what an SAP SIEM might look like and what data and processes are necessary to enable desired conclusions.

SAP security Patch day

SAP Security Patch Day – August 2022

August 9, 2022, is the time for the SAP Security Patch Day, this time in parallel to the black 2022 cyber security conference, the SAP Response team has released 7 patches this Tuesday.

SAP Security Solutions

SAP Security Solutions

The application security market is obscure and holds one or two surprises for those looking for an SAP security solution. Cybersecurity solutions for SAP help customers understand the ever-growing threat landscape and protect themselves effectively. In this article, we would like to discuss some points you should focus on when looking for a security solution for SAP.

SAP BTP Audit Lg

SAP BTP Audit Log

We took a closer look at SAP BTP and integrated the BTP audit log into our monitoring portfolio. Read today’s blog to learn more.