Till Pleyer

Additional layer for SAP Data Security

Wouldn’t it be great to have an additional and independent layer for SAP data security which prevents the unauthorized use and distribution of the captured data? The key success factor for this is, to always work with encrypted data.

Know Your Attacker Surface

Log4j, ICM,… An jedem SAP Patch Tuesday steigt bei vielen SAP Security Verantwortlichen der Blutdruck. Mit ihm beginnt oft das Wettrennen der SAP-Verantwortlichen gegen potentielle Hacker. Doch wie kann man diesem Aktionismus strategisch sinnvoll begegnen?

SAP security audit webinar

How to Close the Gap in SAP Compliance

When the auditors ring the doorbell, every SAP client knows what happens next. Christoph Nagy, CEO of SecurityBridge, discusses with Carsten Crantz from PwC Germany on how to master this challenging task.

SAP Cyber Security – how does it work?

Join experts from 1st Basis Consulting and SecurityBridge to explore how businesses can get a 360-degree view of their SAP Security posture, and ensure their SAP operations are properly secured.

devsecops for SAP

What DevSecOps can look like for SAP

Organizations struggle with the fact that their SAP systems are hardly understood by the information security department team members. Read why DevSecOps for SAP could introduce a new approach with a more promising efficiency.

Recent Updates – February 2022

In Version 6.04 of the SecurityBridge Platform we introduced new capabilities and general product improvements, often originating from customer feedback and industry requirements.

Security & Compliance - Roadmap

SecurityBridge Unveils Its New Security Roadmap For SAP

SecurityBridge announced its new Security Roadmap for SAP. The new feature simplifies the road to SAP security e.g. secure configuration, hardening against hackers, and eliminating SAP vulnerabilities, by enabling IT personnel to instantly group all required software fixes into one area.