Avoiding Complete Compromise of an SAP System
This article highlights the importance of securing the 3 layers of an SAP system to prevent unauthorized access to critical business data.
Get visibility and insights across your entire SAP landscape, powering actions to improve security and reliability. Learn more
Get visibility and insights across your entire SAP landscape, powering actions to improve security and reliability. Learn more
This article highlights the importance of securing the 3 layers of an SAP system to prevent unauthorized access to critical business data.
We cordially invite you to participate in our webcast on April 10th at 14:30 CET. This exclusive event is a joint initiative of SecurityBridge in cooperation with BowBridge and Log2 and will allow you to listen to exciting insights from top-class experts.
For March 2024, 10 new Security Notes have been released and 2 have been updated. Let’s look at some highlights, starting with the ‘HotNews’ notes.
With the evolving success of AI, SAP customers want to understand more about the potential of AI to improve their SAP Security posture. However, some homework needs to be done to unleash the full potential of AI for protecting SAP environments. In the previous parts of this series of articles, we have already discussed two prerequisites for AI-driven SAP Security: system patching and hardening. In this article, we will look at vulnerabilities in the ABAP custom code.
SecurityBridge, a leading global provider of SAP security
solutions, today announced the company has teamed up with Lonza to discuss methods for SAP
cybersecurity protection at SAPinsider 2024, Las Vegas, March 18-21, 2024.
This article demostrates the underutilized security benefits of SAProuter’s reverse invoke configuration through a test setup.