TOPICS

The subject area of SAP security is broad. In addition to a holistic approach that builds bridges, we also try to provide you with a lot of information.
On this page, you will find an overview of topics. If you have any questions about the topics or our products, please do not hesitate to contact us.

SecurityBridge and Solutionlab form partnership to expand global reach

SecurityBridge, leading SAP platform provider and penetration testing specialist Solutionlab, have announced a partnership, to provide combined services to Europe based companies.

Cyber Security enhanced: NTT Data Business Solutions and SecurityBridge extend their Partnership

NTT DATA Business Solutions and SecurityBridge are expanding their strategic partnership globally. The two IT service providers have already been working together in the North-European market since 2019.

SecurityBridge broadens U.S. reach with new 1st Basis Group partnership

SAP security provider SecurityBridge - now operating in the U.S., - today announced a partnership with Wisconsin-based 1st Basis SAP Services Group (1st Basis).

SecurityBridge partners with Cybersecurity Expert TCSS

TCSS and Security Bridge announced today that the companies have entered a strategic partnership that will help Austrian companies protecting their SAP systems effectively against cybercrime.

SecurityBridge Unveils Its New Security Roadmap For SAP

SecurityBridge announced its new Security Roadmap for SAP. The new feature simplifies the road to SAP security e.g. secure configuration, hardening against hackers, and eliminating SAP vulnerabilities, by enabling IT personnel to instantly group all required software fixes into one area.

SecurityBridge identified Supply Chain Vulnerability in SAP Transport System

Supply chain attacks are a new type of threat that targets software development departments and vendors. SecurityBridge has now identified a methodology that allows internal attackers without privileged rights to intervene undetected in the SAP soft-ware distribution process.

Defend against Ransomware attacks on SAP systems

Ransomware is the bugbear of IT security departments these days. SAP has only been affected to a limited extent so far, but it can certainly be abused as a gateway. SAP applications therefore need holistic protection, recommends SecurityBridge, provider of cybersecurity for SAP applications.

Mid-market companies can now protect themselves with large enterprise tactics

How can mid-market companies whose budgets can’t cater for a cybersecurity solution still protect their SAP from cyber attacks? Well, enter the perks of the as-a-service-economy. These businesses now have access to cybersecurity-as-a-service.

SecurityBridge builds European network for SAP cyber security

In the past twelve months, the specialist for security and compliance in the SAP environment has gained 15 new partners throughout Europe who use its software platform in their customer projects.

SecurityBridge expands international partner network with Techedge Spain

SecurityBridge, provider of the world’s first and only seamlessly integrated SAP cyber-security platform, and digital transformation expert Techedge in Spain, today announced a strategic partnership to help securing their customers’ SAP systems.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.