Skip to content

Inline Risk Management & how it helps...

Organizations by now must have realized that they are swimming with sharks when it comes to cyber-security. Awareness and acceptance of the risk can put you in a stronger position than you have thought. Keeping a close eye on any deviation of risk is vital to understand whether a new threat scenario exists that demands your action.

Read More

Threat Intelligence in the context of SAP...

SecurityBridge, the only holistic security platform for SAP systems, offers the two key factors necessary for Threat Intelligence in an SAP context: For the identification and elimination of vulnerabilities, a comprehensive catalog of tests is integral part of SecurityBridge, based on established standards.

Read More

Hyperlogging – to boldly go where no...

HyperLogging introduces a new capability for SAP endpoints. Once enabled is collects all relevant data sources which are relevant for forensic analysis of incidents.

Read More

Real-time threat monitoring for SAP? Easier than...

After barely a day passing without a major cyber attack in the news, it is little wonder, that over 50% of businesses now expect to be hacked, understanding that it’s a matter of ‘when’ and not ‘if’.

Read More

The first and only integrated Platform for...

On July 29th 2020 a new release of SecurityBridge was made available for our subscribers. The release (version 4.75) includes new features and enhancements to the current security controls.

Read More

3 Benefits of an integrated and holistic...

Selecting a specialized solution for each security area, however, has some limitations. A holistic approach offers additional benefit that is required to gain insight into potential risks and to offer full transparency of the security posture.

Read More

Get a grip on SAP Interface Security...

Latest addition to the SecurityBridge suite is a fully integrated interface monitor, which visualizes RFC interface connectivity across your SAP landscape. Through a bird’s eye view security critical traffic and vulnerable interfaces can easily be spotted.

Read More