TOPICS

The subject area of SAP security is broad. In addition to a holistic approach that builds bridges, we also try to provide you with a lot of information.
On this page, you will find an overview of topics. If you have any questions about the topics or our products, please do not hesitate to contact us.

Inline Risk Management & how it helps to detect deviation

Organizations by now must have realized that they are swimming with sharks when it comes to cyber-security. Awareness and acceptance of the risk can put you in a stronger position than you have thought. Keeping a close eye on any deviation of risk is vital to understand whether a new threat scenario exists that demands your action.

Threat Intelligence in the context of SAP

SecurityBridge, the only holistic security platform for SAP systems, offers the two key factors necessary for Threat Intelligence in an SAP context: For the identification and elimination of vulnerabilities, a comprehensive catalog of tests is integral part of SecurityBridge, based on established standards.

Hyperlogging – to boldly go where no one has gone before

HyperLogging introduces a new capability for SAP endpoints. Once enabled is collects all relevant data sources which are relevant for forensic analysis of incidents.

Real-time threat monitoring for SAP? It’s easier than you think.

After barely a day passing without a major cyber attack in the news, it is little wonder, that over 50% of businesses now expect to be hacked, understanding that it’s a matter of ‘when’ and not ‘if’.

3 Benefits of an integrated holistic SAP security platform

Selecting a specialized solution for each security area, however, has some limitations. A holistic approach offers additional benefit that is required to gain insight into potential risks and to offer full transparency of the security posture.

Get a grip on SAP Interface Security

Latest addition to the SecurityBridge suite is a fully integrated interface monitor, which visualizes RFC interface connectivity across your SAP landscape. Through a bird’s eye view security critical traffic and vulnerable interfaces can easily be spotted.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.