TOPICS

The subject area of SAP security is broad. In addition to a holistic approach that builds bridges, we also try to provide you with a lot of information.
On this page, you will find an overview of topics. If you have any questions about the topics or our products, please do not hesitate to contact us.

One small step for man, one giant leap for SAP Security

What Neil Armstrong once said when putting down his first foot on the moon is now true for SAP Security: One small step for man, one giant leap for SAP Security. With release 5.80 we published another major product release for our user community.

Reduce complexity the enemy of security

On November 5th, 2020 a new release of SecurityBridge was made available for our subscribers. The release (version 5.78.3) contains major improvements. Some of the highlights contained in the release are described on this site. Customers can download the new release from our online support portal.

The first and only integrated Platform for SAP

On July 29th 2020 a new release of SecurityBridge was made available for our subscribers. The release (version 4.75) includes new features and enhancements to the current security controls.

Minor release, major step!

On 25th of May 2020, ABEX has published a new minor version of SecurityBridge for SAP. This post summarizes the highlights of the recent release.

Stability and new features

In the last major release 4.7, SecurityBridge introduced the Security & Compliance Manager. 4.71 contain first enhancement inspired by our early adopter community and many more features.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.