TOPICS

The subject area of SAP security is broad. In addition to a holistic approach that builds bridges, we also try to provide you with a lot of information.
On this page, you will find an overview of topics. If you have any questions about the topics or our products, please do not hesitate to contact us.

SecurityBridge’s SAP Platform Helps Schneider Electric Secure Their Critical SAP Applications And Integrate With SIEM

SecurityBridge announced Schneider Electric has selected the company’s SAP Security platform. SecurityBridge’s platform provides Schneider Electric with an advanced level of SAP security visibility.

Recent Updates – February 2022

In Version 6.04 of the SecurityBridge Platform we introduced new capabilities and general product improvements, often originating from customer feedback and industry requirements.

How to secure SAP ICM?

Once the SAP Internet Communication Manager (ICM) was activated in transaction SMICM, the SAP NetWeaver Application Server provides a web server that serves as the foundation for web-based SAP technologies like Fiori, WebDynpro, or Business Server Pages (BSP). Read the article to learn how to secure the SAP ICM.

SecurityBridge finds Vulnerability in SAP Transport System

Supply chain attacks are a new type of threat that targets software development departments and vendors. SecurityBridge has now identified a methodology that allows internal attackers without privileged rights to intervene undetected in the SAP soft-ware distribution process.

Next-Gen Application Security for SAP

Join roundtable delegates who will discuss the challenges, solutions, and their experiences in simplifying security and combining it across the network and the SAP application, to introduce a shift in paradigm for SAP customers.

The first and only integrated Platform for SAP

On July 29th 2020 a new release of SecurityBridge was made available for our subscribers. The release (version 4.75) includes new features and enhancements to the current security controls.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.