TOPICS

The subject area of SAP security is broad. In addition to a holistic approach that builds bridges, we also try to provide you with a lot of information.
On this page, you will find an overview of topics. If you have any questions about the topics or our products, please do not hesitate to contact us.

Security Orchestration Automation and Response (SOAR) for SAP

With the push for zero-trust, primarily due to the cloud trend, IT security teams must focus more on application security. This is usually done by focusing on the most critical applications first. And that's where SAP almost always comes to the top of the list.

Story of a CISO – How I made SAP Cybersecurity Priority

With the push for zero-trust, primarily due to the cloud trend, IT security teams must focus more on application security. This is usually done by focusing on the most critical applications first. And that's where SAP almost always comes to the top of the list.

Story of a CISO – My Journey into SAP Cybersecurity

Why aren't SAP systems not protected to the level of other enterprise systems, although they store the crown jewels of most companies? CISO Branden Newman tells us about his journey into SAP security.

Interview: Steen Schledermann NTT DATA

Applying security updates is a very effective protection against successful cyberattacks. Continue reading to learn more about security patch deployment.

SAP Security Update Implementation and Deployment

Applying security updates is a very effective protection against successful cyberattacks. Continue reading to learn more about security patch deployment.

Demystify ransomware in the context of SAP

To demystify ransomware in the context of SAP we need to look at the attack scenario. While traditional ransomware hits the victim on the operating system level, the SAP technology stack is only impacted if the server platform was successfully attacked.

Efficient Patch Management for SAP

Applying security updates is a very effective protection against successful cyberattacks. Unfortunately, SAP patching is essential but time-consuming, and keeping a system unpatched is like sending an open invitation to threat actors.

Cross-layered detection and response (XDR) for SAP

In this article, we want to share our thoughts on the meaning of cross-layered detection and response and elaborate on why we think it’s an important step to maturity for IT-Security.

Interview with Branden Newman after 6 months on the Board of Advisors

Transformational cybersecurity expert Branden Newman was appointed to the board of advisors at SecurityBridge and recaps on his experience after the first six months.

The Art of SAP Security

100% security just doesn’t exist. Any security measures taken will not be perfect, ever, and will require continuous adjustment. Ignoring security for SAP is not an option, it’s merely applying due diligence to any company’s most valuable, and essential core business.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.