TOPICS

The subject area of SAP security is broad. In addition to a holistic approach that builds bridges, we also try to provide you with a lot of information.
On this page, you will find an overview of topics. If you have any questions about the topics or our products, please do not hesitate to contact us.

Who are the typical SAP attackers?

We are asked many times and have already addressed this in our open webinars (link to event recordings overview), which SAP attackers exist? With this blog, we would like to share some insight and answer this question.

SIEM, from log evaluation to SAP attack detection

To detect attacks on SAP, you need to evaluate the security logs in SAP. While many organizations have spent the past few years protecting the perimeter, business-critical systems are now becoming the priority of security operations. In this article, we will look at what an SAP SIEM might look like and what data and processes are necessary to enable desired conclusions.

What is SAP Threat Intelligence? 

Threat Intelligence is as follows: Threat intelligence is evidence-based information about cyber-attacks organized and analyzed by cyber security experts. This is also valid for SAP but must be specifically refined.

The easy way to spot anomalies in SAP

How to reliably detect suspicious actions from within the huge mass of SAP systems and user activity? In this article, we’ll tell you what’s needed to detect anomalies in SAP's log stack and put them into context to find cyber-attacks.

Demystify ransomware in the context of SAP

To demystify ransomware in the context of SAP we need to look at the attack scenario. While traditional ransomware hits the victim on the operating system level, the SAP technology stack is only impacted if the server platform was successfully attacked.

Cross-layered detection and response (XDR) for SAP

In this article, we want to share our thoughts on the meaning of cross-layered detection and response and elaborate on why we think it’s an important step to maturity for IT-Security.

Inline Risk Management & how it helps to detect deviation

Organizations by now must have realized that they are swimming with sharks when it comes to cyber-security. Awareness and acceptance of the risk can put you in a stronger position than you have thought. Keeping a close eye on any deviation of risk is vital to understand whether a new threat scenario exists that demands your action.

3 Reasons to start monitoring SAP

There appears to be a new trend for companies to centralize their log sources into Security Information and Event Management (SIEM) solutions. The time has come to look at SAP. This article explains why.

Reduce complexity the enemy of SAP Security

On November 5th, 2020 a new release of SecurityBridge was made available for our subscribers. The release (version 5.78.3) contains major improvements. Some of the highlights contained in the release are described on this site. Customers can download the new release from our online support portal.

Threat Intelligence in the context of SAP

SecurityBridge, the only holistic security platform for SAP systems, offers the two key factors necessary for Threat Intelligence in an SAP context: For the identification and elimination of vulnerabilities, a comprehensive catalog of tests is integral part of SecurityBridge, based on established standards.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.