Key Insights Blog

Read the latest insights from our experts on Cybersecurity and Risk management for SAP. 

May 22, 2020
Even though SAP systems run on regular operating systems and databases, the application itself uses very specific standards and formats for exchanging and storing data. This article explains the top reasons chief security officer's neglect SAP Security
May 22, 2020
On 04.05.2020 / 23:19 CET/CEST SAP SE published an ad-hoc news informing their investors about a security shortcoming affecting some products of their cloud portfolio. On-Premise customers are not impacted. The company emphasizes that no cyber security incident was found.
Find recent Security Advisories for SAP©

You like it?
Share it!

Share on linkedin
Share on twitter
Share on whatsapp
Share on email

SecurityBridge joins NTT Data’s Cybersecurity for SAP Webinar

Whether your business critical SAP landscape is traditional on-prem, in one or more clouds, or even the latest RISE with SAP, you are accountable for ensuring it is secured against rapidly increasing cyber threats. Join this webinar to learn why SAP application security is critical and how you can stay in control and protect your business.
Download the White Paper “YOUR ROAD TO SAP SECURITY” to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.
Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.