Skip to content

Hardening the ICM with ACLs – a...

In one of our recent articles, we pointed out the use of Access Control Lists (ACLs) to better manage access control. Below, we will show a practical example of how this can be done for inbound HTTP communication with the ‘Internet Communication Manager’ (ICM) component of an SAP system.

Read More

SAP Security Response zählt das SecurityBridge Research...

Leiter des Forschungslabors ist Joris Van De Vis, Director of Security Research bei SecurityBridge und Mitgründer des SAP-Sicherheits-Spezialisten Protect4S, der seit September 2013 zu SecurityBridge gehört

Read More

SAP Security Patch Day – February 2024...

For February 2024, 13 new Security Notes have been released and 3 have been updated. Lets look at some highlights, starting with the ‘HowNews’ notes.

Read More

Prerequisites for an AI-driven SAP Security –...

While Patch Management helps you implement code fixes for known vulnerabilities in the system code, your SAP system still has a huge number of parameters and settings that influence the behavior of the application. Quite a few of them are security-related and have a significant impact on your attack surface.

It is key for the security of your business-critical SAP systems that you harden them.

Read More

Integrating Privileged Access Management into the SecurityBridge...

The inclusion of Privileged Access Management (PAM) in our platform marks a significant advancement for existing and future customers. Until now, our focus was primarily on monitoring and detection. With PAM, the platform extends its capabilities to grant, manage, and audit privileged access in SAP’s ABAP/4 based products. Looking ahead, we plan to expand this functionality to include JAVA-based SAP products too.

Read More

SecurityBridge Celebrates Landmark Achievements in 2023: Doubling...

SecurityBridge Celebrates Landmark Achievements in 2023: Doubling License Revenue, Perfect Customer Retention, and Continuing Global Reach

Read More

How to avoid huge and fluctuating SAP-SIEM...

For real-time SAP Threat Detection, it is quite common to monitor SAP systems from a Security Operations Centre (SOC) by using central SIEM solutions. However, traditionally, these SIEM solutions are not ‘SAP-aware’ and should be fed with SAP security-relevant data to get the most out of them and secure the entire organization. 

Read More

SAP Security Response Names SecurityBridge’s Research Lab...

SAP Security Response Names SecurityBridge’s Research Lab As Top-3 Worldwide; Joris Van De Vis Appointed Lab’s Director

Read More

TakeASP wird SecurityBridge-Servicepartner mit Fokus auf den...

TakeASP wird SecurityBridge-Servicepartner mit Fokus auf den deutschen Mittelstand

Read More

Time is of the essence when preventing...

This article outlines key SAP systems vulnerabilities, emphasizing the importance of timely prevention and detection for mitigating attacks.

Read More

Strengthening SAP Security with Access Control Lists...

In this blog, we will explore the significance of SAP ACLs, understand their importance in mitigating security risks, and compare them with network security measures like firewalls.

Read More

The Essentials of SAP Fiori Security...

Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.

Read More

SAP Security Patch Day – January 2024...

For January 2024, 10 new Security Notes have been released and 2 have been updated. Lets look at some highlights, starting with the ‘HowNews’ notes which all have a CVSS score of 9.1 this month.

Read More

Prerequisites for an AI-driven SAP Security –...

In our last article, we talked about the potential of AI to improve your SAP Security posture. An AI-driven Threat Detection approach can help identify sophisticated cyberattacks, especially those leveraging a chain of vulnerability exploits. However, while AI can point you to those issues and may automatically block certain activities or user endpoints, the SAP Security team remains responsible for responding to the attack.

Read More

The Risk of Reverse Engineering SAP Security...

This article highlights the importance of SAP Patch Management in implementing monthly security patches promptly.

Read More