PRESS & NEWS

As a trusted provider of SAP security solutions, we are committed to continuous innovation to address the ever-growing threat of cyberattacks. We protect our customers and work with strong partners to respond quickly to changes in the global risk profile for SAP customers.

Explore our press releases

Securitybridge in the press

CSO Online
CSO OnlineJanuary 19, 2022 - Press Release
Read More
Supply chain vulnerability allows attackers to manipulate SAP transport system
RZ10.de
RZ10.de December 14, 2021 - Webinar
Read More
Nur zusammen sicher: SAP und das Netzwerk - mit Christoph Nagy und Matthias Czwikla
Silicon.de
Silicon.deDecember 9, 2021 - Professional Article
Read More
Ransomware-Angriffe auf SAP-Systeme abwehren
pressetext.com
pressetext.comOctober 8, 2021 - Press Release
Read More
SecurityBridge baut europäisches Netzwerk für SAP-Cybersecurity auf
digitaljournal.com
digitaljournal.comSeptember 15, 2021 - Press Release
Read More
SecurityBridge and Fortinet Build Partnership to Provide Enhanced SAP Security
RZ10.de
RZ10.de May 7, 2020 - Professional Article
Read More
Security Dashboard für SAP mit SecurityBridge
RZ10.de
RZ10.deMarch 18, 2020 - Professional Article
Read More
Day after Verschlüsselungstrojaner: Kann ich dem SAP noch vertrauen?

PRESS RELEASES

SecurityBridge identified Supply Chain Vulnerability in SAP Transport System

Supply chain attacks are a new type of threat that targets software development departments and vendors. SecurityBridge has now identified a methodology that allows internal attackers without privileged rights to intervene undetected in the SAP soft-ware distribution process.

Defend against Ransomware attacks on SAP systems

Ransomware is the bugbear of IT security departments these days. SAP has only been affected to a limited extent so far, but it can certainly be abused as a gateway. SAP applications therefore need holistic protection, recommends SecurityBridge, provider of cybersecurity for SAP applications.

Mid-market companies can now protect themselves with large enterprise tactics

How can mid-market companies whose budgets can’t cater for a cybersecurity solution still protect their SAP from cyber attacks? Well, enter the perks of the as-a-service-economy. These businesses now have access to cybersecurity-as-a-service.

SecurityBridge builds European network for SAP cyber security

In the past twelve months, the specialist for security and compliance in the SAP environment has gained 15 new partners throughout Europe who use its software platform in their customer projects.

SecurityBridge expands international partner network with Techedge Spain

SecurityBridge, provider of the world’s first and only seamlessly integrated SAP cyber-security platform, and digital transformation expert Techedge in Spain, today announced a strategic partnership to help securing their customers’ SAP systems.

#crossthebridge Cycling 2021

On September 3, 2021 SecurityBridge celebrated the successful premiere of the crossthebridge cycling event in the Netherlands. Together with customers and partners we were cycling for SAP security, a good cause, and for fun.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.