PRESS & NEWS

As a trusted provider of SAP security solutions, we are committed to continuous innovation to address the ever-growing threat of cyberattacks. We protect our customers and work with strong partners to respond quickly to changes in the global risk profile for SAP customers.

Explore our press releases

International Press Coverage

Security Weekly
Security WeeklyMay 9, 2022 -
Video Podcast
Read More
Securing SAP: Addressing the Critical & Complex Challenge
Dark Reading
Dark ReadingApril 13, 2022 - Professional Article
Read More
Identifying a Vulnerability in the SAP Software Supply Chain
Yahoo! Finance
Yahoo! FinanceApril 7, 2022 - Press Release
Read More
NTT Data Business Solutions and SecurityBridge Extend Their Partnership
Yahoo! Finance
Yahoo! FinanceFebruary 22, 2022 - Press Release
Read More
SecurityBridge Broadens U.S. Reach With New 1st Basis Group Partnership
CIO Dive
CIO DiveFebruary 17, 2022 - Professional Article
Read More
Critical SAP vulnerabilities leave broad exposure, fixes require downtime
Journal of Cyber Policy
Journal of Cyber PolicyFebruary 9, 2022 - Press Release
Read More
SecurityBridge unveils its New Security Roadmap for SAP
IT Note
IT NoteJanuary 26, 2022 - Press Release
Read More
SecurityBridge bietet SAP-Security-as-a-Service
CSO Online
CSO OnlineJanuary 19, 2022 - Press Release
Read More
Supply chain vulnerability allows attackers to manipulate SAP transport system
digitaljournal.com
digitaljournal.comSeptember 15, 2021 - Press Release
Read More
SecurityBridge and Fortinet Build Partnership to Provide Enhanced SAP Security
SAPInsider.org (Login)
SAPInsider.org (Login)March 20, 2020 - Professional Article
Read More
How Global Pharmaceutical Company Sanofi Overhauled Its SAP Security
Previous
Next

German Press Coverage (DACH Region)

E-3 Magazin
E-3 MagazinApril 12, 2022 - Press Release
Read More
Effektiver Schutz vor Cyberkriminalität
ZDNet
ZDNetMarch 22, 2022 - Press Release
Read More
Pharmakonzern Sanofi führt Lösung für SAP-Sicherheit von SecurityBridge ein
Security Insider
Security InsiderMarch 01, 2022 - Professional Article
Read More
Schwachstellen in SAP-Systemen: Ransomware bedroht auch SAP-Systeme
S@pport
S@pportIssue 1-2/2022 - Professional Article
Read More
SAP-Security verknüpft Netzwerk-und Applikationssicherheit
S@pport
S@pportIssue 1-2/2022 - Professional Article
Read More
Höhere Sicherheit bei der Softwareverteilung
IT Onlinemagazin
IT OnlinemagazinFebruary 7, 2022 - Professional Article
Read More
SAP-Angriffsfläche verstehen und reduzieren
IT Note
IT NoteJanuary 26, 2022 - Press Release
Read More
SecurityBridge bietet SAP-Security-as-a-Service
pressetext.com
pressetext.comJanuary 13, 2022 - Press Release
Read More
Nach Initiative von SecurityBridge: SAP schließt Sicherheitslücke im Transportwesen
RZ10.de
RZ10.de December 14, 2021 - Webinar
Read More
Nur zusammen sicher: SAP und das Netzwerk - mit Christoph Nagy und Matthias Czwikla
Silicon.de
Silicon.deDecember 9, 2021 - Professional Article
Read More
Ransomware-Angriffe auf SAP-Systeme abwehren
pressetext.com
pressetext.comOctober 8, 2021 - Press Release
Read More
SecurityBridge baut europäisches Netzwerk für SAP-Cybersecurity auf
RZ10.de
RZ10.de May 7, 2020 - Professional Article
Read More
Security Dashboard für SAP mit SecurityBridge
RZ10.de
RZ10.deMarch 18, 2020 - Professional Article
Read More
Day after Verschlüsselungstrojaner: Kann ich dem SAP noch vertrauen?
Previous
Next

PRESS RELEASES

Cyber Security enhanced: NTT Data Business Solutions and SecurityBridge extend their Partnership

NTT DATA Business Solutions and SecurityBridge are expanding their strategic partnership globally. The two IT service providers have already been working together in the North-European market since 2019.

SecurityBridge broadens U.S. reach with new 1st Basis Group partnership

SAP security provider SecurityBridge - now operating in the U.S., - today announced a partnership with Wisconsin-based 1st Basis SAP Services Group (1st Basis).

SecurityBridge partners with Cybersecurity Expert TCSS

TCSS and Security Bridge announced today that the companies have entered a strategic partnership that will help Austrian companies protecting their SAP systems effectively against cybercrime.

SecurityBridge Unveils Its New Security Roadmap For SAP

SecurityBridge announced its new Security Roadmap for SAP. The new feature simplifies the road to SAP security e.g. secure configuration, hardening against hackers, and eliminating SAP vulnerabilities, by enabling IT personnel to instantly group all required software fixes into one area.

SecurityBridge identified Supply Chain Vulnerability in SAP Transport System

Supply chain attacks are a new type of threat that targets software development departments and vendors. SecurityBridge has now identified a methodology that allows internal attackers without privileged rights to intervene undetected in the SAP soft-ware distribution process.

Defend against Ransomware attacks on SAP systems

Ransomware is the bugbear of IT security departments these days. SAP has only been affected to a limited extent so far, but it can certainly be abused as a gateway. SAP applications therefore need holistic protection, recommends SecurityBridge, provider of cybersecurity for SAP applications.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.