Skip to content

Large enterprise protection tactics for mid-market companies

mc coy partnership

It’s like a digital cardiac arrest for companies; cyberattacks. The Chamber of Commerce estimates that more than 290 cybersecurity attacks are launched each week on Dutch companies. And those are just the cases we hear about, with the ransomware attacks on VDL and MediaMarkt as the most recent and shocking examples. No wonder experts are urging large enterprises to put cybersecurity on top of their to-do lists and to discuss it in the boardroom. What about thousands of mid-market companies whose budgets can’t cater for a cybersecurity solution, but who fall victim to these cyberattacks just as often? Well, enter the perks of the as-a-service-economy. These businesses now have access to cybersecurity-as-a-service.

Midsize companies profit from the as-a-service-model
The ransomware attack on VDL left the IT of no more than 105 of their subsidiaries paralyzed and forced the enterprise to shut down production for days. Since IT systems are at the core of almost every business process nowadays, the impact of the financial damage on an organization is considerable. Let alone the privacy risks it brings when a data breach is involved. Hackers’ methodologies evolve by the day. Large corporations usually can afford to have a team and system in place to keep up with cyberthreats, but mid-market companies often lack expertise and funds for this. SAP software experts from McCoy in Eindhoven, Netherlands, and SecurityBridge, leader in SAP security, teamed up to offer midsize organizations the same kind of protection as enterprises – as a service.

First initiative in The Netherlands
Drawing from the knowledge and experience they’ve gathered in their efforts to protect larger companies, McCoy and SecurityBridge decided to make the advanced cybersecurity solutions of SecurityBridge available to mid-market businesses that use SAP.

Bas Gijsbers, Managed Services Consultant at McCoy: “Just open up any newspaper and you’re bound to find an article on ransomware attacks. Critical company systems are attacked more often, and the impact of such threats gets bigger. Smaller companies can now profit from high-end protection in the form of a subscription model. Something that didn’t exist in The Netherlands up until now. We’ve put together a service that protects companies against common attacks, and we can customize these services according to the specific needs of a company or industry. This way, we can minimize risks and – in case of an attack or breach – control the impact as well.”

Protecting the SAP landscape

Eric Bigot, Security Consultant at McCoy says: “Our cybersecurity solution protects the SAP system of organizations, which forms the heart of the IT application landscape. SAP is critical for their daily operations and no matter the size: no organization can afford downtime because of a ransomware attack. The advanced technology of the SecurityBridge Platform, combined with McCoy’s expertise in SAP and business processes, creates new opportunities for midsize companies. They now have access to high-end security solutions that were only available and affordable to large enterprises before.”

eric-bigot

Eric Bigot

Security Consultant at McCoy

An unmatched level of security for smaller companies

“With this solution and subscription model, we can offer mid-market companies a level of cybersecurity, that they otherwise never would have access to. Teaming up with McCoy contributes to our ambition and strategy to help organizations – big or small – protect themselves against the increasing number of cyberattacks and the disastrous impact that comes with those,” concludes Ivan Mans, CTO of SecurityBridge.

Ivan Mans

CTO at SecurityBridge

Ivan Mans CTO at ABEX

Posted by

Till Pleyer
Find recent Security Advisories for SAP©
Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
SAP system main
SAP Cybersecurity- SAP Vulnerability
This article highlights the importance of securing the 3 layers of an SAP system to prevent unauthorized access to critical business data.
NIST 2.0
Let’s be brutally honest: No one really cares about Vulnerability Management... Until they are impacted by a vulnerability exploit! We are always personally affected when an exploit negatively influences our finances, our privacy, our jobs, our careers, or even the size of our future paychecks.
We cordially invite you to participate in our webcast on April 10th at 14:30 CET. This exclusive event is a joint initiative of SecurityBridge in cooperation with BowBridge and Log2 and will allow you to listen to exciting insights from top-class experts.