Skip to content

SecurityBridge and Turnkey Consulting form Partnership furthering the global expansion

Turnkey Consulting and ABEX for alliance around SecurityBridge for SAP

Leading SAP security platform provider SecurityBridge and SAP IT security specialist, Turnkey Consulting, have announced a global partnership, following several successful joint projects.

Turnkey Consulting is a global provider of expertise in SAP and GRC security and SecurityBridge, is a “rising star” in SAP security. With today’s announcement, SecurityBridge and Turnkey Consulting will be partnering to provide their clients with a combination of an advanced security platform and a team of experts to deliver solutions on a global basis.

Organizations understand that the probability of being infiltrated is realistically high. Many have been victims of a cyber-attack, with or without awareness. GDPR, and a rising tide of stringent regulatory legislation, has increased the obligation for securing privacy data or risk strict punitive measures. Risk assessments and compliance are a key area of focus for the partnership to add value to their client services.

Richard Hunt
Richard Hunt
Managing Director at Turnkey Consulting

Richard Hunt, managing director of Turnkey Consulting, said: “Technology in this space is evolving rapidly with improved methods of threat detection and intelligence providing our clients with a number of options to defend their SAP systems from an increasing number of cyberattacks. Turnkey’s independent status gives us critical insight into the solutions available in the market and enables us to select the products that best answer each organisation’s individual needs. We are already working with several companies that have selected the SecurityBridge Platform and including ABEX as one of our strategic partners broadens the options we have available to provide real-time threat monitoring and vulnerability management to our clients.

The equation for our Strategic Alliance

Threats against SAP systems are becoming more prevalent and more sophisticated. As we’ve seen with the recent RECON zero-day, vulnerabilities can and do exist. The most effective, proven approach is to combine constant real-time threat monitoring and vulnerability management into a holistic security process”, said Christoph Nagy, CEO of SecurityBridge. “The partnership with Turnkey Consulting will be highly synergistic for both parties, as we value the expertise and global presence that Turnkey Consulting provides. This will enable our rapidly growing client base to engage in extending their security operations with a trusted service partner, and we look forward to an exciting year ahead“.

Christoph Nagy
CEO at SecurityBridge

About SecurityBridge Platform

The SecurityBridge Platform for SAP is a seamlessly integrated SAP cybersecurity technology, built from the ground up to protect SAP systems from both internal and external threats.
The innovative platform provides real-time threat detection, vulnerability management, custom code scanning and, patch-management in a seamless one-stop-shop solution build on a homogeneous technology layer. With real-time dashboards based on SAP Fiori, SecurityBridge is able to provide actionable intelligence that can be relied upon to make critical security decisions.

ABOUT TURNKEY CONSULTING

Turnkey Consulting is a specialist GRC and IT security company that combines business consulting with technical implementation to deliver information security solutions in support of systems running both SAP and non-SAP solutions. It focuses on the delivery of specialised services in the areas of security, governance, risk and compliance (GRC), working service providers, audit partners and clients directly to provide the security controls and solutions that safeguard and complement the implementation of enterprise systems. Clients include some of the world’s largest blue-chip companies alongside systems integrators and a number of government agencies.

The company was established in 2004 and has offices in the UK, Australia, France, Germany, Malaysia, Singapore and the US.

Posted by

Marketing Dept.
Find recent Security Advisories for SAP©

Looking into securing your SAP landscape? This white-paper tells you the “Top Mistakes to Avoid in SAP Security“. Download it now.

SAP Security Services
SAP Cybersecurity- Security News
Many companies have recognized the need for SAP cybersecurity, but many have also realized that they cannot accomplish this alone. There are many reasons for this. It can be due to the internal teams' workload or due to the employee's level of knowledge. However, there is a solution that neither burdens your internal staff nor demands additional knowledge. A specialized managed SAP Security Service allows you to harden mission-critical systems, detect and promptly counteract non-compliance, and implement monitoring with accurate anomaly detection.
Patch Management
SAP security provider SecurityBridge—now operating in the U.S.—today announced the full integration of its SAP Security Platform with the Microsoft Sentinel cloud-native Security Information and Event Manager (SIEM) platform and its membership to MISA. SecurityBridge was nominated to MISA because of the integration of its SAP Controller to the Microsoft Sentinel dashboard. SecurityBridge is a Smart Data Adapter that significantly simplifies security monitoring of critical and highly specific business applications.
Angriffserkennung für SAP
SAP Cybersecurity- SAP Identity and Authorization- SAP Threat Monitoring- Security News
Viele unserer Leserinnen und Leser erinnern sich noch an den 25. Mai 2018, Stichtag der bindenden Einführung der Datenschutzgrundverordnung, kurz DSGVO. Verstöße gegen die neue Regelung können seitdem zu drakonischen Strafen führen. Nun steht, zumindest für diejenigen Unternehmen, die zur kritischen Infrastruktur (KRITIS) von Deutschland zählen, ein ähnlicher Termin ins Haus. Am 1. Mai 2023 müssen betroffene Unternehmen ein System zur Angriffserkennung eingeführt haben.
SAP Cybersecurity Risks
SAP Cybersecurity- SAP Security Framework- Security News
Recently, we gave an insight into the known SAP attackers in our blog. Of course, it can already be deduced from this that there are internal and external SAP attackers. That is why today, we want to look at this from an SAP cybersecurity risk perspective.