Minor release, major step!

SAP Release News

Cybersecurity for SAP©

Our SecurityBridge platform is a holistic cybersecurity suite for Netweaver, fully integrated with SAP. Based on the NIST Framework, SecurityBridge enables SAP customers to Identify, Detect and Respond to cyber threats. Don’t wait until your company becomes the victim of a cyber attack, protect yourself now.

Summary Vers. 4.73

The following new features were released on Friday 22nd May 2020. This version is a minor release update after the recent 4.7 major release that contained the Security & Compliance Monitor.

Highlight

HyperLogging

Event Monitor

HyperLogging enables SecurityBridge to track all actions of a particular account, across all systems of your landscape. HyperLogging (Blog) can be activated automatically as a response to a security-critical event. E.g. when SecurityBridge finds a SAP_ALL assignment it will start recording all actions of the account in focus, during, and after the critical authorization assignment. This enables you to have full and audit compliant insight into all actions executed. In an upcoming major release, a dedicated HyperLogging Fiori app will become available.

HyperLogging
Highlight

Saved Searches

Event Monitor

The SecurityBridge Event Monitor now allows end-users to store selection filters for personal or global use. It is possible create a set of saved searches.

SCM Workcenter
Highlight

Announce System Maintenance

Threat Detection

At times an SAP instance goes for regular maintenance a series of admin actions are conducted that trigger security events. These are valid but they shall not trigger investigation actions within the Security Operation Center. SecurityBridge now allows to announce a maintenance period so events can be suppressed during this timeframe. Security relevant actions remain documented without generating alert fatigue.

Event Registration
... and more

Detection Pattern updates

after SAP Patchday May 2020

Identification patterns for vulnerabilities published by SAP Patchday in May are already included within our latest SecurityBridge release. A good number of potential exploits can be identified, which will help prioritizing the implementation of patches.

Connectivity API

Incident Management

A set of API services have been released for integrating ITSM Solutions with the SecurityBridge Incident Management application. For details please do check the online knowledge base.

JAVA Audit Log

Threat Detection for SAP©

The Audit Log for JAVA agents now has a dedicated event listener. SAP NetWeaver JAVA instances can therefore easily be connected with your Security Operation Center. JAVA events have the exact same capabilities as events originating from an ABAP based system, offering full integration with the action framework.

Learn more about SecurityBridge here

Webinar SAP patch
The webinar, taking place on 05.10.2022, is all about SAP Patch Management and its challenges. The German-speaking SAP User Group (DSAG) and the American colleagues of ASUG asked why SAP security patching cannot be as simple and effective as, for example, Windows updates.
S/4HANA migration
SAP Cybersecurity- SAP Security Automation- Security News
“There are a few constants in life” – a statement that also applies to the SAP user community. It has always been a challenge for SAP customers to bring their large SAP environments to a current release level. Although the vendor has done a lot in the past to simplify this, it is still not a complex undertaking.
SecurityBridge
Here at SecurityBridge, we are extremely lucky to have a team full of amazing professionals. Thanks to our team, we have achieved extraordinary things in the past couple of years. With that in mind, we thought it was time for us to start introducing you to the team that drives everything behind the scenes. And we couldn't have chosen a better example to start with than our very own, Harish Dahima! Read on and learn all about Harish's life as a Senior Product Developer, his role, and life at SecurityBridge.
SAP Cloud Connector
SAP Cloud Security- SAP Cybersecurity- Security News
Every organization constantly faces the challenge of minimizing the attack surface that an adversary could use to perform malicious operations. To do this, administrators must install the deployed components and understand them in detail to identify risks and proactively mitigate or prevent those. Today we are looking at what is necessary to protect the SAP Cloud Connector.