The first and only integrated Platform for SAP

SecurityBridge: the first and only holistic, natively integrated security platform, addressing all aspects needed to protect organizations running SAP from internal and external threats against their core business applications.

In one seamless platform all SAP vulnerabilities and risks can be identified and mitigation action can be taken.

Read more to learn what we have included in the recent release 4.75. 

Summary

On July 29th 2020 a new release of SecurityBridge was made available for our subscribers.  The release (version 4.75)  includes new features and enhancements to the current security controls.

Highlight

Security Rating

Security & Compliance Management

The central component of SecurityBridge for SAP vulnerability management is the Security & Compliance Management application. It helps organizations to assess the complexity of SAP’s security settings throughout the entire landscape controlled from a central location. In Version 4.75, we enhanced the System view with additional metrics.

The system result view now lists the executed checks by result, directly on the page header. We introduced a 5-Star rating system allowing customers to compare the security rating across systems. 

And if this wouldn’t be enough, a security level indicator has been added to the right part of the header. The indicator shows the security level per Area of Responsibility.

Highlight

Real-time knowledgebase integration

SecurityBridge Platform

An essential advantage for defenders in their fight against cyberattacks can be leveraged through efficient information management.  Defenders have a need to know about risks, new configuration settings, and potential vulnerabilities residing in SAP’s vast product portfolio. We understand that in your role as a defender, you need up-to-date information directly within any solution, without the need of a software update. As a result of this understanding we are introducing real-time knowledge base integration. Any update applied to our online service portal is instantly available within all SecurityBridge applications.

Highlight

SAP HANA Database

Adding 7 new Security Checks to the SAP in-memory database

Enterprises transform their business quickly and effectively using S/4 HANA or only the in-memory database SAP HANA. New technologies also introduce new security challenges. 

In this release, we enhance the existing security checks with 7 new configuration and compliance checks in following areas:

Highlight

Application Icons

Fiori Apps

SAP Fiori applications have introduced a new way of working. Compared to old-fashioned standard applications, the user experience has undergone a significant transformation.

End-users have become more efficient, and love the intuitive interface. One aspect of the new user experience is a unique but unified user interface. SAP Fiori allows developers to create very customized UI’s while the handling will remains unchanged. 

All Fiori Apps provided by the SecurityBridge platform received a new and harmonized icon.

... and more

Detection Pattern updates

after recent SAP Patch Day's

Identification patterns for vulnerabilities published by SAP Patch Day in June and July (including detection for CVE-2020-6287 (Mulitple Vulnerabilities in NetWeaver AS JavA)) are included within our latest SecurityBridge release.

Learn more about SecurityBridge here

Find recent Security Advisories for SAP©
Webinar SAP patch
The webinar, taking place on 05.10.2022, is all about SAP Patch Management and its challenges. The German-speaking SAP User Group (DSAG) and the American colleagues of ASUG asked why SAP security patching cannot be as simple and effective as, for example, Windows updates.
S/4HANA migration
SAP Cybersecurity- SAP Security Automation- Security News
“There are a few constants in life” – a statement that also applies to the SAP user community. It has always been a challenge for SAP customers to bring their large SAP environments to a current release level. Although the vendor has done a lot in the past to simplify this, it is still not a complex undertaking.
SecurityBridge
Here at SecurityBridge, we are extremely lucky to have a team full of amazing professionals. Thanks to our team, we have achieved extraordinary things in the past couple of years. With that in mind, we thought it was time for us to start introducing you to the team that drives everything behind the scenes. And we couldn't have chosen a better example to start with than our very own, Harish Dahima! Read on and learn all about Harish's life as a Senior Product Developer, his role, and life at SecurityBridge.
SAP Cloud Connector
SAP Cloud Security- SAP Cybersecurity- Security News
Every organization constantly faces the challenge of minimizing the attack surface that an adversary could use to perform malicious operations. To do this, administrators must install the deployed components and understand them in detail to identify risks and proactively mitigate or prevent those. Today we are looking at what is necessary to protect the SAP Cloud Connector.