Skip to content

The road to our new feature Security Roadmap

SAP security roadmap

Over the past months, I’ve spent a lot of time talking to customers and prospects to better understand their requirements,  challenges and motivations. In these conversations, one question has been frequently asked: “What’s the best way to move forward in SAP security after the initial security analysis?”

Christoph Nagy
CEO SecurityBridge

From the question to the concept

The question is not easy to answer in a generalized way. SAP implementations are typically complex structures consisting of SAP NetWeaver, SAProuter, SAP WebDispatcher, SAP S4/HANA, and possibly SAP Cloud. This is however a great question facing many security teams, so we discussed it with the SecurityBridge engineering team, who love a technical quandry and debate. A few discussions later, we had a concensus and a concept.

From concept to pilot

The problem with concepts is that they’re worthless unless proven. This is usually not a problem, as our experts are very good at assessing what’s feasible, but more importantly you need to know if the concept meets your clients’ requirements.

SAP security workshop

That’s why we discussed it with customers and partners. I particularly enjoy the constructive atmosphere and the open discussions and freely exchanged ideas. This gives each of our customers and partners the best opportunity to help shape the future of the solution. A few discussions later, and admittedly some changes to the initial concept, we moved on to implement a pilot.

The solution must be simple

The best solution to a complex problem is often based on a simple idea, as it proved to be in this case. Remember, customers are faced with the challenge of how to best proceed in order to increase system security. They look at an actual picture of the current system security which may contain many red lights and warnings.

SecurityBridge (from version 5.85.4 onwards) has the ability to evaluate the resolution complexity of any security issue, as well as the probability of exploitation. This is the basis for a security roadmap that can be implemented. So now, our customers can set priorities on findings that are easy to resolve but have a high risk of exploitation.

Feedback is important!

It is particularly important to ask for feedback from end-users in assessing whether the new feature is accepted and meets the intended added-value. For this purpose, all security applications included in the SecurityBridge platform have a “Send Feedback” function. Additionally, we ask our customers and partners about their experiences in the course of regular discussions. The Security Roadmap function, by the way, is well received and has already helped many SecurityBridge customers to identify and realize quick wins. More complex topics can be planned specifically on a roadmap.

Final words

Our common goal is to help you to enhance your SAP system security, and to sustain the achieved security posture holistically. This is a huge task and will be accomplished more easily and efficiently as a team. Therefore, we are continually growing the numbers of our partners and extended “team”. We’d love to share our insights with you so feel free to reach out at any time.

Posted by

Till Pleyer
Find recent Security Advisories for SAP©

Looking into securing your SAP landscape? This white-paper tells you the “Top Mistakes to Avoid in SAP Security“. Download it now.

Mastering NIST & CISA Compliance for SAP

Join us for an enlightening webinar where we simplify these regulatory frameworks, map CISA guidelines to SAP instances, and showcase how the SecurityBridge platform can assist you in achieving your SAP compliance needs.

Kickstarting Your SAP Security Journey

Do you want to kickstart your journey towards SAP security excellence? Then check out our upcoming webinar. In our webinar, we will show you how to overcome these pitfalls and kickstart your journey to SAP Security excellence. Our customer cbs consulting will talk about their experience with implementing the SecurityBridge Platform and the first milestones achieved on their SAP Security journey.
SAP vulnerability
SAP Vulnerability
As we know, SAP (Systems, Applications, and Products in Data Processing) is a widely used enterprise resource planning (ERP) software suite that helps organizations manage various business operations. No digital system is secure by nature or by default - there will always be security challenges, and SAP is no exception. In this article, we discuss the Top 10 vulnerabilities in SAP – how they affect the security of an SAP system, and finally, how to identify and manage them with SecurityBridge.
SAP security Patch day
Today, September 12th, 2023 brings the release of SAP Security Patches for the extensive enterprise application portfolio developed by the Walldorf giant. SAP released 13 new Security Notes and provided 5 updates to previously released Security Notes.
Leadership team
SecurityBridge, a leading provider of cybersecurity solutions for SAP customers, acquired Dutch SAP security specialist Protect4S. Through the acquisition, customers will benefit from an even more comprehensive one-stop-shop software platform that will improve every SAP customer’s security position across all technology stacks.

“SecurityBridge is committed to supporting our ecosystem of partners to continue our fast company growth. Our partners bring us the scale we need with their extensive customer relationships and substantial technical expertise that ensures customer success.”

Christoph Nagy
CEO SecurityBridge