SecurityBridge Acquires CyberSafe To Deliver Contextual SSO, MFA, And Passwordless Authentication To SAP Users

Skip to content

SSO with context-aware, risk-based strong authentication for SAP systems

  • Intelligent authentication: Apply MFA intelligently based on context and risk. Automatically trigger additional verification for high-risk logins or sensitive actions in SAP. 

  • Eliminate password-based risks: Protect your SAP systems from phishing attacks and password sharing risks with MFA. 

  • Protect administrator access: Privileged actions are protected with MFA. Prevent hackers from gaining elevated privileges to penetrate the SAP systems. 

  • Seamless user experience: Users benefit from increased productivity with single sign-on, and MFA will be enforced only when needed
Step up Authentication for sensitive actions

How it works

Policy-Based Authentication  

TrustBroker has authentication policies stored on each SAP system, unique to each SAP system, and customized by your administrator to meet your SAP user authentication needs. The policy is used to determine the most appropriate method of authentication when a user performs an action. An action could, for example, be a user logging into the system, running a transaction, approving a bank payment, electronically signing a document, or accessing a specific field on a Dynpro screen. You can also decide when the policy check is performed. 

Step-Up Authentication for Sensitive Actions 

Not all high-risk scenarios occur at the initial user login. Step-up authentication adds an extra layer of security after the user has logged in to an SAP application. For example, a user might log in using single sign-on (SSO) and then attempt to run a sensitive transaction or view confidential data (for example, opening payroll records or performing a critical administrative change). TrustBroker will perform a policy check and determine if the risk of the action is sufficient to re-authenticate using a stronger authentication method. This is referred to as step-up authentication because the risk check has determined that SSO is not sufficient to verify the user’s identity when the action is performed. This targeted approach verifies the user’s identity only when it matters most – accessing the “crown jewels”, using administrative permissions, or performing high-impact changes.  

Contextual, Risk-Based Checks 

What makes TrustBroker especially powerful, when it is combined with the SecurityBridge Platform, is the context-aware MFA enforcement. TrustBroker continuously performs a policy check when the user performs an action, to evaluate the user’s behavior. This behavior check examines factors such as time of access, device or location, and user activity history. If something seems out of the ordinary or high-risk, then TrustBroker will automatically step-up the authentication and enforce MFA, which must be successful before the action can be performed. These context-aware checks ensure that MFA is enforced exactly when needed, providing a dynamic defense that adapts to each situation. During normal, low-risk activity, users aren’t bothered with extra steps, but at the first sign of anomaly, the system responds with heightened security. 

Seamless SSO Integration for Usability 

The TrustBroker product delivers seamless security with minimal friction. Users authenticate once using Microsoft Active Directory, and access SAP systems through secure single sign-on. The product integrates natively with your infrastructure, is SAP certified, and approved for RISE with SAP, making deployment simple and reliable.

Use cases

Some of the above use cases are not available in the current release, but are planned for general availability later in 2025.

These SAP Experts use SecurityBridge to harden their SAP systems

Their words, not ours.

“We selected SecurityBridge as the platform most comprehensive in functionality that is completely and seamlessly integrated within the SAP technology stack.”

Stephane Peteytas e1722433101348
Stéphane Peteytas
Head of SAP Cybersecurity at Sanofi

“SecurityBridge is a true partner, and we count on its platform to alert us to critical vulnerabilities while automating SAP risk management practices.”

Tony Parrillo
Tony Parrillo
Global Head of Cybersecurity at Schneider Electric

“We needed a complete solution that covered all aspects of SAP cybersecurity, is easy to understand, and reasonably priced.”

SAP Authority vulnerability check
Matthieu S.
SAP Architect at PASàPAS

“SecurityBridge fills the critical security voids that SAP can’t address alone.”

Jaromir Wroblewski
Jaromir Wróblewski
Group IT Infrastructure Manager at Stock Spirits Group
Reduced UI Illustration Case

Build your Business Case

The Business Case Calculator will help you to better understand the Return on Investment and Total Cost of Ownership of automating the SAP Security tasks within the SecurityBridge Platform.

Trusted by hundreds of SAP Teams

The latest resources

SAP BTP - SecurityBridge
Ultimate SAP BTP Security Guide for 2025
This article explores the need for corporations to secure their SAP Business Technology Platform (BTP) and how SecurityBridge can help.
Attendees at Secure Together on the Road 2025 – SAP security community event focused on collaboration and innovation.
Secure Together on the Road – 2025 Lookback
A visual recap of SecurityBridge’s 2025 “Secure Together on the Road” events in Frankfurt, Houston, London, and Rotterdam. Browse through...
Smart Data
SIEM for SAP and Smart Data in Microsoft Sentinel 
Not all events are security-relevant, and the context required to distinguish regular from malicious activity is often buried deep within...