SecurityBridge Acquires CyberSafe to Strengthen Cybersecurity Platform

Reading time: 2 mins

Meet the Authors

Key Takeaways

⇨ SecurityBridge's acquisition of CyberSafe enhances its SAP-native cybersecurity platform with contextual, passwordless access features through the TrustBroker product line, addressing the inadequacies of SAP's native security.

⇨ The integration enables risk-based authentication methods, shifting away from static password controls, allowing for dynamic, user-focused security based on contextual factors such as user inactivity and device legitimacy.

⇨ Vendor consolidation through this acquisition simplifies SAP security management, offering enterprises a unified solution for SSO, MFA, and SUA, leading to potential cost savings and improved return on investment.

SecurityBridge has announced its acquisition of CyberSafe, a UK-based vendor that specializes in single sign-on (SSO), multi-factor authentication (MFA), and step-up authentication (SUA) for mission-critical SAP applications. This strategic move broadens SecurityBridge’s SAP-native cybersecurity platform to include contextual, passwordless access features through CyberSafe’s flagship TrustBroker product line.

“SAP’s native security lacks the depth today’s threat landscape demands,” said Christoph Nagy, CEO and Co-founder of SecurityBridge. “By integrating TrustBroker with our platform, we enable customers to apply passwordless MFA across all SAP workflows, without compromising usability.”

CyberSafe offers over 30 years of enterprise authentication expertise. Known for pioneering Kerberos-based security products and integrating SAP user authentication with Microsoft Active Directory, the company supports leading identity providers such as Microsoft Entra MFA (formerly Azure MFA), Okta, PingID, Duo, RSA SecurID, and TOTP/HOTP apps.

Explore related questions

Behavior-Based SAP Security Policies

The integration of Security Bridge solutions with TrustBroker enables customers to shift from static, password-based authentication to real-time, risk-based authentication methods. TrustBroker products can be used independently, but when combined with SecurityBridge, they can automatically trigger additional authentication steps:

  • Automatically trigger MFA when users return after extended inactivity (e.g., 90+ days).
  • Prompt users for MFA when logging in outside their normal working hours.
  • Require MFA for logins from devices not previously linked to the user.
  • Apply additional authentication for users with a history of suspicious or flagged behavior.
  • Initiate MFA when access comes from shared or multi-user devices.

Strategic Impact and Future Integration

According to Tim Alsop, Managing Director of CyberSafe, the acquisition will speed up product innovation and enable closer integration with modern authentication systems.

Alsop said: “Joining forces with SecurityBridge facilitates building new products and enhancing existing products while leveraging the growing adoption of modern authentication methods. I am also looking forward to being able to deliver integration with the SecurityBridge platform, so that our TrustBroker products can offer contextual and risk-based MFA.”

What This Means for SAPinsiders

Risk-based authentication is now critical for SAP security. SAPinsiders must shift from password-based controls to context-aware, identity-centric security frameworks. As remote access and hybrid infrastructure become more prevalent, native SAP controls are no longer sufficient. Incorporating behavioral signals with MFA enforcement helps address key gaps in SAP access management. Security leaders should assess their current authentication systems to ensure they support dynamic, user-focused access policies.

Authentication strategies must align with broader threat detection efforts. Security teams can benefit from unified platforms like the ones offered by SecurityBridge and CyberSafe, which combine vulnerability scanning, real-time monitoring, and now, adaptive authentication. By linking authentication data with other security telemetry, teams gain a comprehensive view of SAP threats, including intelligent incident response and audit readiness. This integration improves response speed and reduces gaps in security operations.

Vendor consolidation simplifies SAP security management. For SAP customers currently using separate security tools from multiple vendors, a solution providing single sign-on (SSO), multi-factor authentication (MFA), and step-up authentication (SUA) from one vendor is now available. Enterprises looking for cost savings and quicker ROI may find additional value in SecurityBridge’s unified, SAP-native architecture.

More Resources

See All Related Content