Bridging the Security Gap: SecurityBridge Launches SIEM and ITSM for SAP

642 results

  1. How SAP Users Can Optimize Cloud Migration by Leveraging Partnerships

    The countdown toward the deadline for SAP ECC maintenance in 2027 is getting closer and closer for SAP users. Cloud migration is now one of the most discussed and sought-after ERP enhancements. Knowing how complex the transformation is going to be for many companies, SAP has been consistently developing and enhancing its RISE with SAP…

  2. Uncovering Cyber Security Vulnerabilities in 2024

    Discover key insights on cybersecurity vulnerabilities in cloud adoption, the top five threats from the CVE in 2024, and understand why security breaches occur.

  3. SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

    On May 4, SAP announced that, while performing regular internal reviews of the company’s cybersecurity infrastructure, they discovered several of the company’s cloud products “do not meet one or several contractually agreed or statutory IT security standards.” Learn what this means for the SAPinsider Community.

  4. Cyber Security Solution for SAP Data

    NextLabs® teams with SAP® to provide a solution to global companies to ensure SAP cybersecurity with centrally managed policies that automate data classification, access management, and audit.

  5. Using SAP UI Logging & the SAP Security Audit Log to monitor events to mitigate Cyber Security Risks

    Protecting an organization’s data has never been more challenging. The cost of a data leak goes far beyond fines – impacting both investor and consumer confidence, causing potentially catastrophic harm to brand and reputation. Proactively addressing risk through logging user interaction, coupled with masking sensitive confidential data provides much needed tracking, auditability and safeguarding. SAP…

  6. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers...…

  7. 5 Pillars for Addressing Cybersecurity and Data Protection: SAP Highlights Key Areas for Organizations to Focus on to Build Digital Trust with Employees and Customers

    by Bruce Romney, Senior Director of Product Marketing, GRC and Security Solutions, SAP and Erin Hughes, SAP S/4HANA Finance and Governance, Risk, and Compliance (GRC) Center of Excellence, SAP North America and Thomas Frénéhard, Global Finance and Risk Center of Excellence, SAP What are today’s business leaders most focused on and what are their top...…

  8. Why Supplementing SAP Cybersecurity Is Vital

    Everything that makes SAP systems so useful for business operations also makes them crucial to protect. All of the critical data stored within must be safeguarded with the highest priority. In this article, you can learn about the best ways to find third-party solutions to security issues and dissolve the silos that can hamper your…

  9. Cybersecurity for Today’s SAP

    Organizations must evolve their SAP security strategies to address new cybersecurity challenges posed by increased ransomware, social engineering, and AI-driven threats, focusing on effective patch management, continuous monitoring, and cross-team collaboration to protect sensitive data.

  10. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…