SecurityBridge Acquires CyberSafe to Provide SAP Users with Contextual SSO, MFA, and Passwordless Authentication

SecurityBridge Acquires CyberSafe to Elevate SAP Security with Contextual SSO, MFA, and Passwordless Authentication

In a landmark move for SAP security, SecurityBridge, the creator of the Cybersecurity Command Center for SAP, has announced the acquisition of CyberSafe, a UK-based leader in multi-factor authentication (MFA) and single sign-on (SSO) solutions tailored for SAP users. This acquisition represents a significant leap forward in SAP security innovation, as the integration of CyberSafe’s flagship TrustBroker® products enriches the capabilities of the SecurityBridge platform. The result? A seamless transition from traditional password-based authentication to advanced, context-aware MFA and passwordless authentication across the SAP technology stack.

Bridging the Gap in SAP Security

“SAP’s native security lacks the depth today’s threat landscape demands,” said Christoph Nagy, CEO and Co-founder of SecurityBridge. “This acquisition reinforces our mission to ensure no SAP system or customer is ever compromised. By integrating TrustBroker with our platform, we empower customers to implement passwordless MFA across all SAP workflows without sacrificing usability. At the same time, customers retain the flexibility to use TrustBroker products as standalone solutions.”

The acquisition underscores SecurityBridge’s commitment to addressing the evolving challenges of securing SAP environments. With cyber threats growing in sophistication, organizations need more robust and adaptive security measures. The integration of CyberSafe’s cutting-edge authentication technologies into the SecurityBridge platform ensures that SAP users benefit from enhanced protection while maintaining operational efficiency.

CyberSafe’s Proven Expertise Meets SecurityBridge’s Vision

CyberSafe brings over three decades of cybersecurity expertise and a glowing global customer base spanning diverse industries. Its TrustBroker products have long been recognized for their secure SSO, policy-based MFA during login, and step-up authentication (SUA). These solutions integrate seamlessly with leading MFA applications, including Microsoft Entra MFA (formerly Azure MFA), Okta, PingID, Duo, RSA SecurID, and TOTP/HOTP apps.

When combined with SecurityBridge, TrustBroker products will leverage real-time threat signals—such as anomalous logon behavior, suspicious devices, and past user activity—to determine when MFA enforcement is necessary. This contextual intelligence adds a new layer of adaptability to SAP user authentication, ensuring that security measures are both effective and user-friendly.

“For over three decades, CyberSafe has been at the forefront of integrating SAP user authentication with existing infrastructure, such as Microsoft Active Directory,” said Tim Alsop, Managing Director of CyberSafe. “Joining forces with SecurityBridge enables us to build and enhance new products while capitalizing on the growing adoption of modern authentication methods. I’m also excited about delivering integration with the SecurityBridge platform, allowing our TrustBroker products to offer contextual and risk-based MFA.”

Enhancing SAP Security with Behavior-Based Policies

The combined platform introduces behavior-based enforcement policies with MFA, taking SAP security to unprecedented levels. Here’s how it works:

  1. Automatic MFA Enforcement After Inactivity: Users returning after extended periods of inactivity (e.g., 90+ days) will automatically be prompted for MFA, mitigating risks associated with dormant accounts.
  2. Out-of-Hours Login Protections: Logins occurring outside a user’s standard working hours will trigger MFA, reducing the likelihood of unauthorized access during off-peak times.
  3. Device Recognition: MFA will be enforced when logins originate from devices not previously associated with the user, ensuring that unfamiliar devices undergo additional scrutiny.
  4. Behavioral Flagging: Users with a history of suspicious behavior or flagged activity will face additional authentication steps, addressing potential insider threats.
  5. Shared Device Detection: Access attempts from devices used by multiple individuals will prompt MFA, safeguarding against credential sharing and misuse.

These context-aware measures dynamically adapt authentication requirements based on real-time risk factors. By doing so, they minimize user friction during routine activities while fortifying defenses against abnormal or high-risk access attempts.

A Seamless Blend of Security and Usability

One of the standout benefits of this integration is its ability to balance security with usability. Traditional authentication methods often frustrate users with rigid, one-size-fits-all requirements. In contrast, the combined SecurityBridge and CyberSafe solution tailors authentication processes to each unique scenario. For example, a user logging in from their usual device during regular working hours may experience minimal interruptions, while an unusual login attempt from an unrecognized location would trigger additional verification steps.

This approach not only enhances security but also improves the overall user experience. Employees can focus on their tasks without being bogged down by unnecessary authentication prompts, while IT teams gain peace of mind knowing that sensitive SAP systems are protected by intelligent, adaptive safeguards.

About CyberSafe

CyberSafe is a leading global security software vendor, providing mature, proven, standards-based solutions that enable true enterprise-class single sign-on (SSO), policy-based multi-factor authentication (MFA), and step-up authentication (SUA) for mission-critical SAP business applications. In 1991, the company pioneered the first commercial Kerberos-based security product, including being the first to provide critical security interoperability between Microsoft Windows and non-Microsoft operating systems and applications. More recently, CyberSafe has pioneered step-up authentication for SAP users, a feature not available from any other software vendor. The TrustBroker products are flexible and leverage existing infrastructure to minimize implementation and ongoing costs.

About SecurityBridge

SecurityBridge is the leading provider of a comprehensive, SAP-native cybersecurity platform, enabling organizations worldwide to protect their most critical business systems. The platform seamlessly integrates real-time threat monitoring, vulnerability management, and compliance capabilities directly into the SAP environment, enabling organizations to protect their data’s integrity, confidentiality, and availability with minimal manual effort. It provides a 360° view of the SAP security situation and is characterized by user-friendliness, rapid implementation, and transparent licensing. SecurityBridge has a proven track record, including an excellent customer rating and over 7,500 secured SAP systems worldwide. The company is committed to innovation, transparency, and customer focus, ensuring that SAP users can confidently navigate the evolving landscape of SAP security threats.

Source link

Share your love