How to Deploy the Cybersecurity Extension for SAP on SAP Build Work Zone

Deploying the Cybersecurity Extension for SAP on SAP BTP involves a three-stage process that takes approximately 45 minutes. First, prepare the SAP BTP subaccount, ensuring the Cloud Connector, destinations, and entitlements are correctly configured. Next, use the Cloud Foundry CLI to deploy the provided .mtar file. Finally, configure SAP Build Work Zone by importing the […]

Digital Operational Resilience Act (DORA) Compliance for SAP Solutions

The Digital Operational Resilience Act (DORA) is an EU regulation that requires financial institutions to ensure their Information and Communications Technology (ICT) systems can withstand, respond to, and recover from disruptions. For organizations using SAP for critical functions, this means SAP solutions must be governed, monitored, and tested to meet DORA’s stringent standards for operational […]

What’s New in the Cybersecurity Extension for SAP Version 2.0?

Version 2.0 of the Cybersecurity Extension for SAP is now available, introducing major enhancements to protect business-critical SAP solutions. Key updates include support for SAP NetWeaver AS Java, powerful anomaly detection capabilities, over 400 new threat detection patterns, and updated compliance checks for the latest SAP security benchmarks. Executive Summary Layer Seven Security’s release of the Cybersecurity […]

Layer Seven Security’s Cybersecurity Extension Named Top SAP Solution for 2025

Layer Seven Security’s Cybersecurity Extension for SAP has been named the Top SAP Cybersecurity Solution for 2025 by the Cybersecurity Review. The solution was selected for its superior integrated coverage, exceptional customer support, and competitive licensing costs, distinguishing it from competitors like Onapsis, Security Bridge, and Pathlock. The international publication, with nearly 300,000 subscribers, conducted a detailed analysis […]

Layer Seven Security’s Cybersecurity Extension Named Top SAP Solution for 2025

Layer Seven Security’s Cybersecurity Extension for SAP has been named the Top SAP Cybersecurity Solution for 2025 by the Cybersecurity Review. The solution was selected for its superior integrated coverage, exceptional customer support, and competitive licensing costs, distinguishing it from competitors like Onapsis, Security Bridge, and Pathlock. The international publication, with nearly 300,000 subscribers, conducted a detailed analysis […]

What’s New in the Cybersecurity Extension for SAP, Version 5.3

Version 5.3 of the Cybersecurity Extension for SAP (CES) is now available, delivering major enhancements for SAP vulnerability management and threat detection. This release introduces comprehensive monitoring for the SAP Cloud Connector, updates to key compliance frameworks including SAP RISE, and emergency patches for zero-day vulnerabilities like CVE-2025-31324. The latest release of the Cybersecurity Extension for SAP […]

Buyer’s Guide: SAP Enterprise Threat Detection Drawbacks & Alternatives

While SAP Enterprise Threat Detection (ETD) is SAP’s primary solution for identifying cyber attacks in its applications, it has significant drawbacks regarding infrastructure, pattern coverage, and overall security scope. These limitations make addon-based, full-suite alternatives a more efficient and comprehensive choice for many organizations. SAP ETD is a powerful tool for detecting threats in real-time […]

What’s New in Cybersecurity Extension for SAP, Version 5.2?

Version 5.2 of the Cybersecurity Extension for SAP introduces significant enhancements, including comprehensive support for SAP Business Technology Platform (BTP), critical access and Segregation of Duties (SoD) monitoring for SAP ECC, and new alerts for emerging threats. This release expands real-time threat detection and compliance monitoring across modern and legacy SAP environments. The latest update provides robust […]

What’s New in Cybersecurity Extension for SAP Version 5.1?

Version 5.1 of the Cybersecurity Extension for SAP introduces significant enhancements, including comprehensive access risk analysis for S/4HANA, compliance monitoring for SAP RISE, expanded threat detection patterns matching SAP ETD CE, and new dashboards for tracking actively and known exploited vulnerabilities based on the CISA KEV catalog. The latest release, version 5.1 of the Cybersecurity Extension for […]

How to Ensure Security Compliance for SAP RISE Solutions

Securing SAP RISE solutions requires adhering to over 120 specific requirements across 12 security areas defined by SAP. Organizations can achieve this compliance by performing automated gap assessments using the Cybersecurity Extension for SAP (CES), which evaluates system settings against mandatory hardening standards to identify and remediate security vulnerabilities. SAP RISE customers, including those using […]