securitybridge.com
Open in
urlscan Pro
3.219.228.8
Public Scan
Submitted URL: https://www.securitybridge.com/
Effective URL: https://securitybridge.com/
Submission: On September 07 via automatic, source certstream-suspicious
Effective URL: https://securitybridge.com/
Submission: On September 07 via automatic, source certstream-suspicious
Form analysis
1 forms found in the DOMName: SBcom - Contact to Lead — POST https://crm.ncmi.co/modules/Webforms/capture.php
<form id="__vtigerWebForm" class="abex-form" name="SBcom - Contact to Lead" action="https://crm.ncmi.co/modules/Webforms/capture.php" method="post" accept-charset="utf-8" enctype="multipart/form-data">
<input type="hidden" name="__vtrftk" value="sid:afce511ef3a1d2279c5db703382bd768c0e4edf9,1620724912">
<input type="hidden" name="publicid" value="911a5a984ddf9f6806e3b54f12cf37fe">
<input type="hidden" name="urlencodeenable" value="1">
<input type="hidden" name="name" value="SBcom - Contact to Lead">
<fieldset class="abex-group">
<input class="abex-input-1" name="firstname" placeholder="First name" type="text" value="">
<input class="abex-input-1" name="lastname" placeholder="Last name" required="" type="text" value="">
<input class="abex-input-1" name="email" placeholder="Email address" required="" type="email" value="">
<input class="abex-input-1" name="company" placeholder="Company" required="" type="text" value="">
</fieldset>
<fieldset class="abex-group">
<textarea class="abex-input-1" name="description">Let us know how we can help you ... </textarea>
<input class="abex-input-1" name="leadsource" type="hidden" value="Web Site">
<input name="website" type="hidden" id="form_field_website" value="https://securitybridge.com/">
<script type="text/javascript">
var RecaptchaOptions = {
theme: "clean"
};
</script>
<script type="text/javascript" src="https://www.google.com/recaptcha/api/challenge?k=6Lchg-wSAAAAAIkV51_LSksz6fFdD2vgy59jwa38"></script>
<noscript><iframe loading="lazy" src="http://www.google.com/recaptcha/api/noscript?k=6Lchg-wSAAAAAIkV51_LSksz6fFdD2vgy59jwa38" height="300" width="500" frameborder="0"></iframe><br><textarea name="recaptcha_challenge_field" rows="3"
cols="40"></textarea><input type="hidden" name="recaptcha_response_field" value="manual_challenge"></noscript>
<!-- <input type="hidden" id="captchaUrl" value="https://crm.ncmi.co/modules/Settings/Webforms/actions/CheckCaptcha.php"><input type="hidden" id="recaptcha_validation_value" >-->
<input type="hidden" name="recaptcha_response" id="recaptchaResponse"
value="03AGdBq24Xs5oB2CexUoqek-19In1ijVpxAKbzuuh5fraLkgFX5cvx16tqSM-0LoeN5fmkKm68pTJlaLQ7uIX6G4Sk6kAMV156JDuq30RlT3xDxoBUnKH6EKN6vP4OfUlGsfvaCZRZAGAen8H-Gn7ngqQ7sQR2sA3-vpgZry73WZ7RPMQIgbJJ0sHqBJ5_3iA9AaVYvkorp0-ix_tWYIYol4cBQbiza-rSusLCgoSFUxZES6G8iBrCoAPDfYTNqgFzFUzK0Lam8I7CBsuT8rJRDKdDGLd6qvj35wC8XN7MdDJtHKzbiVchVL8RNwV6awk8fHItC0A6g3nicHNI3plCJVouE4QMKlp01e83ygsrBf-c9D-3cHxl_JT5KTn3NpsnSe3RKJetXMbt8avNg1DMgnpASLUDEJEHRLZ8JEu-QfoLvdsntvtHRUmwqFEyZk2SKbf1ecMKIEeCkUZZUUeHO_-beRKDY8nOhw">
<input class="btn btn-default abex-input-1" type="submit" value="Send request">
<small>By submitting the form, you acknowledge that you have read and agreed to our Privacy Policy.</small>
</fieldset>
</form>
Text Content
Skip to content Linkedin Twitter Xing * * Cybersecurity for SAP© * * * Threat Detection * Real-Time Intrusion Detection * SIEM Integration for SAP * HyperLogging * Identity Protection * * Security & Compliance * Vulnerability Management * Interface Traffic Monitor * Data Loss Prevention * * Cyber Hygiene * Patch Management * Code Security * Code Vulnerability Analysis * * * * * * * * * * Blog1 * More... * * * Company * About us * Team * History * Partner * Become a partner * * News & Events * Press coverage * Events & Webinars * * Support * Online Support Portal * Request Assessment BE A HERO ADVANCED CYBERSECURITY FOR SAP© Features SECURITYBRIDGE PLATFORM One Platform to address all security needs of SAP customers. Threat Detection Vulnerability Management Code Analysis Patch Management Interface Traffic Monitor INCIDENT & RESPONSE GAIN VISIBILITY INTO SAP APPLICATION AND CUSTOM CODE RISKS AND VULNERABILITIES Start Free Trial CYBER SECURITY CUSTOMER SECURITY STORY Reinforcing the security of the global organization. LEARN MORE PRESS Resilience, security, and responsiveness are your core operational requirements. Our solutions help you to deliver your… DISCOVER OUR PRESS CENTRE “We were able to have access to actionable intelligence with zero effort allowing us to remediate 80% of our vulnerabilities with insight into the criticality of each one” CISO OF FORTUNE 500 PHARMACEUTICAL COMPANY WEBINAR HOW TO ACCELERATE SAP SECURITY? Join and listen to Sanofi’s SAP Security Leader speaking about their journey in securing a large SAP landscape. Register here SECURITYBRIDGE RECENT HIGHLIGHTS The Platform receives frequent updates of attack detection patterns, compliance rules, and security features. ONE SMALL STEP FOR MAN, ONE GIANT LEAP FOR SAP SECURITY Release highlights Version: 5.80 What Neil Armstrong once said when putting down his first foot on the moon is now true for SAP Security: One small step for man, one giant leap for SAP Security. With release 5.80 we published another major product release for our user community. REDUCE COMPLEXITY THE ENEMY OF SECURITY Release highlights Version: 5.78 On November 5th, 2020 a new release of SecurityBridge was made available for our subscribers. The release (version 5.78.3) contains major improvements. Some of the highlights contained in the release are described on this site. Customers can download the new release from our online support portal. THE FIRST AND ONLY INTEGRATED PLATFORM FOR SAP Release highlights Version: 4.75 On July 29th 2020 a new release of SecurityBridge was made available for our subscribers. The release (version 4.75) includes new features and enhancements to the current security controls. MINOR RELEASE, MAJOR STEP! Release highlights Version: 4.73 On 25th of May 2020, ABEX has published a new minor version of SecurityBridge for SAP. This post summarizes the highlights of the recent release. ONE-STOP SHOP PLATFORM FOR SAP SECURITY ABAP, HANA, JAVA – We cover it all INTERNAL & EXTERNAL THREATS PROTECT BUSINESS CRITICAL DATA More about the platform PATTERN DETECTION Detect critical actions within daily operations. ENDPOINT FORENSICS Empower your security team with the SecurityBridge comprehensive platform. IDENTITY PROTECTION Detect, Inform and React to Identity Theft. CENTRAL CONTROL Take advantage of centralized administration regardless of your SAP landscape size. MOBILE SECURITY Fiori Apps available for mobile devices. DETECT ANOMALIES As they occur, from millions of actions in SAP©. YOUR TIME IS TOO VALUABLE to manually sift through 25 different security and audit relevant log sources. Previous Next Let us know how we can help you ... By submitting the form, you acknowledge that you have read and agreed to our Privacy Policy. SEE SECURITYBRIDGE IN ACTION. PRODUCT * Threat Detection for SAP© * Vulnerability Management for SAP© * SIEM Integration for SAP© * Request a Demo FEATURES * ABAP™ Code Vulnerability * Data Loss Prevention for SAP© * Central Alarm Center for SAP© * Protection for SAP Identities COMPANY * About * News & Press Releases * Support * Security Advisories CONTACT US * +49 (841) 93914840 * Contact Us FOLLOW US Linkedin Twitter Xing Youtube © All rights reserved SecurityBridge.com // NCMI GmbH 2020 Legal Disclosure This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT Privacy & Cookies Policy Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Non-necessary Non-necessary Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website. SAVE & ACCEPT