{"id":6088,"date":"2017-11-08T16:36:03","date_gmt":"2017-11-08T22:36:03","guid":{"rendered":"https:\/\/test.clariantcreative.com\/bowbridge\/?page_id=6088"},"modified":"2025-02-24T16:45:20","modified_gmt":"2025-02-24T15:45:20","slug":"sap-cybersecurity-resources","status":"publish","type":"page","link":"https:\/\/www.bowbridge.net\/en\/sap-cybersecurity-resources\/","title":{"rendered":"Boost Your SAP Cybersecurity Expertise"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css_animation=&#8221;qodef-element-from-fade&#8221; css=&#8221;.vc_custom_1512405703071{background-color: #ffffff !important;}&#8221; el_id=&#8221;resources-feature-box&#8221;][vc_column]\n<h2 class=\"qodef-custom-font-holder\" style=\"font-weight: 300;text-align: center\" >\n\tFeatured Content<\/h2>[vc_row_inner content_aligment=&#8221;center&#8221; css_animation=&#8221;qodef-element-from-fade&#8221; el_id=&#8221;featured-resources&#8221;][vc_column_inner width=&#8221;1\/2&#8243; el_id=&#8221;resource-blog-posts&#8221; css=&#8221;.vc_custom_1539803176450{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-right: 15px !important;padding-bottom: 0px !important;padding-left: 15px !important;}&#8221;]<div class=\"qodef-elements-holder qodef-responsive-mode-768\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-center\" >\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-684683\" style=\"padding: 15px 18px 15px 18px\">\r\n\t\t\t\t\t\t<style type=\"text\/css\" data-type=\"qodef-elements-custom-padding\">\r\n\t\t\t\t\t\t\t\t@media only screen and (min-width: 1280px) and (max-width: 1600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-684683 {\r\n\t\t\t\t\t\tpadding: 0% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 1024px) and (max-width: 1280px) {\r\n\t\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-684683 {\r\n\t\t\t\t\t\t\tpadding: 0% 0% 0% 0% !important;\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 768px) and (max-width: 1024px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-684683 {\r\n\t\t\t\t\t\tpadding: 0% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 600px) and (max-width: 768px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-684683 {\r\n\t\t\t\t\t\tpadding: 21% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 480px) and (max-width: 600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-684683 {\r\n\t\t\t\t\t\tpadding: 21% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (max-width: 480px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-684683 {\r\n\t\t\t\t\t\tpadding: 21% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t<\/style>\r\n\t\t\t\t\t\t<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a;border-style: solid;border-width: 1px;border-color: #fc280a\" data-hover-border-color=\"#fc280a\" data-hover-background-color=\"#fc280a\" data-hover-color=\"#ffffff\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-rss qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                <div class=\"qodef-iwt-text-holder\">\n            <p ><\/p>\n\n                    <\/div>\n    <\/div>\n<\/div>\n<h3 class=\"qodef-custom-font-holder\" style=\"font-weight: 400;color: #006eaa\" >\n\t<\/h3>[vc_column_text][\/vc_column_text]<a href=\"https:\/\/explore.bowbridge.net\/blog\" target=\"_self\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 25px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">See More Blog Posts<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1539803186001{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-right: 15px !important;padding-bottom: 0px !important;padding-left: 15px !important;}&#8221;]<div class=\"qodef-elements-holder qodef-responsive-mode-768\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-center\" >\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-399777\" style=\"padding: 20px 25px 20px 25px\">\r\n\t\t\t\t\t\t<style type=\"text\/css\" data-type=\"qodef-elements-custom-padding\">\r\n\t\t\t\t\t\t\t\t@media only screen and (min-width: 1280px) and (max-width: 1600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-399777 {\r\n\t\t\t\t\t\tpadding: 0% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 1024px) and (max-width: 1280px) {\r\n\t\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-399777 {\r\n\t\t\t\t\t\t\tpadding: 0% 0% 0% 0% !important;\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 768px) and (max-width: 1024px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-399777 {\r\n\t\t\t\t\t\tpadding: 0% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 600px) and (max-width: 768px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-399777 {\r\n\t\t\t\t\t\tpadding: 21% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 480px) and (max-width: 600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-399777 {\r\n\t\t\t\t\t\tpadding: 21% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (max-width: 480px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-399777 {\r\n\t\t\t\t\t\tpadding: 21% 0% 0% 0% !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t<\/style>\r\n\t\t\t\t\t\t<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a;border-style: solid;border-width: 1px;border-color: #fc280a\" data-hover-border-color=\"#fc280a\" data-hover-background-color=\"#fc280a\" data-hover-color=\"#ffffff\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-file-text-o qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                <div class=\"qodef-iwt-text-holder\">\n            <p ><\/p>\n\n                    <\/div>\n    <\/div>\n<\/div>\n<h3 class=\"qodef-custom-font-holder\" style=\"font-weight: 400;color: #006eaa\" >\n\tProtecting SAP Applications from Content-Based Attacks<\/h3>[vc_single_image image=&#8221;9510&#8243; img_size=&#8221;474&#215;140&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1592320788513{margin-top: 10px !important;margin-right: 0px !important;margin-bottom: 22px !important;margin-left: 0px !important;}&#8221;][vc_column_text]<\/p>\n<h5>Are you doing enough to prevent cyberattacks on your networks? We\u2019ve created this guide to help protect your mission-critical SAP applications from cyberattacks.<\/h5>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.bowbridge.net\/en\/guide-to-content-based-attacks-sap-applications\/\" target=\"_self\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 22px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">View Guide<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_raw_html]JTNDYSUyMG5hbWUlM0QlMjJjYXNlc3R1ZGllcyUyMiUzRSUzQyUyRmElM0U=[\/vc_raw_html][vc_empty_space height=&#8221;50px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1510618427990{padding-top: 50px !important;background-color: #e8f7ff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_empty_space height=&#8221;25px&#8221;]\n<h2 class=\"qodef-custom-font-holder\" style=\"font-weight: 300;text-align: center;color: #006eaa\" >\n\tCustomer Stories<\/h2>\n<h4 class=\"qodef-custom-font-holder\" style=\"font-weight: 300;text-align: center\" >\n\tEvery day, we help the world\u2019s leading companies protect their systems from cyberthreat. Read our customer stories to learn how.<\/h4>[\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1520944985714{padding-top: 50px !important;padding-bottom: 0px !important;background-color: #e8f7ff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1512155300735{padding-right: 15px !important;padding-left: 15px !important;}&#8221;]<div class=\"qodef-elements-holder qodef-responsive-mode-768\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-center\" style=\"background-image: url(https:\/\/www.bowbridge.net\/wp-content\/uploads\/2024\/09\/SAP-security-CS-thumb.jpg)\">\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-404942\" >\r\n\t\t\t\t\t\t[vc_column_text css=&#8221;.vc_custom_1725562041550{padding-top: 20px !important;padding-right: 0px !important;padding-bottom: 20px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;whiteText&#8221;]<\/p>\n<div class=\"trans-text-box\">\n<h5>School district uses bowbridge to stop SAP threats before they happen.<\/h5>\n<\/div>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.bowbridge.net\/en\/case-study-duvall-schools\/\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 0px 0px 20px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Read the Case Study<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1520942806138{padding-right: 15px !important;padding-left: 15px !important;}&#8221;]<div class=\"qodef-elements-holder qodef-responsive-mode-768\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-center\" style=\"background-image: url(https:\/\/www.bowbridge.net\/wp-content\/uploads\/2018\/11\/USDA-CS-480.jpg)\">\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-794382\" >\r\n\t\t\t\t\t\t[vc_column_text css=&#8221;.vc_custom_1519304375900{padding-top: 20px !important;padding-right: 0px !important;padding-bottom: 20px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;whiteText&#8221;]<\/p>\n<div class=\"trans-text-box\">\n<h5>Major U.S. federal agency uses bowbridge to secure supply chain transactions.<\/h5>\n<\/div>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.bowbridge.net\/en\/case-study-federal-agency\/\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 0px 0px 20px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Read the Case Study<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1539801480028{padding-top: 0px !important;padding-bottom: 0px !important;background-color: #e8f7ff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1512155300735{padding-right: 15px !important;padding-left: 15px !important;}&#8221;]<div class=\"qodef-elements-holder qodef-responsive-mode-768\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-center\" style=\"background-image: url(https:\/\/www.bowbridge.net\/wp-content\/uploads\/2018\/02\/Phoenix-CS-480.jpg)\">\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-588788\" >\r\n\t\t\t\t\t\t[vc_column_text css=&#8221;.vc_custom_1519304388389{padding-top: 20px !important;padding-right: 0px !important;padding-bottom: 20px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;whiteText&#8221;]<\/p>\n<div class=\"trans-text-box\">\n<h5>Electrical connection technology manufacturer relies on bowbridge for virus-free document exchange.<\/h5>\n<\/div>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.bowbridge.net\/en\/case-study-phoenix-contact\/\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 0px 0px 20px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Read the Case Study<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"qodef-elements-holder qodef-responsive-mode-768\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-center\" style=\"background-image: url(https:\/\/www.bowbridge.net\/wp-content\/uploads\/2018\/02\/Essen-CS-480.jpg)\">\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-350611\" >\r\n\t\t\t\t\t\t[vc_column_text css=&#8221;.vc_custom_1519304401373{padding-top: 20px !important;padding-right: 0px !important;padding-bottom: 20px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;whiteText&#8221;]<\/p>\n<div class=\"trans-text-box\">\n<h5>bowbridge helps secure the City of Essen&#8217;s data and systems from cyberattacks.<\/h5>\n<\/div>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.bowbridge.net\/en\/case-study-essen\/\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 0px 0px 20px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Read the Case Study<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1539801480028{padding-top: 0px !important;padding-bottom: 0px !important;background-color: #e8f7ff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1512155300735{padding-right: 15px !important;padding-left: 15px !important;}&#8221;]<div class=\"qodef-elements-holder qodef-responsive-mode-768\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-center\" style=\"background-image: url(https:\/\/www.bowbridge.net\/wp-content\/uploads\/2017\/11\/IVR-case-study-480.jpg)\">\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-279143\" >\r\n\t\t\t\t\t\t[vc_column_text css=&#8221;.vc_custom_1519304365268{padding-top: 20px !important;padding-right: 0px !important;padding-bottom: 20px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;whiteText&#8221;]<\/p>\n<div class=\"trans-text-box\">\n<h5>Internationally leading flooring manufacturer secures CRM mobile with bowbridge.<\/h5>\n<\/div>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.bowbridge.net\/en\/case-study-ivc-group\/\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 0px 0px 20px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Read the Case Study<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1520942806138{padding-right: 15px !important;padding-left: 15px !important;}&#8221;]<div class=\"qodef-elements-holder qodef-responsive-mode-768\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-center\" style=\"background-image: url(https:\/\/www.bowbridge.net\/wp-content\/uploads\/2019\/08\/Fujitsu-Partner-CS2-01.jpg)\">\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-323422\" >\r\n\t\t\t\t\t\t[vc_column_text css=&#8221;.vc_custom_1565017585264{padding-top: 20px !important;padding-right: 0px !important;padding-bottom: 20px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;whiteText&#8221;]<\/p>\n<div class=\"trans-text-box\">\n<h5>Fujitsu partners with bowbridge to protect its customers&#8217; SAP systems from cyberattack.<\/h5>\n<\/div>\n<p>[\/vc_column_text]<a href=\"https:\/\/www.bowbridge.net\/en\/case-study-fujitsu\/\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 0px 0px 20px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Read the Case Study<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1539805196449{padding-top: 0px !important;padding-bottom: 0px !important;background-color: #e8f7ff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1512155300735{padding-right: 15px !important;padding-left: 15px !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1520942825543{padding-right: 15px !important;padding-left: 15px !important;}&#8221;][vc_empty_space height=&#8221;70px&#8221;][vc_raw_html]JTNDYSUyMG5hbWUlM0QlMjJ3cCUyMiUzRSUzQyUyRmElM0U=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1510624389027{padding-top: 50px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_empty_space height=&#8221;25px&#8221;]\n<h2 class=\"qodef-custom-font-holder\" style=\"font-weight: 300;text-align: center\" >\n\tIn-Depth Resources<\/h2>\n<h4 class=\"qodef-custom-font-holder\" style=\"font-weight: 300;text-align: center\" >\n\tWhen it comes to SAP cybersecurity, knowledge is your best weapon. These intensive resources explore detailed research and the latest developments, so you can stay informed and aware.<\/h4>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1510672402462{padding-bottom: 50px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_id=&#8221;resource-list&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-file-text-o qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Guide: Protecting SAP Applications from Content-Based Attacks<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Are you doing enough to prevent cyberattacks on your networks? We\u2019ve created this guide to help protect your mission-critical SAP applications from cyberattacks.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/www.bowbridge.net\/en\/guide-to-content-based-attacks-sap-applications\/\" target=\"_self\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">View Guide<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-check-square qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">SAP Cybersecurity Self-Assessment<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >How prepared is your organization to withstand cyberattacks? Our helpful self-assessment will help you determine whether your SAP system is well-secured, or low-hanging fruit for attackers.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/www.bowbridge.net\/en\/sap-cybersecurity-self-assessment-tool-level-1\/\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Take the Assessment<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-list-ul qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">SAP Cybersecurity Checklist<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Download our helpful SAP cybersecurity checklist, which will help you clearly assess your SAP system and your cybersecurity processes, putting you on the road to stronger SAP cybersecurity.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/download-the-sap-cybersecurity-checklist-bowbridge\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Download<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-file-text-o qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Guide: CISO Quick Guide to SAP FIORI Cybersecurity<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Discover the unique vulnerabilities that SAP FIORI can face and the steps you can take to keep your SAP FIORI system secure.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/ciso-quick-guide-to-sap-fiori-cybersecurity\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Download<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-file-text-o qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Guide: Introduction to SAP FIORI Cybersecurity<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Keep cyberattackers from using FIORI&#039;s vulnerabilities to penetrate your system with our introduction to SAP FIORI cybersecurity.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/www.bowbridge.net\/en\/guide-to-sap-fiori-cybersecurity\/\" target=\"_self\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">View Guide<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-list-alt qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Fact Sheet: Does Anti-Virus Protect SAP Systems?<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Many companies rely on their OS-level anti-virus to protect their SAP system. Learn why protecting SAP isn&#039;t that straightforward.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/hubfs\/downloads\/Sales-Does-Anti-Virus-Cover-SAP-FINAL.pdf\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">View Fact Sheet<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-file-text qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">White Paper: Can SAP E-Recruiting Expose Your Company to Risk?<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Explore our in-depth research on the startling vulnerabilities we found in most companies\u2019 E-Recruiting applications, and learn whether your system is vulnerable.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/sap-e-recruiting-is-your-recruitment-application-secure\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Download<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-briefcase qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Solution Brief: Virus Protection for SAP E-Recruiting<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Discover how bowbridge\u2019s Anti-Virus for SAP Solutions protects your E-Recruiting application from hidden malware and viruses.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/white-paper-sap-e-recruiting-virus-protection\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10p 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Download<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-file-text-o qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Article: (CIO Review) 20 Most Promising SAP Solution Providers 2016<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Read the CIO Review profile of bowbridge&#039;s comprehensive content security solution.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/cdn2.hubspot.net\/hubfs\/2773339\/articles\/CIO-Review-20-Most-Promising-SAP-Providers-2016.pdf\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10p 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Download<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-file-text-o qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Article: (SAP Insider) Ensure the Security Of Documents Before They Enter Your SAP Systems<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Learn how to incorporate third-party virus scanning into custom-developed applications that integrate with SAP NW-VSI.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/cdn2.hubspot.net\/hubfs\/2773339\/articles\/CIO-Review-20-Most-Promising-SAP-Providers-2016.pdf\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10p 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Download<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_raw_html]JTNDYSUyMG5hbWUlM0QlMjJ3ZWJpbmFycyUyMiUzRSUzQyUyRmElM0U=[\/vc_raw_html][vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-desktop qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Webinar: File-Based Threats to SAP FIORI Applications<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Discover the current threats to SAP FIORI cybersecurity and learn how to keep file uploads from threatening FIORI applications.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/webinar-file-based-threats-to-sap-fiori-applications\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10p 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">View Webinar<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-desktop qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Webinar: How to Implement Virus Scanning and Content Security on SAP Application Server ABAP and NetWeaver Gateway<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Learn how to implement, configure, and review your virus scanning and content security solutions for maximum protection.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/webinar-virus-scanning-and-content-security-for-sap-bowbridge\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10p 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">View Webinar<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-desktop qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Webinar: The Threat of Cross-Site Scripting (XSS) Attacks and How to Protect Your SAP System<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Explore how XSS attacks work and how you can protect against them. Includes a technical demonstration.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/webinar-cross-site-scripting-and-sap\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10p 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">View Webinar<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-desktop qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Webinar: Protecting Your SAP Applications From Content-Based Cyberthreats<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Learn how cyberattackers use malicious inputs and attachments to compromise SAP applications and users.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/webinar-protecting-your-sap-applications-from-content-based-cyberthreats\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10p 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">View Webinar<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-top qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode circle qodef-icon-medium\" style=\"background-color: #fc280a\" data-color=\"#ffffff\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-desktop qodef-icon-element\" style=\"color: #ffffff\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h4 style=\"color: #006eaa\">Webinar: The Enemy Within: SAP Security Threats Hidden in PDF Uploads<\/h4>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p >Understand and mitigate the risks of allowing PDF uploads into your SAP system.<\/p>\n\n                    <\/div>\n    <\/div>\n<\/div><a href=\"https:\/\/explore.bowbridge.net\/sap-security-threats-hidden-in-pdf-uploads\" target=\"_blank\" style=\"color: #006eaa;background-color: #ffffff;border-color: #006eaa;font-size: 14px;margin: 10p 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-default qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#006eaa\" data-hover-color=\"#ffffff\" data-hover-border-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">View Webinar<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>[vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css_animation=&#8221;qodef-element-from-fade&#8221; css=&#8221;.vc_custom_1512405703071{background-color: #ffffff !important;}&#8221; el_id=&#8221;resources-feature-box&#8221;][vc_column][vc_row_inner content_aligment=&#8221;center&#8221; css_animation=&#8221;qodef-element-from-fade&#8221; el_id=&#8221;featured-resources&#8221;][vc_column_inner width=&#8221;1\/2&#8243; el_id=&#8221;resource-blog-posts&#8221; css=&#8221;.vc_custom_1539803176450{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-right: 15px&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"content-type":"","footnotes":""},"class_list":["post-6088","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/6088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/comments?post=6088"}],"version-history":[{"count":128,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/6088\/revisions"}],"predecessor-version":[{"id":11005,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/6088\/revisions\/11005"}],"wp:attachment":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/media?parent=6088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}