{"id":7274,"date":"2017-12-11T13:27:08","date_gmt":"2017-12-11T19:27:08","guid":{"rendered":"https:\/\/test.clariantcreative.com\/bowbridge\/?page_id=7274"},"modified":"2018-03-12T15:39:31","modified_gmt":"2018-03-12T20:39:31","slug":"for-it-teams","status":"publish","type":"page","link":"https:\/\/www.bowbridge.net\/en\/for-it-teams\/","title":{"rendered":"Helping You Protect Your Network"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1515197493979{margin-top: 50px !important;margin-bottom: 50px !important;}&#8221;][vc_column]\n<h4 class=\"qodef-custom-font-holder\" style=\"font-weight: 300;text-align: center\" >\n\tCyberattackers don\u2019t rest, and neither do you. You\u2019re always watching for new threats and making sure your network is protected. But are SAP\u2019s vulnerabilities inviting a cybersecurity breach?<\/h4>[\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1512597439327{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;]<div class=\"qodef-elements-holder qodef-responsive-mode-768 qodef-elements-items-float\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-left\" >\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-154047\" >\r\n\t\t\t\t\t\t<style type=\"text\/css\" data-type=\"qodef-elements-custom-padding\">\r\n\t\t\t\t\t\t\t\t@media only screen and (min-width: 1280px) and (max-width: 1600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-154047 {\r\n\t\t\t\t\t\tpadding:  !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 1024px) and (max-width: 1280px) {\r\n\t\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-154047 {\r\n\t\t\t\t\t\t\tpadding: 15px 0px  !important;\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 768px) and (max-width: 1024px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-154047 {\r\n\t\t\t\t\t\tpadding: 15px 0px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 600px) and (max-width: 768px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-154047 {\r\n\t\t\t\t\t\tpadding: 15px 0px  !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 480px) and (max-width: 600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-154047 {\r\n\t\t\t\t\t\tpadding: 15px 0px  !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (max-width: 480px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-154047 {\r\n\t\t\t\t\t\tpadding: 15px 0px  !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t<\/style>\r\n\t\t\t\t\t\t[vc_single_image image=&#8221;7507&#8243; img_size=&#8221;full&#8221;]\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/3&#8243;]<div class=\"qodef-elements-holder qodef-responsive-mode-768\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-middle qodef-horizontal-alignment-center qodef-fade-in-down\" >\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-501508\" >\r\n\t\t\t\t\t\t<style type=\"text\/css\" data-type=\"qodef-elements-custom-padding\">\r\n\t\t\t\t\t\t\t\t@media only screen and (min-width: 1280px) and (max-width: 1600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-501508 {\r\n\t\t\t\t\t\tpadding:  !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 1024px) and (max-width: 1280px) {\r\n\t\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-501508 {\r\n\t\t\t\t\t\t\tpadding:  !important;\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 768px) and (max-width: 1024px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-501508 {\r\n\t\t\t\t\t\tpadding:  !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 600px) and (max-width: 768px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-501508 {\r\n\t\t\t\t\t\tpadding: 20px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 480px) and (max-width: 600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-501508 {\r\n\t\t\t\t\t\tpadding: 20px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (max-width: 480px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-501508 {\r\n\t\t\t\t\t\tpadding: 20px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t<\/style>\r\n\t\t\t\t\t\t\n<h5 class=\"qodef-custom-font-holder\" style=\"font-weight: 100;text-align: left\" >\n\tAs an IT leader in your organization, you stand on guard. <\/h5>[vc_empty_space height=&#8221;25px&#8221;]\n<h5 class=\"qodef-custom-font-holder\" style=\"font-weight: 100;text-align: left\" >\n\tYour role is to manage the invisible line of defense: assessing IT infrastructure, identifying vulnerabilities, managing incidents, developing information security policies, and monitoring compliance. Your work is the immune system in your company\u2019s body \u2014 undetectable and often taken for granted, until it\u2019s tested by a cyberattack. And yet, you also need solutions that won\u2019t slow users down. <\/h5>[vc_empty_space height=&#8221;25px&#8221;]\n<h5 class=\"qodef-custom-font-holder\" style=\"font-weight: 100;text-align: left\" >\n\tAt the end of a good day at work? You\u2019ve kept the network safe, users happy, and the company protected, and you have lead your team in managing and monitoring every aspect of your company\u2019s cybersecurity. <\/h5>[vc_empty_space height=&#8221;25px&#8221;]\n<h5 class=\"qodef-custom-font-holder\" style=\"font-weight: 400;text-align: left\" >\n\tBut chances are, you haven\u2019t addressed the cybersecurity vulnerabilities in SAP. <\/h5>[vc_empty_space height=&#8221;50px&#8221;]\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1512530390408{padding-top: 25px !important;padding-bottom: 25px !important;background-color: #f4f4f4 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_id=&#8221;Team-Page&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;50px&#8221;]\n<h2 class=\"qodef-custom-font-holder\" style=\"font-weight: 300;text-align: left;color: #006eaa\" >\n\tIs Your SAP System Secure?<\/h2>[vc_column_text]Cyberattackers are relentless, and increasingly, they\u2019re targeting SAP systems. Because SAP\u2019s structure is so unique, it\u2019s impossible to secure with traditional anti-malware programs. Cyberattackers know this, and they use this vulnerability to slip malware into applications like CRM, E-Recruiting, FIORI, and any other internet-enabled application.<\/p>\n<p>The results can be devastating.<\/p>\n<p>Unaddressed SAP vulnerabilities can be a major vector for XSS attacks, SQL injections, directory traversals, and other malware threats. These attacks can result in data loss, system sabotage, loss of reputation, and compliance and liability issues. In fact, the average ERP cybersecurity breach causes $5 million USD in damages.[\/vc_column_text][vc_empty_space height=&#8221;25px&#8221;]<div class=\"qodef-iwt clearfix qodef-iwt-icon-left qodef-iwt-icon-medium\">\n    <div class=\"qodef-iwt-icon-holder\">\n                    \n    <span class=\"qodef-icon-shortcode normal\" style=\"margin: 0px 10px 0px 0px;width: 40px;height: 40px;line-height: 40px\" data-hover-color=\"#ffffff\" data-color=\"#fc280a\">\n        \n        <i class=\"qodef-icon-font-awesome fa fa-exclamation-triangle qodef-icon-element\" style=\"color: #fc280a;font-size:35px\" ><\/i>\n            <\/span>\n\n            <\/div>\n    <div class=\"qodef-iwt-content-holder\" >\n                    <div class=\"qodef-iwt-title-holder\">\n                <h6 style=\"color: #fc280a\">Cyberattacks on SAP can inflict massive amounts of damage. The firm USIS was infiltrated, and extremely sensitive government personnel information was stolen. They lost a $2 billion contract as a result, leading to their bankruptcy.<\/h6>\n            <\/div>\n                <div class=\"qodef-iwt-text-holder\">\n            <p ><\/p>\n\n                    <\/div>\n    <\/div>\n<\/div>[vc_column_text]<\/p>\n<p><strong>Not on your watch. And not on ours.<\/strong>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1512594954316{padding-top: 50px !important;padding-right: 25px !important;padding-bottom: 50px !important;padding-left: 25px !important;}&#8221;]<div class=\"qodef-pie-chart-holder\">\r\n\t<div class=\"qodef-percentage\" data-size=\"150\" data-percent=\"60\" data-bar-color=\"#fc280a\" data-bar-inactive-color=\"#ffffff\">\r\n\t\t\t\t\t<span class=\"qodef-to-counter\">\r\n\t\t\t\t60\t\t\t<\/span>\r\n\t\t\t<\/div>\r\n\t<div class=\"qodef-pie-chart-text\" style=\"margin-top: 25px\">\r\n\t\t\t\t\t<h5 class=\"qodef-pie-title\">\r\n\t\t\t\t\t\t\t<\/h5>\r\n\t\t\t\t<p><\/p>\r\n\t<\/div>\r\n<\/div>[vc_single_image image=&#8221;7281&#8243; img_size=&#8221;200&#215;153&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1513021721595{padding-top: 20px !important;padding-right: 0px !important;padding-bottom: 20px !important;padding-left: 0px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1519785394618{border-left-width: 3px !important;padding-right: 20px !important;padding-left: 20px !important;border-left-color: #fc280a !important;border-left-style: solid !important;}&#8221;]<em>In our testing of 120 random SAP implementations, 60% of the systems allowed uploading of blocked file types simply by changing the file extension.<\/em>[\/vc_column_text][vc_empty_space height=&#8221;25px&#8221;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1515170259220{padding-top: 50px !important;padding-bottom: 50px !important;background-image: url(https:\/\/www2.bowbridge.net\/wp-content\/uploads\/2018\/01\/SAP-security-bg.jpg?id=7513) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_id=&#8221;SAP-security-bg&#8221;][vc_column][vc_empty_space]\n<h2 class=\"qodef-custom-font-holder\" style=\"font-weight: 300;text-align: center;color: #ffffff\" >\n\tSecurity + Functionality = Success<\/h2>[vc_column_text]<\/p>\n<p class=\"whiteText\">Keeping your network safe from cyberthreats and security breaches? That\u2019s your top priority.<\/p>\n<p class=\"whiteText\">Giving you a solution to close the cybersecurity gaps in SAP, that\u2019s easy to implement, fully supported, and ensures a seamless user experience? That\u2019s our top priority.<\/p>\n<p class=\"whiteText\">Imagine a cybersecurity solution that is certified for the latest SAP NW-VSI 2.0 and used by <a class=\"whiteText\" href=\"http:\/\/www2.bowbridge.net\/customers\/\">leading corporations<\/a> worldwide. Now, picture a solution that requires no coding changes to SAP applications and offers in-memory integrated virus scanning engines by McAfee and SOPHOS. And finally, imagine monitoring that works seamlessly with the SAP Computing Center Management System and industry-standard Security Monitoring Solutions like McAfee e-Policy Orchestrator, providing automatic logging of security events, quarantine functionality, and meaningful data for forensic analysis.<\/p>\n<p class=\"whiteText\"><strong>For that, you need bowbridge.<\/strong><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1512595592976{margin-top: 0px !important;margin-bottom: 0px !important;background-color: #ffffff !important;}&#8221; el_id=&#8221;solutions-boxes&#8221;][vc_column css=&#8221;.vc_custom_1510506394040{margin-bottom: 0px !important;}&#8221;]<div class=\"qodef-elements-holder qodef-two-columns qodef-responsive-mode-1024\" ><div class=\"qodef-elements-holder-item qodef-vertical-alignment-top qodef-horizontal-alignment-left qodef-zoom-image\" style=\"background-color: #006eaa;background-image: url(https:\/\/www.bowbridge.net\/wp-content\/uploads\/2017\/11\/box-image-bows-circle-apps-01.png)\">\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-146303\" style=\"padding: 90px 130px 90px 130px\">\r\n\t\t\t\t\t\t<style type=\"text\/css\" data-type=\"qodef-elements-custom-padding\">\r\n\t\t\t\t\t\t\t\t@media only screen and (min-width: 1280px) and (max-width: 1600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-146303 {\r\n\t\t\t\t\t\tpadding: 80px 90px 80px 90px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 1024px) and (max-width: 1280px) {\r\n\t\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-146303 {\r\n\t\t\t\t\t\t\tpadding: 70px !important;\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 768px) and (max-width: 1024px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-146303 {\r\n\t\t\t\t\t\tpadding: 50px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 600px) and (max-width: 768px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-146303 {\r\n\t\t\t\t\t\tpadding: 20px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 480px) and (max-width: 600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-146303 {\r\n\t\t\t\t\t\tpadding: 15px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (max-width: 480px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-146303 {\r\n\t\t\t\t\t\tpadding: 15px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t<\/style>\r\n\t\t\t\t\t\t[vc_column_text css=&#8221;.vc_custom_1510506837620{padding-top: 25px !important;padding-bottom: 25px !important;}&#8221;]<\/p>\n<h3>bowbridge Anti-Virus for SAP Solutions<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1512573922550{padding-bottom: 50px !important;}&#8221;]Get the leading SAP-certified product to protect your SAP software against viruses, malware, active content, and other cyber threats. Our SAP cybersecurity solutions are designed specifically for the SAP NetWeaver Virus Scan Interface (NW-VSI) in every SAP application server. With full-spectrum security, integration with security monitoring, and leading-edge features, you can stop threats that typically slip past operating system anti-virus programs.[\/vc_column_text]<a href=\"\/en\/anti-virus-for-sap-solutions\/\" target=\"_self\" style=\"color: #ffffff;background-color: #006eaa;border-color: #ffffff;font-size: 14px;margin: 0px 0px 50px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-outline qodef-btn-custom-hover-bg qodef-btn-custom-hover-color\" data-hover-bg-color=\"#ffffff\" data-hover-color=\"#006eaa\" >\n        <span class=\"qodef-btn-text\">Explore Anti-Virus for SAP Solutions<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><div class=\"qodef-elements-holder-item qodef-vertical-alignment-top qodef-horizontal-alignment-left qodef-zoom-image\" style=\"background-color: #797979;background-image: url(https:\/\/www.bowbridge.net\/wp-content\/uploads\/2017\/11\/box-image-bows-circle-apps-01.png)\">\r\n\t<div class=\"qodef-elements-holder-item-inner\">\r\n\t\t<div class=\"qodef-elements-holder-item-content qodef-elements-holder-custom-568436\" style=\"padding: 90px 130px 90px 130px\">\r\n\t\t\t\t\t\t<style type=\"text\/css\" data-type=\"qodef-elements-custom-padding\">\r\n\t\t\t\t\t\t\t\t@media only screen and (min-width: 1280px) and (max-width: 1600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-568436 {\r\n\t\t\t\t\t\tpadding: 80px 90px 80px 90px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 1024px) and (max-width: 1280px) {\r\n\t\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-568436 {\r\n\t\t\t\t\t\t\tpadding: 70px !important;\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 768px) and (max-width: 1024px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-568436 {\r\n\t\t\t\t\t\tpadding: 50px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 600px) and (max-width: 768px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-568436 {\r\n\t\t\t\t\t\tpadding: 20px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (min-width: 480px) and (max-width: 600px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-568436 {\r\n\t\t\t\t\t\tpadding: 15px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t\t\t\t\t@media only screen and (max-width: 480px) {\r\n\t\t\t\t\t.qodef-elements-holder .qodef-elements-holder-item-content.qodef-elements-holder-custom-568436 {\r\n\t\t\t\t\t\tpadding: 15px !important;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\t\t\t\t\t<\/style>\r\n\t\t\t\t\t\t[vc_column_text css=&#8221;.vc_custom_1512760335210{padding-top: 25px !important;padding-bottom: 25px !important;}&#8221;]<\/p>\n<h3>bowbridge Application Security for SAP Solutions<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1510506092632{padding-bottom: 50px !important;}&#8221;]Discover the only product designed to protect SAP applications from content-based threats. Your business-critical data and SAP infrastructure are monitored and secured in real-time against cross-site scripting, SQL-injections, directory traversals and more. And with the entire scanning process taking place in memory, performance and functionality are always optimized, while still maintaining end-to-end encryption.[\/vc_column_text]<a href=\"\/en\/application-security-for-sap-solutions\/\" target=\"_self\" style=\"color: #ffffff;background-color: #797979;border-color: #ffffff;font-size: 14px;margin: 0px 0px 50px 0px\" class=\"qodef-btn qodef-btn-small qodef-btn-outline qodef-btn-custom-hover-bg qodef-btn-custom-border-hover qodef-btn-custom-hover-color\" data-hover-bg-color=\"#ffffff\" data-hover-color=\"#797979\" data-hover-border-color=\"#ffffff\" >\n        <span class=\"qodef-btn-text\">Explore Application Security for SAP Solutions<\/span>\n    <span class=\"qodef-btn-text-icon\"><\/span>\n<\/a>\t\t<\/div>\r\n\t<\/div>\r\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221;][vc_column][vc_empty_space height=&#8221;70px&#8221;]\n<h4 class=\"qodef-custom-font-holder\" style=\"font-weight: 100;text-align: center\" >\n\tOur reliable cybersecurity solutions seamlessly protect your SAP system from threats. <\/h4>[vc_empty_space height=&#8221;25px&#8221;]\n<h4 class=\"qodef-custom-font-holder\" style=\"font-weight: 100;text-align: center\" >\n\tYou\u2019re on guard. And with bowbridge on your side, your armor just became much stronger. <\/h4>[vc_empty_space height=&#8221;70px&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1513886934464{background-color: #fc280a !important;}&#8221; el_id=&#8221;CTA-section&#8221;][vc_column]\r\n\r\n\t<div class=\"qodef-call-to-action normal\">\r\n\r\n\t\t\t\t<div class=\"qodef-container-inner\">\r\n\t\t\t\t\t<div class=\"qodef-call-to-action-row-50-50 clearfix\" style=\"padding: 50px 0px;\">\r\n\t\t\r\n\t\t\t\t<div class=\"qodef-text-wrapper qodef-call-to-action-column1 qodef-call-to-action-cell\">\r\n\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"qodef-call-to-action-text\" style=\"font-size: 20px\">\r\n\t\t\t\t\t\t\n<h5 class=\"whiteText\">Learn why traditional OS anti-virus systems fall short when it comes to protecting SAP.<\/h5>\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\t<div class=\"qodef-button-wrapper qodef-call-to-action-column2 qodef-call-to-action-cell\" style =\"text-align: right ;\">\r\n\r\n\t\t\t\t\t\t<a href=\"https:\/\/cdn2.hubspot.net\/hubfs\/2773339\/downloads\/Sales-Does-Anti-Virus-Cover-SAP-FINAL.pdf\" target=\"_blank\" style=\"color: #ffffff\" class=\"qodef-btn qodef-btn-medium qodef-btn-outline qodef-btn-custom-hover-bg qodef-btn-custom-hover-color qodef-btn-icon\" data-hover-bg-color=\"#ffffff\" data-hover-color=\"#fc280a\" >        <span class=\"qodef-btn-text\">Download Our Data Sheet<\/span>    <span class=\"qodef-btn-text-icon\"><i class=\"qodef-icon-font-awesome fa fa-download \" ><\/i><\/span><\/a>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t<\/div>\r\n\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t<\/div>\r\n\r\n[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row content_width=&#8221;grid&#8221; content_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1515197493979{margin-top: 50px !important;margin-bottom: 50px !important;}&#8221;][vc_column][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1512597439327{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][\/vc_column][\/vc_row][vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1512530390408{padding-top: 25px&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"content-type":"","footnotes":""},"class_list":["post-7274","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/7274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/comments?post=7274"}],"version-history":[{"count":18,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/7274\/revisions"}],"predecessor-version":[{"id":8083,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/7274\/revisions\/8083"}],"wp:attachment":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/media?parent=7274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}