• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
SAP Security Software

SAP Security Software Reviews and Ratings

What is SAP Security Software?

SAP Security Software is a specialized suite of tools and technologies designed to protect SAP systems from unauthorized access, data breaches, and cyber threats. It ensures the confidentiality, integrity, and availability of critical business data by managing user access, monitoring system activity, and enforcing security policies. The software includes features like role-based access control, segregation of duties (SoD) analysis, real-time threat detection, and compliance management. It also supports automated user provisioning, vulnerability scanning, and audit logging to streamline security operations. By integrating with Governance, Risk, and Compliance (GRC) and Identity Access Management (IAM) systems, SAP security software provides centralized control and visibility across the enterprise. Typical users include SAP security administrators, IT compliance officers, risk and audit teams, and enterprise IT managers who are responsible for maintaining secure, compliant, and resilient SAP environments.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 13 of 13
Sort by
Logo of Microsoft Sentinel

Microsoft Sentinel

By Microsoft

4.4
(51 Ratings)

Microsoft Sentinel is a security information and event management software designed to help organizations detect, investigate, and respond to potential threats across their digital environments. The software aggregates and analyzes data from various sources such as users, applications, servers, and devices, both on-premises and in the cloud. It utilizes artificial intelligence to identify patterns and anomalies that may indicate security risks. Microsoft Sentinel provides capabilities for automated incident response, threat intelligence enrichment, and customizable dashboards for monitoring and reporting. The software aims to streamline security operations, reduce the time to investigate incidents, and support compliance with various regulatory requirements by offering integrated management and analytics tools for safeguarding enterprise assets.

Show More Details
Logo of Onapsis Platform

Onapsis Platform

By Onapsis

4.4
(28 Ratings)

Onapsis Platform is a software designed to provide cybersecurity and compliance solutions for business-critical applications such as SAP and Oracle. The software assists organizations in identifying, assessing, and mitigating security and compliance risks within their enterprise application landscape. It offers features for continuous monitoring, vulnerability assessment, threat detection, and automated compliance reporting. The software helps address challenges related to securing sensitive data, detecting misconfigurations, and managing regulatory compliance requirements across complex application environments. Onapsis Platform enables organizations to maintain the integrity and availability of core business applications by delivering insights and automated processes for risk management and remediation.

Show More Details
Logo of SAP S4Hana Security

SAP S4Hana Security

By Fortinet

4.2
(16 Ratings)

SAP S4Hana Security software focuses on protecting SAP S4Hana environments by addressing core requirements such as user authentication, authorization management, data encryption, and access control. The software assists organizations with monitoring, auditing, and managing permissions to critical business data and functions within SAP S4Hana. It helps mitigate risks associated with unauthorized access, insider threats, and external breaches by supporting integration with identity management solutions, implementing security policies, and facilitating compliance with regulatory standards. Features include real-time monitoring, granular user access configuration, and alerting on suspicious activities, contributing to securing business applications and maintaining system integrity within SAP S4Hana landscapes.

Show More Details
Logo of Avantra

Avantra

By Avantra

4.1
(8 Ratings)

Avantra is a software designed for automation and monitoring of SAP landscapes, focusing on enhancing IT operations efficiency. The software offers features such as real-time system monitoring, automated issue detection, and remediation capabilities to help organizations manage complex SAP environments. Avantra supports integration with cloud and on-premise systems, providing insights into system health, performance, and compliance. By automating repetitive processes and delivering comprehensive dashboards, the software aims to reduce manual workloads and streamline incident response. Avantra addresses challenges related to system monitoring, performance optimization, and risk mitigation in SAP systems, supporting IT teams in maintaining operational stability and reliability.

Show More Details
Logo of Cybersecurity Extension for SAP

Cybersecurity Extension for SAP

By Layer Seven Security

4.3
(6 Ratings)

Cybersecurity Extension for SAP is a software that offers security monitoring, threat detection, and vulnerability management capabilities for SAP environments. The software provides tools to identify configuration issues, monitor user activity, and detect unauthorized changes within SAP systems. It supports compliance requirements by enabling continuous assessment and reporting of security controls. The software facilitates integration with security operations centers and other enterprise security platforms to streamline incident detection and response. It addresses business challenges related to protecting sensitive data, minimizing security risks, and maintaining the integrity of SAP systems in complex IT landscapes.

Show More Details
Logo of XM Cyber Exposure Management Platform

XM Cyber Exposure Management Platform

By XM Cyber

4.7
(6 Ratings)

XM Cyber Exposure Management Platform is a software designed to continuously identify, analyze, and prioritize security risks within enterprise environments. It models potential attack paths across hybrid networks, highlighting vulnerabilities and misconfigurations that could be exploited by threats. The software integrates data from multiple security tools to provide actionable insights, focusing remediation efforts on issues that pose the highest risk to critical assets. XM Cyber Exposure Management Platform aims to improve the efficiency of security operations by automating risk prioritization and streamlining incident response processes, helping organizations to mitigate threats before they can impact business operations.

Show More Details
Logo of NTT Data Security and Compliance

NTT Data Security and Compliance

By NTT DATA Business Solutions

4
(3 Ratings)

NTT Data Security and Compliance software is designed to help organizations manage data protection, regulatory compliance, and risk mitigation. The software provides features such as automated security assessments, policy management, access control, and monitoring of compliance with standards and regulations. It addresses business challenges related to safeguarding sensitive information, ensuring adherence to regulatory requirements, and reducing the risk of security breaches. The software enables continuous monitoring and reporting, supports audit processes, and assists in establishing governance frameworks for data security within the enterprise environment.

Show More Details
Logo of SecurityBridge Platform

SecurityBridge Platform

By SecurityBridge

5
(2 Ratings)

SecurityBridge Platform is a software designed to help organizations secure their SAP environments. The software provides functionalities such as threat detection, vulnerability management, patch management, and compliance monitoring. It enables users to identify risks, monitor for malicious activities, and automate security assessments within SAP systems. The software is used for centralizing the management of SAP security, offering capabilities to analyze system configurations, detect unauthorized access attempts, and manage remediation activities. It aims to address the business problem of maintaining robust security posture in complex SAP landscapes, ensuring operational continuity and minimizing exposure to cyber threats.

Show More Details
Logo of Logpoint BCS for SAP (Legacy)

Logpoint BCS for SAP (Legacy)

By Logpoint

4
(1 Rating)

Logpoint BCS for SAP is a software designed to monitor, analyze, and manage security and compliance within SAP environments. The software collects and correlates logs and events from SAP systems, enabling organizations to detect unusual activities, unauthorized access, and policy violations. It provides real-time alerts, forensic analysis, and automated reporting to support audit and compliance requirements. Logpoint BCS for SAP helps to identify security threats, meet regulatory standards, and streamline incident investigation by integrating with existing security information and event management solutions. The software is intended to support organizations in maintaining secure and compliant SAP operations.

Show More Details
Logo of Soterion

Soterion

By Soterion

4
(1 Rating)

Take control of your organisation’s SAP access risk exposure with Soterion’s business-friendly SAP Governance, Risk and Compliance (GRC) software. Soterion's SAP Access Risk Manager analyses SAP systems to identify access risks that could potentially lead to fraud or security breaches. User-friendly dashboards display easy-to-consume information, making SAP access risk identification and remediation effortless. Soterion's GRC software enables organisations to simplify their SAP access control (GRC), risk management, emergency access, user access reviews, continuous controls monitoring, and access provisioning processes.

Show More Details
Logo of SimpAudit

SimpAudit

By BSC Global

SimpAudit is a software designed to facilitate and manage audit processes for organizations. The software enables users to perform risk assessment, monitor compliance, and manage controls through an integrated platform. SimpAudit supports documentation of audit findings and provides tools for tracking corrective actions. The software includes features for scheduling audits, assigning tasks, and generating reports that help organizations address regulatory requirements and internal policies. SimpAudit aims to streamline audit workflows and enhance the organization and accessibility of audit data while supporting the identification and resolution of operational gaps.

Be the first to .
Logo of Xiting Authorizations Management Suite (XAMS)

Xiting Authorizations Management Suite (XAMS)

By Xiting

The Xiting Authorizations Management Suite (XAMS) is a comprehensive solution designed to simplify and accelerate SAP authorization management. It provides automated tools for role design, testing, and maintenance, ensuring compliant and efficient authorization concepts across SAP landscapes. With features like risk simulation, SoD conflict checks, and audit-ready reporting, XAMS reduces manual effort, minimizes errors, and strengthens security. Organizations benefit from streamlined role redesign projects, accelerated migration to SAP S/4HANA, and sustainable authorization concepts that meet both business and compliance requirements. By automating time-consuming tasks and embedding best practices, XAMS helps businesses reduce project costs, improve audit readiness, and mitigate access risks, while enabling IT and compliance teams to focus on strategic initiatives rather than operational overhead.

Be the first to .
Logo of Xiting Security Platform (XSP)

Xiting Security Platform (XSP)

By Xiting

The Xiting Security Platform (XSP) is a cloud-native solution on SAP Business Technology Platform that unifies and automates SAP security management across hybrid system landscapes. It helps organizations address the challenges of fragmented security by consolidating identities, managing risks, and streamlining compliance processes. XSP enables cross-system segregation of duties analysis, real-time security monitoring with SIEM integration, and centralized patch management to mitigate vulnerabilities. It connects seamlessly with SAP GRC and leading IAM systems, extending governance into both on-premise and cloud applications. With features such as identity consolidation, user access reviews, and license analysis using the SAP STAR ruleset, XSP reduces complexity, enhances compliance, optimizes license costs, and strengthens overall security posture. This empowers organizations to proactively manage risk while increasing efficiency and ensuring sustainable security operations.

Be the first to .

Popular Product Comparisons

Onapsis Platform vs SecurityBridge PlatformAvantra vs Cybersecurity Extension for SAP

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.