Featured Content
Topics

Explore critical topics shaping today’s SAP landscape—from digital transformation and cloud migration to cybersecurity and business intelligence. Each topic is curated to provide in-depth insights, best practices, and the latest trends that help SAP professionals lead with confidence.

Regions

Discover how SAP strategies and implementations vary across global markets. Our regional content brings localized insights, regulations, and case studies to help you navigate the unique demands of your geography.

Industries

Get industry-specific insights into how SAP is transforming sectors like manufacturing, retail, energy, and healthcare. From supply chain optimization to real-time analytics, discover what’s working in your vertical.

Hot Topics

Dive into the most talked-about themes shaping the SAP ecosystem right now. From cross-industry innovations to region-spanning initiatives, explore curated collections that spotlight what’s trending and driving transformation across the SAP community.

Featured Content
Topics

Explore critical topics shaping today’s SAP landscape—from digital transformation and cloud migration to cybersecurity and business intelligence. Each topic is curated to provide in-depth insights, best practices, and the latest trends that help SAP professionals lead with confidence.

Regions

Discover how SAP strategies and implementations vary across global markets. Our regional content brings localized insights, regulations, and case studies to help you navigate the unique demands of your geography.

Hot Topics

Dive into the most talked-about themes shaping the SAP ecosystem right now. From cross-industry innovations to region-spanning initiatives, explore curated collections that spotlight what’s trending and driving transformation across the SAP community.

SAP Enterprise Threat Detection

Upcoming Events

SAPinsider Las Vegas 2026
Mar 16-19, 2026Las Vegas, Nevada, NV

Related Vendors

What Is SAP Enterprise Threat Detection?

Powered by SAP HANA, SAP Enterprise Threat Detection enables security administrators to detect, monitor, and analyze security events throughout the SAP landscape by scanning log files and identifying suspicious patterns. It includes a security information and event management (SIEM) tool that employs real-time intelligence to detect external and internal cyber threats and comply with data protection and audit regulations. Available on-premise or in the cloud, SAP Enterprise Threat Detection includes preconfigured and customizable functionality, risk-based prioritized automated alerts, as well as forensic investigation, threat hunting, and anomaly detection. In 2021, SAP launched a cloud-based managed service version of SAP Enterprise Threat Detection.

Key capabilities include:

  • Forensic investigation, threat hunting, and anomaly detection functions
  • Risk-based and prioritized alerts
  • Rapid security log analysis and correlation
  • Continuous monitoring of systems

Key Considerations for SAPinsiders

What Is SAP Enterprise Threat Detection?

Powered by SAP HANA, SAP Enterprise Threat Detection enables security administrators to detect, monitor, and analyze security events throughout the SAP landscape by scanning log files and identifying suspicious patterns. It includes a security information and event management (SIEM) tool that employs real-time intelligence to detect external and internal cyber threats and comply with data protection and audit regulations. Available on-premise or in the cloud, SAP Enterprise Threat Detection includes preconfigured and customizable functionality, risk-based prioritized automated alerts, as well as forensic investigation, threat hunting, and anomaly detection. In 2021, SAP launched a cloud-based managed service version of SAP Enterprise Threat Detection.

Key capabilities include:

  • Forensic investigation, threat hunting, and anomaly detection functions
  • Risk-based and prioritized alerts
  • Rapid security log analysis and correlation
  • Continuous monitoring of systems

Key Considerations for SAPinsiders

Protect the “crown jewels” in SAP applications. Arndt Lingscheid, Global Solution Owner Cybersecurity and Data Protection at SAP, explains that a company’s most valuable assets — crown jewels — are often located in SAP applications. SAP Enterprise Detection alerts security professionals early to security threats to the crown jewels. “We can do forensic analysis for SAP application logs and threat hunting to identify anomalous activity in the systems to identify threats early,” he explains. The platform has the ability to process and analyze up to 250,000 events per second and correlate the data in real-time with other logs coming in from the SAP environment, he says.

Look at the whole security puzzle. SAP Enterprise Threat Detection uses automated processes based on SAP HANA and machine learning to track attacker activity using predefined and customizable attack paths and user behavioral analysis. It provides automated alerts when attack patterns are detected, which are forwarded to other SIEM systems. The tool enables the security analyst to click on a button and get a correlation of different log types sorted by timestamp to give a complete picture of an enterprise’s security, Lingscheid notes. “We are able to look at the whole security puzzle, not just single puzzle pieces,” he says.

Monitor for suspicious behaviors and anomalous events. SAP Enterprise Threat Detection reduces the time required to identify suspicious events and vulnerabilities in key SAP systems. The platform provides transparency into suspicious user behavior and anomalies in SAP applications to identify and stop security breaches in real time, Lingscheid relates. Its managed service includes monitoring of customers’ entire ERP landscape continuously by SAP experts and risk-based, prioritized alerting. A monthly report summarizes all suspicious activities detected and the details of how they were carried out.

What other vendors offer help with enterprise threat detection for SAP products? Some of the other vendors that offer help with enterprise threat detection for SAP customers include Layer Seven Security, Onapsis, Virtustream, Winterhawk Consulting, Xiting.

17 results
Pathlock logo associated with SAP threat detection integration for Microsoft Sentinel Solution for SAP applications.
Pathlock Adds Real-Time SAP Threat Detection to Microsoft Sentinel Solution for SAPFeb 27  —  Pathlock has integrated its SAP Threat Detection capability with Microsoft Sentinel Solution for SAP applications, enabling enriched SAP security events to flow directly into enterprise SIEM workflows. The move brings SAP telemetry into centralized SOC investigation and response processes across hybrid environments.
3 minute read
AI agents operating inside SAP systems increase the need for unified identity governance and visibility across S/4HANA environments.
AI, SAP, and 2027: Why Identity Architecture Is Now a Program-Level DecisionFeb 18  —  AI agents are already operating inside SAP systems, yet most organizations lack visibility and effective control over their privileges. As S/4HANA migration and SAP Identity Management retirement approach, identity architecture is no longer an operational afterthought. It is becoming a structural decision that shapes automation risk, segregation-of-duties integrity, and audit resilience.
4 minute read
Onapsis logo over modern enterprise office building representing SAP security and cloud transformation.
Why Security Timing Determines Success in RISE with SAP TransformationsFeb 2  —  Security timing often determines whether RISE with SAP transformations stay on track. This analysis examines how late risk discovery undermines migration, execution, and post–go-live outcomes, and why secure-by-design approaches change delivery discipline.
4 minute read
Onapsis Announces Enhanced Security Features for SAP BTPDec 4, 2024  —  The SAP cybersecurity specialists at Onapsis announced that they have expanded their Control product line to feature a bundle that bolsters the security of SAP Business Technology Platform (BTP). This new solution allows users to automatically scan code for potential threats throughout a number of environments and depositories. The product is available as of Q4 […]
2 minute read
Image of a laptop with coding on the screen | SAP testing Impact QA cyber security
The simulated cyber-attacks helping businesses stay secureOct 3, 2024  —  ImpactQA's CEO speaks to SAPInsider on the simulated cyber attack methodology readying businesses’ operations against potential hackers.
3 minute read
An image of metal nuts and bolts scattered on a white surface, some loose, in the shape of a virus | SAP SUSE cybersecurity
Are the Nuts and Bolts Loose in your Cybersecurity? Windows and SAPAug 23, 2024  —  Diversifying your stack for new capabilities can also result in a more slippery structure when trying to fortify your cybersecurity.
3 minute read
Clovity
Fortifying Data Protection with NextLabs: Insights from Four Industry LeadersApr 29, 2024  —  The increasing complexity of digital environments makes traditional manual detection and response methods both inefficient and costly. This calls for a shift to an automate & prevent strategy to improve security more effectively. NextLabs has proven its capability to protect highly sensitive data through effective deployments at major corporations such as Boeing, Deutsche Telekom, Fiserv, and Solvay, safeguarding information no matter where it is located or how it is shared. The company's innovative dynamic authorization technology and attribute-based zero trust policy platform, which includes hundreds of ready-to-use integrations, allow businesses to automate data protection and avoid compliance violations. These four industry leaders exemplify NextLabs' consistent support for all its customers in securing their digital transformation initiatives. By utilizing cutting-edge technology, NextLabs enables organizations to enhance decision-making through data-centric analytics and promotes secure collaboration across various platforms.
5 minute read
Cybersecurity sessions
Securing the Intelligent Enterprise with SAP’s Enterprise Threat DetectionApr 20, 2023  —  The heightened global prevalence of cyber threats has amplified the urgency for organizations to move beyond the traditional preventive measures. Organizations now need to adopt more stringent protocols for real-time monitoring, threat detection, and swift response in order to effectively protect their businesses. This article discusses SAP’s Enterprise Threat Detection, a comprehensive offering that enables organizations to proactively identify, analyze, and respond to cyber threats in real-time within their SAP applications and systems. The solution is an innovative cloud-based solution designed specifically for detecting, analyzing, and mitigating cyber threats in real-time within SAP applications, the solution is delivered as a fully managed service by SAP on the SAP Business Technology Platform and is a Security Incident and Event Management (SIEM) application. It offers cutting-edge software with round-the-clock managed security services provided by SAP experts. The solution and service work together to help companies proactively identify and respond to cyber-attacks by constantly gathering, correlating, and analyzing unusual and suspicious events across the entire SAP system landscape, preventing potential damage before it becomes critical.
2 minute read
Cybersecurity expert
Video: Protect SAP from Ransomware and Supply Chain AttacksSep 17, 2021  —  Today, enterprises are confronting a myriad of cyberthreats. Two of the most destructive are ransomware and software supply chain attacks. Ransomware attacks have soared over the last couple of years, and that trend has only accelerated. In fact, ransomware attacks have increased 57% since the beginning of this year, and the average number of companies […]
1 minute read
ransomware and security image
Strategies to Thwart Ransomware and Supply Chain AttacksSep 15, 2021  —  Today, enterprises are confronting a myriad of cyberthreats. Two of the most destructive are ransomware and software supply chain attacks. Ransomware attacks have soared over the last couple of years, and that trend has only accelerated. In fact, ransomware attacks have increased 57% since the beginning of this year, and the average number of companies suffering a ransomware attack doubled between 2020 and 2021. Attackers have added data theft to their arsenal of data encryption to increase pressure on victims to pay the ransom. In this interview with Ian Thomson, Chief Operating Officer (COO) at Layer Seven Security, we will distill these threats in greater detail and offer practical strategies to help organizations defend against them. You will understand the risks of outdated tools and patches and learn 3 steps you can take to limit your vulnerability. Key Takeaways • Ransomware and supply chain attacks pose an ongoing threat to organizations worldwide. • Updated security tools and good cyber hygiene are the best ways to defend against these threats. • Layer Seven Security leverages SAP Solution Manager to secure a customer’s entire SAP landscape.
4 minute read