SAP Enterprise Threat Detection
Filter By
Browse By
- SAP Analytics and AI
- SAP Application Development and Integration
- All SAP Application Development and Integration
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP API Management
- SAP BAPI
- SAP Basis
- SAP BRF
- SAP Business Application Studio
- SAP CMS
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP EAI
- SAP EDI
- SAP Extension Suite
- SAP Fiori
- SAP Fiori Elements
- SAP Integration Suite
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Netweaver
- SAP Release Management
- SAP UI5
- SAP Web Application Server
- SAP Web IDE
- SAP Business Process Management
- SAP Center of Excellence
- SAP CIO
- SAP Customer Experience
- SAP Data and Data Management
- All SAP Data and Data Management
- SAP BW
- SAP BW/4HANA
- SAP Crystal Reports
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP DMS
- SAP Document Control
- SAP EIM
- SAP ETL
- SAP ETL Tools
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Studio
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP Enterprise Architect
- SAP Enterprise Asset Management
- SAP ERP
- SAP Finance
- All SAP Finance
- SAP Accounting
- SAP AR AP
- SAP Asset Accounting
- SAP Billing Systems
- SAP BPC
- SAP BRIM
- SAP Cash Management
- SAP Central Finance
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP Currency Risk
- SAP e-invoicing
- SAP FICO
- SAP Finance Automation
- SAP Advanced Financial Closing
- SAP Financial Consolidation
- SAP Financial Planning
- SAP FX Risk
- SAP General Ledger
- SAP Global Tax Management
- SAP Hyperion
- SAP Order to Cash
- SAP Payment Processing
- SAP Profitability Analysis
- SAP Rebate Management
- SAP S/4HANA Finance
- SAP SWIFT Compliance
- SAP Treasury Management
- SAP Universal Journal
- SAP Governance Risk and Compliance
- SAP Human Capital Management
- SAP Intelligent Technologies
- SAP Platform and Technology
- All SAP Platform and Technology
- SAP Business Technology Platform
- SAP Cloud
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP Digital Signature
- SAP Container Platform
- SAP HANA Enterprise Cloud
- SAP Digital Asset Management
- SAP Smart Forms
- SAP HEC
- SAP Digital Integration Hub
- SAP Hyperscalers
- SAP Infrastructure
- SAP Messaging
- SAP Quality and Testing
- SAP Security
- SAP Spend Management
- SAP Supply Chain Management
- All SAP Supply Chain Management
- SAP APO
- SAP Asset Management
- SAP Business Network
- SAP Digital Manufacturing Cloud
- SAP Digital Twin
- SAP EWM
- SAP IBP
- SAP Inventory Management
- SAP Label Printing
- SAP Logistics
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP MES
- SAP MII
- SAP MM
- SAP MRO
- SAP MRP
- SAP Order Management
- SAP Plant Maintenance
- SAP PLM
- SAP Production Planning
- SAP S&OP
- SAP SD
- SAP SPM
- SAP Supply Chain Planning
- SAP Track and Trace
- SAP Transportation Management
- SAP System Administration
What Is SAP Enterprise Threat Detection?
Powered by SAP HANA, SAP Enterprise Threat Detection enables security administrators to detect, monitor, and analyze security events throughout the SAP landscape by scanning log files and identifying suspicious patterns. It includes a security information and event management (SIEM) tool that employs real-time intelligence to detect external and internal cyber threats and comply with data protection and audit regulations. Available on-premise or in the cloud, SAP Enterprise Threat Detection includes preconfigured and customizable functionality, risk-based prioritized automated alerts, as well as forensic investigation, threat hunting, and anomaly detection. In 2021, SAP launched a cloud-based managed service version of SAP Enterprise Threat Detection.
Key capabilities include:
- Forensic investigation, threat hunting, and anomaly detection functions
- Risk-based and prioritized alerts
- Rapid security log analysis and correlation
- Continuous monitoring of systems
Key Considerations for SAPinsiders
What Is SAP Enterprise Threat Detection?
Powered by SAP HANA, SAP Enterprise Threat Detection enables security administrators to detect, monitor, and analyze security events throughout the SAP landscape by scanning log files and identifying suspicious patterns. It includes a security information and event management (SIEM) tool that employs real-time intelligence to detect external and internal cyber threats and comply with data protection and audit regulations. Available on-premise or in the cloud, SAP Enterprise Threat Detection includes preconfigured and customizable functionality, risk-based prioritized automated alerts, as well as forensic investigation, threat hunting, and anomaly detection. In 2021, SAP launched a cloud-based managed service version of SAP Enterprise Threat Detection.
Key capabilities include:
- Forensic investigation, threat hunting, and anomaly detection functions
- Risk-based and prioritized alerts
- Rapid security log analysis and correlation
- Continuous monitoring of systems
Key Considerations for SAPinsiders
Protect the “crown jewels” in SAP applications. Arndt Lingscheid, Global Solution Owner Cybersecurity and Data Protection at SAP, explains that a company’s most valuable assets — crown jewels — are often located in SAP applications. SAP Enterprise Detection alerts security professionals early to security threats to the crown jewels. “We can do forensic analysis for SAP application logs and threat hunting to identify anomalous activity in the systems to identify threats early,” he explains. The platform has the ability to process and analyze up to 250,000 events per second and correlate the data in real-time with other logs coming in from the SAP environment, he says.
Look at the whole security puzzle. SAP Enterprise Threat Detection uses automated processes based on SAP HANA and machine learning to track attacker activity using predefined and customizable attack paths and user behavioral analysis. It provides automated alerts when attack patterns are detected, which are forwarded to other SIEM systems. The tool enables the security analyst to click on a button and get a correlation of different log types sorted by timestamp to give a complete picture of an enterprise’s security, Lingscheid notes. “We are able to look at the whole security puzzle, not just single puzzle pieces,” he says.
Monitor for suspicious behaviors and anomalous events. SAP Enterprise Threat Detection reduces the time required to identify suspicious events and vulnerabilities in key SAP systems. The platform provides transparency into suspicious user behavior and anomalies in SAP applications to identify and stop security breaches in real time, Lingscheid relates. Its managed service includes monitoring of customers’ entire ERP landscape continuously by SAP experts and risk-based, prioritized alerting. A monthly report summarizes all suspicious activities detected and the details of how they were carried out.
What other vendors offer help with enterprise threat detection for SAP products? Some of the other vendors that offer help with enterprise threat detection for SAP customers include Layer Seven Security, Onapsis, Virtustream, Winterhawk Consulting, Xiting.
13 results
-
Simply Securing a System Is No Longer Sufficient
Reading time: 5 mins
By Robert Holland, VP Research, SAPinsider Securing an SAP system used to involve checking access and process controls and ensuring that the most recent SAP Notes had been applied. Now it involves not only ensuring that the system itself is up to date but must address cybersecurity and compliance issues as well. The Threat Landscape…
-
- SAP Enterprise Threat Detection
Premium
Cybersecurity: Case study: How McKesson uses SAP Enterprise Threat Detection to identify and mitigate risks
Reading time: 1 mins
Learn how McKesson, the largest U.S. pharmaceutical distributor, implemented SAP Enterprise Threat Detection to strengthen its cybersecurity position. Click this link to view the slides from this session — Cyber_2017_Kuo_Wienand_Casestudyhowmckessonusessap. Benjamin Wienand If you have comments about this article or publication, or would like to submit an article idea, please contact the editor....…
-
- SAP Enterprise Threat Detection
Premium
How to Configure SAP Enterprise Threat Detection for Increased Surveillance and Real-Time Analysis of Security Threats
Reading time: 29 mins
Mining of important security-related logs has always been a challenge for most enterprises in terms of how to gain appropriate security intelligence from collected data sets in order to forestall malicious attacks from within and outside an enterprise. Kehinde Eseyin shows how to set up the SAP Enterprise Threat Detection system landscape to facilitate log...…
Become a Member
Unlimited access to thousands of resources for SAP-specific expertise that can only be found here.
Become a Partner
Access exclusive SAP insights, expert marketing strategies, and high-value services including research reports, webinars, and buyers' guides, all designed to boost your campaign ROI by up to 50% within the SAP ecosystem.
Upcoming Events
Related Vendors
Your request has been successfully sent