Logo
Sign in
Product Logo
SAP Enterprise Threat DetectionSAP

Helping identify, analyze, and neutralize cyberattacks in your SAP applications as they happen and before serious damage occurs.

Vendor

Vendor

SAP

Company Website

Company Website

SAP Enterprise Threat Detection2.png
SAP Enterprise Threat Detection3.png
SAP Enterprise Threat Detection.png
Product details

Neutralizing cybersecurity threats with real-time SIEM intelligence

Comply with data protection and audit regulations

The SAP Enterprise Threat Detection application provides critical security information and event management (SIEM) capabilities that use real-time intelligence to help enforce data governance and detect external and internal cybersecurity threats.

  • On-premise or cloud deployment
  • Available as a managed service 24x7
  • Preconfigured and customizable functionality
  • Risk-based and prioritized alerting
  • Forensic investigations, threat hunting, and anomaly detection

Key benefits

Enhanced security

Monitor and improve security to help keep systems secure in a continuously changing cybersecurity threat environment.

Insight into suspicious activities

Detect threats to valuable assets in your SAP applications to minimize financial loss and legal and reputational damage.

Neutralized threats

Gain transparency, simplify the analysis of suspicious activities, identify security gaps, and understand business impacts.

Protected operations

Safeguard the operation of SAP applications and improve the continuity of your business operations.

Key features

Log correlation and analysis

  • Analyze a vast quantity of log data and correlate information to get a complete picture of your IT landscape activities
  • Perform forensic threats detection to discover previously unknown attack variants
  • Customize the integration of third-party systems and infrastructure components
  • Use an exclusive kernel API to send logs directly to SAP Enterprise Threat Detection to make manipulation more difficult

Automated threat detection and alerting

  • Find SAP software-specific threats related to known attacks by using detection patterns
  • Create attack detection patterns without the need for additional code
  • Conduct attack investigations based on generated and publish alerts to enable integration with external processes and solutions
  • Include user pseudonymization and resolution with special authorization when evidence of an attack or misuse arises

Straightforward integration

  • Detect threats at the application server level and at the database level
  • Integrate your entire IT landscape with SAP solutions