Helping identify, analyze, and neutralize cyberattacks in your SAP applications as they happen and before serious damage occurs.
Vendor
SAP
Company Website



Neutralizing cybersecurity threats with real-time SIEM intelligence
Comply with data protection and audit regulations
The SAP Enterprise Threat Detection application provides critical security information and event management (SIEM) capabilities that use real-time intelligence to help enforce data governance and detect external and internal cybersecurity threats.
- On-premise or cloud deployment
- Available as a managed service 24x7
- Preconfigured and customizable functionality
- Risk-based and prioritized alerting
- Forensic investigations, threat hunting, and anomaly detection
Key benefits
Enhanced security
Monitor and improve security to help keep systems secure in a continuously changing cybersecurity threat environment.
Insight into suspicious activities
Detect threats to valuable assets in your SAP applications to minimize financial loss and legal and reputational damage.
Neutralized threats
Gain transparency, simplify the analysis of suspicious activities, identify security gaps, and understand business impacts.
Protected operations
Safeguard the operation of SAP applications and improve the continuity of your business operations.
Key features
Log correlation and analysis
- Analyze a vast quantity of log data and correlate information to get a complete picture of your IT landscape activities
- Perform forensic threats detection to discover previously unknown attack variants
- Customize the integration of third-party systems and infrastructure components
- Use an exclusive kernel API to send logs directly to SAP Enterprise Threat Detection to make manipulation more difficult
Automated threat detection and alerting
- Find SAP software-specific threats related to known attacks by using detection patterns
- Create attack detection patterns without the need for additional code
- Conduct attack investigations based on generated and publish alerts to enable integration with external processes and solutions
- Include user pseudonymization and resolution with special authorization when evidence of an attack or misuse arises
Straightforward integration
- Detect threats at the application server level and at the database level
- Integrate your entire IT landscape with SAP solutions