Protect your connected business systems with reliable cybersecurity monitoring
Identify, analyse, and neutralize real cyberattacks as they are happening and before serious damage occurs. The SAP Enterprise Threat Detection application enables real-time security intelligence (RTSI) to help effectively manage your systems’ vulnerability to external and internal cybersecurity threats and help ensure data loss prevention (DLP).
Insight into suspicious activities
Detect and analyse threats in real time by tapping into the power of the SAP HANA platform to gather and analyse a vast quantity of log data from both SAP and non-SAP software. Then, correlate it to get a complete picture of landscape activities.
Real-time action to neutralize danger and prevent critical damage
Find SAP software-specific threats related to known attacks by using attack detection patterns. Perform forensic threat detection, conduct attack investigations, discover previously unknown attacks or attack variants, and customise the integration of non-SAP systems and infrastructure components through a public API.
Application security
Use SAP Enterprise Threat Detection to protect your SAP software, including SAP Business Suite, SAP S/4HANA, SAP HANA, SAP ERP, SAP Customer Relationship Management (SAP CRM), SAP ERP Human Capital Management (SAP ERP HCM), SAP Supplier Relationship Management (SAP SRM), and SAP Business Warehouse (SAP BW).
Log data management
Consolidation and processing of large amounts of events with the SAP HANA platform to gain SIEM insight at unprecedented speed.
SAP Enterprise Threat Detection exposes internal and external attacks at high speed with a wide breadth of capabilities, including:
- Real-time cybersecurity monitoring
- Detection of internal and external attacks based on application log information in combination with context data
- Gathering of events from a landscape of SAP and non-SAP systems, including attempts that threaten source-code security
- Evaluation of attack detection patterns provided by SAP and developed by customers or partners
- Event analysis that derives profiles of normal behaviour and searches for deviations within these profiles
- Alert warnings that inform you of suspected attacks and enable subsequent analysis and incident management
- Normalisation and pseudonymisation capabilities
- Alerts in case of possible exploitation of unpatched systems
- Integration with the databased and system landscape
- Best practices for detecting cyberattacks on SAP systems