terça-feira, 6 de setembro de 2016


Latest updates:

08/2016 Best Practise Sizing and Performance
08/2016 Blog from Virtual Forge on configuring the ABAP Logs
07/2016 Integration options SAP Enterprise Threat Detection


The interconnected nature of modern business systems means that successful companies with critical business on SAP software must effectively manage exposure to external and internal threats. SAP Enterprise Threat Detectionhelps you identify the real attacks as they are happening and analyze the threats quickly enough to neutralize them before serious damage occurs.

The solution is about:
  • detect cyber attacks
  • data breach analysis
  • insider attack
  • security monitoring
  • forensic analysis
Primary goal is to secure your SAP Business Suite (ERP, CRM, SCM, HCM..), SAP NetWeaver, SAP HANA and SAP S/4 HANA landscape but the solution is also able to learn non-SAP logs to integrate firewall, operation system and many other system events.

SAP Enterprise Threat Detection is not the next "regular expression" tool on a database (like some SIEM solutions). SAP delivers rules for SAP landscapes and customers and partners are able to modify them without development. It is all based on a SAP Fiori user interface. So there is no need to developed many months your own rules to have a basic detection framework live.

What are typical rules delivered by SAP? The list would be to long for this blog, but it could be categorized:
  • Vulnerabilities (Security Notes)
  • Critical authorization assignments
  • User manipulations/morphing
  • Critical changes to users
  • Brute force attacks
  • Suspicious logons
  • Unusual communication & downloads
  • Security configuration changes
  • Cross-landscape communication
  • Access to critical resources
  • Data manipulation
  • Debugging in productive systems
  • Denial of Service
  • Authentication token attack
SAP Enterprise Threat Detection leverages SAP HANA to efficiently monitor SAP software-centric landscapes. It allows you to perform real-time analysis and correlation of the vast quantity of log data that SAP and non-SAP systems generate.

SAP Enterprise Threat Detection

General information
Road Map (SMP login required)
KuppingerCole white paper: Real time protection of SAP landscapes

Adjacent topics and portfolio

Release information

Getting started

Technical topics

SAP Help Portal Documentation
SAP Notes 2068112 and 2155046


Ecosystem SAP Enterprise Threat Detection - blogs via partners

Schoenhofer: ETD for non-SAP

Nenhum comentário:

Postar um comentário

Observação: somente um membro deste blog pode postar um comentário.