Latest updates:
08/2016 Best Practise Sizing and Performance
08/2016 Blog from Virtual Forge on configuring the ABAP Logs
07/2016 Integration options SAP Enterprise Threat Detection
Overview
The interconnected nature of modern business systems means that successful companies with critical business on SAP software must effectively manage exposure to external and internal threats. SAP Enterprise Threat Detectionhelps you identify the real attacks as they are happening and analyze the threats quickly enough to neutralize them before serious damage occurs.
The solution is about:
- detect cyber attacks
- data breach analysis
- insider attack
- security monitoring
- forensic analysis
Primary goal is to secure your SAP Business Suite (ERP, CRM, SCM, HCM..), SAP NetWeaver, SAP HANA and SAP S/4 HANA landscape but the solution is also able to learn non-SAP logs to integrate firewall, operation system and many other system events.
SAP Enterprise Threat Detection is not the next "regular expression" tool on a database (like some SIEM solutions). SAP delivers rules for SAP landscapes and customers and partners are able to modify them without development. It is all based on a SAP Fiori user interface. So there is no need to developed many months your own rules to have a basic detection framework live.
What are typical rules delivered by SAP? The list would be to long for this blog, but it could be categorized:
- Vulnerabilities (Security Notes)
- Critical authorization assignments
- User manipulations/morphing
- Critical changes to users
- Brute force attacks
- Suspicious logons
- Unusual communication & downloads
- Security configuration changes
- Cross-landscape communication
- Access to critical resources
- Data manipulation
- Debugging in productive systems
- Denial of Service
- Authentication token attack
SAP Enterprise Threat Detection leverages SAP HANA to efficiently monitor SAP software-centric landscapes. It allows you to perform real-time analysis and correlation of the vast quantity of log data that SAP and non-SAP systems generate.
SAP Enterprise Threat Detection
General information
Road Map (SMP login required)
KuppingerCole white paper: Real time protection of SAP landscapes
SAP Insider Article: An Integrated Approach to Identifying Security Risks
Adjacent topics and portfolio
Release information
Getting started
Technical topics
Documentation
SAP Help Portal Documentation
SAP Runs SAP
Ecosystem SAP Enterprise Threat Detection - blogs via partners
Schoenhofer: ETD for non-SAP
Schoenhofer: Finding abnormal activities
Nenhum comentário:
Postar um comentário
Observação: somente um membro deste blog pode postar um comentário.