Skip to Content
SAP Enterprise Threat Detection

SAP Enterprise Threat Detection

Help identify, analyze, and neutralize cyberattacks in your SAP applications as they happen and before serious damage occurs.

Help neutralize cybersecurity threats with real-time SIEM intelligence

placeholder

Take advantage of a security information and event management (SIEM) tool that uses real-time intelligence to help you comply with data protection and audit regulations and detect external and internal cybersecurity threats.

  • On-premise or cloud deployment
  • Available as a managed service 24x7
  • Preconfigured and customizable functionality
  • Risk-based and prioritized alerting
  • Forensic investigations, threat hunting, and anomaly detection

Key Benefits

Enhance security

Monitor and improve security to help keep systems secure in a continuously changing cybersecurity threat environment.

Gain insight into suspicious activities

Detect threats to your most valuable assets in your SAP applications to minimize
financial loss and legal and reputational damage.

Help neutralize threats

Gain transparency and simplify the analysis of suspicious activities, identify security gaps, and understand the impact to your business.

Protect software and business operations

Safeguard the operation of SAP applications and improve the continuity of your business.

Key Capabilities

placeholder
Show more
Log correlation and analysis

  • Analyze a vast quantity of log data and correlate information to get a complete picture of landscape activities
  • Perform forensic threat detection to discover previously unknown attack variants
  • Customize the integration of third-party systems and infrastructure components 
  • Use an exclusive kernel API to send logs directly to SAP Enterprise Threat Detection to make manipulation more difficult

Automated threat detection and alerting

  • Find SAP software-specific threats related to known attacks by using attack detection patterns
  • Create attack detection patterns without the need to code
  • Conduct attack investigations based on generated alerts and publish alerts to enable integration with external processes and solutions  
  • Include user pseudonymization and resolution with special authorization when evidence of an attack or misuse arises

Straightforward integration across SAP solutions

  • Detect threats at the application server level and at the database level
  • Integrate with SAP solutions across your entire IT landscape

placeholder
Show more
Log correlation and analysis

  • Analyze a vast quantity of log data and correlate information to get a complete picture of landscape activities
  • Perform forensic threat detection to discover previously unknown attack variants
  • Customize the integration of third-party systems and infrastructure components 
  • Use an exclusive kernel API to send logs directly to SAP Enterprise Threat Detection to make manipulation more difficult

Automated threat detection and alerting

  • Find SAP software-specific threats related to known attacks by using attack detection patterns
  • Create attack detection patterns without the need to code
  • Conduct attack investigations based on generated alerts and publish alerts to enable integration with external processes and solutions  
  • Include user pseudonymization and resolution with special authorization when evidence of an attack or misuse arises

Straightforward integration across SAP solutions

  • Detect threats at the application server level and at the database level
  • Integrate with SAP solutions across your entire IT landscape

placeholder

SAP launches new cloud-based solution 

Discover the new real-time enterprise threat detection solution.

Build a business case

placeholder
Safeguard your business with higher standards

Read about the launch of the SAP Enterprise Threat Detection solution as a managed service.

placeholder
Access a customer case story from Deloitte

Get insight from Deloitte’s firsthand experience with SAP Enterprise Threat Detection and learn how to make the most of the application at your business.

Increase visibility into your threat landscape

Learn how SAP and Splunk are working together to help secure the Intelligent Enterprise with new integrations and solutions for our joint customers, starting with SAP Enterprise Threat Detection.

placeholder
Take a proactive stance against cyber threats

Learn how to better protect your business by identifying, analyzing, and responding to growing threats to your core IT systems.

Technical Information

This product is deployed in the cloud and is available as software as a service (SaaS), so you can access your software from any Web browser.
Installation and setup

Find out how you can seamlessly install this product with your existing IT landscape.

Configuration

Optimize configuration of this product with our comprehensive configuration guide.

Integration

Find out how you can seamlessly integrate this product with your existing IT landscape.

Get Started

Jump-start your implementation and drive ROI by collaborating with industry experts, consultants, and support engineers throughout your journey.

Services

Transform your business quickly and effectively by taking advantage of our holistic service and support plans, expert consulting services, custom application development, proven best practices, and deep industry and technical knowledge.

Support

Help keep your SAP solutions running at peak performance with our IT experts and support services, including long-term plans, embedded teams, remote technology support, self-service portal, and innovation strategies.

Security and compliance

Focus on your business and customer relationships while keeping your data safe and reliable. SAP takes a proactive, predictive approach to maintaining compliance and data security in the cloud and within an on-premise data center.

Questions? Get in touch!

Back to top