Skip to Content
Sazinieties ar mums

SAP Enterprise Threat Detection

Protect your connected business systems with reliable cybersecurity monitoring

Identify, analyse, and neutralize real cyberattacks as they are happening and before serious damage occurs. The SAP Enterprise Threat Detection application enables real-time security intelligence (RTSI) to help effectively manage your systems’ vulnerability to external and internal cybersecurity threats and help ensure data loss prevention (DLP).

Why SAP Enterprise Threat Detection?

Because it gives you unmatched insight into suspicious activities in your
business application landscape and enables you to identify breaches as they occur. 

With SAP Enterprise Threat Detection, you can:

  • Support a continuously changing threat environment by using a powerful and flexible cybersecurity monitoring solution with detection and response capabilities
  • Receive pursuable alerts in time to effectively neutralize danger for your business-critical assets and to prevent critical damage to your business
  • Identify security lapses in your application landscape readily and efficiently with the real-time data processing combination of smart data streaming services (SDS) and the SAP HANA platform
  • Build confidence in your overall cybersecurity solution strategy and help ensure systemwide security compliance
  • Consolidate and process large amounts of events with the SAP HANA platform to gain insight at unprecedented speed
  • Gain an overview of the threat situation, perform forensic investigations, and discover new attack patterns

Learn how SAP Enterprise Threat Detection can secure your critical business systems and data:

Functional Capabilities

Insight into suspicious activities

Detect and analyse threats in real time by tapping into the power of the SAP HANA platform to gather and analyse a vast quantity of log data from both SAP and non-SAP software. Then, correlate it to get a complete picture of landscape activities.

Real-time action to neutralize danger and prevent critical damage

Find SAP software-specific threats related to known attacks by using attack detection patterns. Perform forensic threat detection, conduct attack investigations, discover previously unknown attacks or attack variants, and customise the integration of non-SAP systems and infrastructure components through a public API.

Application security

Use SAP Enterprise Threat Detection to protect your SAP software, including SAP Business Suite, SAP S/4HANA, SAP HANA, SAP ERP, SAP Customer Relationship Management (SAP CRM), SAP ERP Human Capital Management (SAP ERP HCM), SAP Supplier Relationship Management (SAP SRM), and SAP Business Warehouse (SAP BW).

 
Collapse
Technical Capabilities
SAP Enterprise Threat Detection exposes internal and external attacks at high speed with a wide breadth of capabilities, including:
 
Real-time cybersecurity monitoring
  • Detection of internal and external attacks based on application log information in combination with context data 

  • Gathering of events from a landscape of SAP and non-SAP systems, including attempts that threaten source-code security
  • Evaluation of attack detection patterns provided by SAP and developed by customers or partners
  • Event analysis that derives profiles of normal behaviour and searches for deviations within these profiles
  • Alert warnings that inform you of suspected attacks and enable subsequent analysis and incident management
  • Normalisation and pseudonymization capabilities
  • Alerts in case of possible exploitation of unpatched systems
  • Integration with the databased and system landscape
 
Built-in best practices
  • Best practices for detecting cyberattacks on SAP systems
 
Log data management
  • Consolidation and processing of large amounts of events with the SAP HANA platform to gain SIEM insight at unprecedented speed

Overview presentation: SAP Enterprise Threat Detection

Road Map 

Collapse
image

Need additional help? Explore SAP Service and Support


 

System requirements for SAP Enterprise Threat Detection

System and software requirements vary according to specific customer scenarios – please refer to the “SAP Enterprise Threat Detection Sizing Guide” for details.

Also, please see the “SAP Enterprise Threat Detection Product Availability Matrix” for the latest information on updates and releases.

System Requirement
Details
Platform
  • SAP HANA platform 1.0 SPS 10 or higher with SAP HANA studio and SAP HANA Lifecycle Management
Data management
  • SAP Event Stream Processor 5.1 with support package 10 or higher and on Linux (recommended), Solaris, or Windows
Web browsers
  • Google Chrome and Mozilla Firefox

Licensing and purchasing options for SAP Enterprise Threat Detection

SAP Enterprise Threat Detection allows you to license and pay for only the number of users that you require at any given time. Start with the licenses your organisation needs right now and add more users and as your needs evolve. This product can either be deployed in SAP HANA Enterprise Cloud or on premise, which requires a perpetual license.

 

image

Contact your local SAP account executive for additional subscription options

image

For general licensing information, consult “Licensing SAP Software: A Guide for Buyers”

Implementation

Ensure a successful implementation and maximise your ROI with information resources that support the different phases of SAP Enterprise Threat Detection – from planning and installation to operation.

Previous

Plan your installation

Refer to the “SAP Enterprise Threat Detection Implementation Guide” for important information about installation and upgrade planning.

Confirm that you have a license key

To request permanent license keys, you need authorisation under myProfile.* To extend your authorisation, please contact an SAP user administrator.*

Download the software

Download the SAP Enterprise Threat Detection software installation package by visiting the SAP Support Portal.*

Next
image

Need additional help with your implementation? Contact SAP Digital Business Services

image
Find an SAP partner to help with your implementation

Complete the installation steps

Refer to “Master Guide: SAP Enterprise Threat Detection” for a step-by-step overview of the installation process, including a list of required tools and associated documentation.

What’s New – Release Notes

Learn what is new and what has changed since the last release

image

Need additional help with your implementation? Contact SAP Digital Business Services

image
Find an SAP partner to help with your implementation
Previous

Manage your SAP applications

Refer to “SAP Enterprise Threat Detection Operations Guide” to learn how to operate and customise the configuration of the application.

Enhance your knowledge of SAP Enterprise Threat Detection

Browse for SAP Enterprise Threat Detection resources in the SAP Community Network (SCN) and train when and where it’s convenient for you.

Next
image

Need additional help with your implementation? Contact SAP Digital Business Services

image
Find an SAP partner to help with your implementation

Upgrade

Plan and carry out a successful upgrade to the latest release of SAP Enterprise Threat Detection – so you can bring significant performance, sizing advantages, functional improvements, and identification of the latest attack patterns.

Previous

Identify the upgrade paths

Download the “SAP Enterprise Threat Detection Product Availability Matrix” to review upgrade paths for the application.

Download the matrix now*

Plan landscape changes

The Landscape Planner lets you visualise your existing system landscape, simulate changes, and analyse the impact. 

Use the planner*

Identify dependencies

Use the Upgrade Dependency Analyser to determine if your upgrade will have an impact on your other systems.

Access the analyser

Size the implementation

Refer to the “SAP Enterprise Threat Detection Sizing Guide” to help you select an economically balanced system based on your requirements.

See the sizing guide

Next
image

Need additional help with your implementation? Contact SAP Digital Business Services

image
Find an SAP partner to help with your implementation
Previous

Complete the upgrade steps

Refer to the “SAP Enterprise Threat Detection Upgrade Master Guide” for an overview of the upgrade process, including a list of required tools and associated documentation.

View the guide

Ask the community

Visit the SAP Enterprise Threat Detection community for the latest technology news and updates. Ask questions, post comments, and discuss issues. 

Visit the community

Next
image

Need additional help with your implementation? Contact SAP Digital Business Services

image
Find an SAP partner to help with your implementation

Expert Community

Connect with SAP experts and get the latest news and views on SAP Enterprise Threat Detection implementations, upgrades, innovations, and best practices. 

Previous

SAP Enterprise Threat Detection 1.0, Support Package 5, Available

The latest support package brings new attack detection patterns, as well as ETD security notes and anomaly patterns.

KuppingerCole Analysts: Real-Time Protection for All Environments

Move beyond preventative actions toward detection and response, which apply beyond network and operating system levels. 

 
 

An Integrated Approach to Identifying Security Risks

Martin Plummer explains how the latest updates to SAP Enterprise Threat Detection enable integrated analysis across your landscape.

Next
Back to top