Log correlation and analysis
- Analyse a vast quantity of log data and correlate information to get a complete picture of landscape activities
- Perform forensic threat detection to discover previously unknown attack variants
- Customise the integration of third-party systems and infrastructure components
- Use an exclusive kernel API to send logs directly to SAP Enterprise Threat Detection to make manipulation more difficult
Automated threat detection and alerting
- Find SAP software-specific threats related to known attacks by using attack detection patterns
- Create attack detection patterns without the need to code
- Conduct attack investigations based on generated alerts and publish alerts to enable integration with external processes and solutions
- Include user pseudonymization and resolution with special authorisation when evidence of an attack or misuse arises
Straightforward integration across SAP solutions
- Detect threats at the application server level and at the database level
- Integrate with SAP solutions across your entire IT landscape