
SAP Enterprise Threat Detection
Help neutralize cybersecurity threats with real-time SIEM intelligence
Take advantage of a security information and event management (SIEM) tool that uses real-time intelligence to help you comply with data protection and audit regulations and detect external and internal cybersecurity threats.
Key Benefits
Enhance security
Monitor and improve security to help keep systems secure in a continuously changing cybersecurity threat environment.
Gain insight into suspicious activities
Detect threats to your most valuable assets in your SAP applications to minimise
financial loss and legal and reputational damage.
Help neutralize threats
Gain transparency and simplify the analysis of suspicious activities, identify security gaps, and understand the impact to your business.
Protect software and business operations
Safeguard the operation of SAP applications and improve the continuity of your business.
Key Capabilities
Log correlation and analysis
- Analyse a vast quantity of log data and correlate information to get a complete picture of landscape activities
- Perform forensic threat detection to discover previously unknown attack variants
- Customise the integration of third-party systems and infrastructure components
- Use an exclusive kernel API to send logs directly to SAP Enterprise Threat Detection to make manipulation more difficult
Automated threat detection and alerting
- Find SAP software-specific threats related to known attacks by using attack detection patterns
- Create attack detection patterns without the need to code
- Conduct attack investigations based on generated alerts and publish alerts to enable integration with external processes and solutions
- Include user pseudonymization and resolution with special authorisation when evidence of an attack or misuse arises
Straightforward integration across SAP solutions
- Detect threats at the application server level and at the database level
- Integrate with SAP solutions across your entire IT landscape
Log correlation and analysis
- Analyse a vast quantity of log data and correlate information to get a complete picture of landscape activities
- Perform forensic threat detection to discover previously unknown attack variants
- Customise the integration of third-party systems and infrastructure components
- Use an exclusive kernel API to send logs directly to SAP Enterprise Threat Detection to make manipulation more difficult
Automated threat detection and alerting
- Find SAP software-specific threats related to known attacks by using attack detection patterns
- Create attack detection patterns without the need to code
- Conduct attack investigations based on generated alerts and publish alerts to enable integration with external processes and solutions
- Include user pseudonymization and resolution with special authorisation when evidence of an attack or misuse arises
Straightforward integration across SAP solutions
- Detect threats at the application server level and at the database level
- Integrate with SAP solutions across your entire IT landscape
See how our customers are succeeding with SAP
Strengthening critical IT against cyber threats
Find out how the Czech Republic's Ministry of Finance is achieving next-level cybersecurity for its state treasury systems.
Build a business case
Safeguard your business with higher standards
Read about the launch of the SAP Enterprise Threat Detection solution as a managed service.
Access a customer case story from Deloitte
Get insight from Deloitte’s firsthand experience with SAP Enterprise Threat Detection and learn how to make the most of the application at your business.
Increase visibility into your threat landscape
Learn how SAP and Splunk are working together to help secure the Intelligent Enterprise with new integrations and solutions for our joint customers, starting with SAP Enterprise Threat Detection.
Take a proactive stance against cyber threats
Learn how to better protect your business by identifying, analysing, and responding to growing threats to your core IT systems.
Technical Information
Installation and setup
Find out how you can seamlessly install this product with your existing IT landscape.
Configuration
Optimise configuration of this product with our comprehensive configuration guide.
Integration
Find out how you can seamlessly integrate this product with your existing IT landscape.
Event Spotlight
International conferences for GRC presented by SAP and TAC Events
Amsterdam, Netherlands
May 23-24, 2023
This year's conferences for GRC are co-located and in person. The two events will explore industry synergies with shared keynotes and a combined exhibition, allowing extended networking opportunites for attendees and more. As part of your ticket, you can move freely between both event agendas.
International Conference on Cyber Security and Data Protection
Learn how SAP customers, partners, and SAP experts use SAP solutions to build robust security measures to identify, analyse, and neutralize cyberattacks in their applications as they happen and before serious damage occurs.
Register now >
International Conference on Internal Controls, Compliance, and Risk Management
Discover how ogranizations are benefiting from process automation, simplified compliance and controls, continuous risk monitoring, and integrated digital transformation.
Register now >
Get Started
Jump-start your implementation and drive ROI by collaborating with industry experts, consultants, and support engineers throughout your journey.
Services
Transform your business quickly and effectively by taking advantage of our holistic service and support plans, expert consulting services, custom application development, proven best practices, and deep industry and technical knowledge.
Support
Help keep your SAP solutions running at peak performance with our IT experts and support services, including long-term plans, embedded teams, remote technology support, self-service portal, and innovation strategies.
Security and compliance
Focus on your business and customer relationships while keeping your data safe and reliable. SAP takes a proactive, predictive approach to maintaining compliance and data security in the cloud and within an on-premise data centre.