SAP Brief SAP Technology SAP Enterprise Threat Detection Objectives Protect Your Connected Business Systems by Identifying and Analyzing Threats
Prevent security breaches Prevent security breaches Are your processes supported by heterogeneous landscapes, interconnected systems, and mobile and cloud-based applications? Does your businesscritical information rely on SAP software? If so, key to your continued success is thwarting cybercriminals that are increasingly attempting to compromise your system landscapes. Enter the SAP Enterprise Threat Detection application. Your company recognizes that you need more than perimeter security to protect assets. Your IT organization has firewalls, intrusion detection, encryption, and so on in place, and your development organization ensures that its custom code is checked for vulnerabilities. But traditional security and event management solutions need to be complemented by important capabilities: insight into SAP business software, as well as sheer performance to process the vast amount of securityrelevant data. Threats from outside the company exist even with the most up-to-date protection. Attacks from within perimeter defenses, especially by internal personnel, are particularly dangerous, and social engineering can often nullify technical precautions. SAP Enterprise Threat Detection gives insight into suspicious activities in your SAP software centric landscape and enables you to identify breaches as they occur. Thus, you can react in time to neutralize danger and prevent critical damage to your business. 2 / 9
SAP Enterprise Threat Detection lets you take extensive advantage of log data, which provides a wealth of information on what happened within an application, a database, an operating system, or a network component. To make analysis easier, log data is supplemented by contextual data, such as the role of a system or the location of an IT asset. Using this combination, you can scout for cyberattacks on valuable assets. With threats coming from both inside and outside your organization, you want to know what is going on in the landscape. Are there unexpected activities? If so, what do these mean? Are they indicating an ongoing attack? If so, who is attacking? What immediate actions can you take to neutralize the attack? When you are analyzing the impact, how can you know what end-to-end actions took place and what was the resulting damage? To help you answer these questions, SAP Enterprise Threat Detection includes SAP Event Stream Processor combined with the SAP HANA platform to enable you to process and analyze any type of log data. Keep watch over your critical business data. Detect and analyze threats in real time. 3 / 9
The logs alone in a system landscape can easily be producing gigabytes of data each hour. Before you process it, you can extract the log data from each system and transfer it to SAP Event Stream Processor. Each SAP software system that relies on the ABAP programming language includes functionality that simplifies the extraction of log data. In addition, an open interface in SAP Enterprise Threat Detection lets you connect any other systems, be they applications or network components, such as proxies, routers, or switches. Thus, you can analyze logs from all systems to get a complete picture of the activities taking place in your landscape. SAP Event Stream Processor normalizes and enriches the log data coming in and pushes the data to the SAP HANA database, where you can correlate and analyze events from different logs and different systems. The survival of your business can depend on a well-founded decision made in seconds. 4 / 9
Using log data from SAP software such as user change logs, security audit logs, the remote function call (RFC) gateway log, and transaction logs you can analyze suspicious activity. Since attacks leave trails in logs, and these can be detected if you know what to look for, attack detection patterns are a key element of the application. These patterns encode how certain attacks show up in the logs. An alert is generated if the pattern appears in incoming log data. SAP continuously updates attack patterns, so SAP Enterprise Threat Detection helps you keep the rate of false positives low. And you can still configure the alerts to tune them for your specific situation. Because patterns are already available, just connect your software systems and choose which patterns are relevant for your system landscape. Then simply detect attacks on your SAP software, evidence of which would otherwise remain buried in the mass of log data. Of course, you can also develop new rules according to your own knowledge about possible attacks, incorporating additional logs you may have connected to SAP Enterprise Threat Detection. Take advantage of the powerful scanning functionality SAP uses to identify vulnerabilities in its own software systems. 5 / 9
In addition to using SAP Enterprise Threat Detection for real-time security monitoring, you can also perform ad hoc analysis. You can analyze an existing suspicion about an ongoing attack or analyze historical log and security data in forensic investigations or as part of a regulatory compliance process. The original log data on the connected systems is not affected by the extraction process, so you benefit from normalized and enriched data on a central management system. This lets you browse and analyze in real time while retaining the ability to return to the unaltered data if necessary for legal reasons. Real-time analysis of large amounts of data lets expert users experience almost instantaneous responses to complex queries and thereby follow leads that would previously have been hidden. Although SAP Enterprise Threat Detection comes with a palette of predefined attack detection patterns, browsing the data as part of a forensic investigation can uncover previously unknown attacks or attack variants. In this case, you can convert the results of the investigation into new attack detection patterns and store these for reuse in automated monitoring. 6 / 9
In an SAP software centric landscape, key business data is usually with the applications that are based on the application server for ABAP, and SAP Enterprise Threat Detection covers these business-critical systems. However, the application is open at both ends for customized integration of other systems and components for your specific needs. So, for example, there is a public application programming interface (API) that allows you to collect log data from non-sap software and from infrastructure components such as routers or proxies. And after alerts have been generated, a public API enables integration of SAP Enterprise Threat Detection in any incident management system or overall security solution you may have. You can further configure the solution for your needs by uploading contextual information regarding, for example, the landscape and users, to help with analysis of threats and tracing attack paths. Configurable situational dashboards and graphical navigation combine to make the security operator s job easier and more efficient. The application s open platform lets you gather and analyze log data from both SAP and non-sap software. 7 / 9
Safeguard your business Safeguard your business No current defense that you put around your valuable data assets can guarantee against future threats. With SAP Enterprise Threat Detection, you can monitor your systems for suspicious activities and be alerted in time to react effectively. The powerful real-time data processing combination of SAP Event Stream Processor and SAP HANA enables you to readily and efficiently identify security lapses in your landscape and build confidence in your overall security solution. A continuously changing threat environment requires a powerful and flexible security solution. 8 / 9
www.sap.com Objectives Summary The interconnected nature of modern business systems means that successful companies with critical business on SAP software effectively manage exposure to external and internal threats. The SAP Enterprise Threat Detection application helps you identify the real attacks as they are happening and analyze the threats quickly enough to neutralize them before serious damage occurs. Objectives Prevent security breaches from affecting the integrity of business processes such as by theft or manipulation of business data Gain insight into what is happening in your IT landscape A real-time to efficiently monitor SAP software centric landscapes Efficient analysis and correlation of the vast quantity of log data that systems and applications generate Integration with SAP and non-sap software systems and components Readily and efficiently identify security lapses in the landscape Detect threats in real time Optimally protect your key business data Learn More Visit www.sap.com/pc/tech/application -foundation-security/software/security -solutions-overview.html. 9 / 9 Studio SAP 31974enUS (14/07)
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG (or an SAP affiliate company) in Germany and other countries. Please see http://www.sap.com/corporate-en/legal/copyright/index.epx#trademark for additional trademark information and notices. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP AG or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP AG or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP AG or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP AG or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP AG s or its affiliated companies strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP AG or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions.