SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
SAP Enterprise Threat Detection 
Overview 
October 15, 2014 Public
Disclaimer 
This presentation outlines our general product direction and should not be relied on in making a 
purchase decision. This presentation is not subject to your license agreement or any other agreement 
with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to 
develop or release any functionality mentioned in this presentation. This presentation and SAP's 
strategy and possible future developments are subject to change and may be changed by SAP at any 
time for any reason without notice. This document is provided without a warranty of any kind, either 
express or implied, including but not limited to, the implied warranties of merchantability, fitness for a 
particular purpose, or non-infringement. SAP assumes no responsibility for errors or omissions in this 
document, except if such damages were caused by SAP intentionally or grossly negligent. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 2
Agenda 
The challenge 
The solution 
Ad hoc analysis in action 
Real-time security analysis in action 
Technical aspects 
Summary 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 3
The challenge
The threat environment is changing and becoming more dangerous 
Monitoring 
System 
Alarm System 
Anti-virus 
Traditional defenses no longer provide sufficient 
protection for business-critical software 
More exposure to risk: 
y Interconnected systems, mobile applications, … 
y Increased interest in SAP software by cybercriminals 
y Threats from inside nullify technical precautions 
Attackers will penetrate to your critical systems 
y What will you do then? 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 5
IT security organizations have serious blind spots 
Cybercriminals are working in the dark areas of 
the IT landscape 
What‘s going on? 
y Are there unexpected activities in the landscape? 
y Are there ongoing attacks? 
y Who is involved? 
y What end-to-end attack actions took place? 
y What was the damage? 
If you cannot look, you cannot see 
y If you cannot see, you cannot react effectively 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 6
What are the current threats? – A big-data solution is needed 
Vast quantity of security-relevant data 
y A tiny fraction is indicative of a particular 
threat 
You must react in real time to neutralize 
some attacks 
To react in real time you must: 
y Analyze in real time 
y Understand in real time 
y Get actionable information in real time 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 7
The solution
The missing piece to defend against cyber-attacks 
What does it do? 
y Automatically detects suspicious activities 
y Enables real-time analysis of security events 
How does it do it? 
y Stores security events in a central database 
y Enriches events with context information 
y Automatically evaluates attack detection patterns to 
generate alerts 
SAP Enterprise Threat Detection is based on 
SAP HANA and SAP Event Stream Processor 
SAP Enterprise Threat Detection 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 9
SAP Enterprise Threat Detection 
Main use cases 
Real-time security monitoring 
y Gather events from the landscape 
y Evaluate attack detection patterns 
y React on critical alerts 
y Gain an overview of the threat situation 
Ad hoc analysis 
y Analyze existing suspicions 
y Perform forensic investigation 
y Support compliance processes 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 10
Overview of how threat detection works 
SAP 
System 
Log Data 
Extractor 
SAP 
System 
Log Data 
Extractor SAP 
SAP 
System 
Log Data 
Extractor 
SAP 
System 
Log Data 
Extractor 
SAP Enterprise Threat Detection 
SAP 
System User Interface 
Log Data 
Extractor 
System 
Log Data 
Extractor 
SAP 
System 
Log Data 
Extractor 
Monitored 
Landscape 
Dashboard 
Alerts & KPIs 
Browsing & Analysis, 
Pattern Creation 
Pattern Configuration, 
Scheduling, & Monitoring 
Non-SAP 
System 
SAP HANA 
ESP 
(Event Stream 
Processor) 
Push 
Systems provide log data Normalize & enrich 
log data 
Evaluate & analyze 
Generate Alerts 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 11
Ad hoc analysis in action
Launch pad 
The launch pad is the main entry point to the 
tools in SAP Enterprise Threat Detection 
The Browse Events tile takes you to the tool 
where you do ad hoc analysis and create 
attack detection patterns 
http://<HANAserver>:<port>/sap/hana/uis/clients/ushell-app/shells/fiori/FioriLaunchpad.html?siteId=sap.secmon.ui.mobile.launchpad|ETDLaunchpad 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 13
Browsing events 
When you browse events you are essentially applying filters to 
the normalized log data that exists in the SAP HANA database 
y A series of filter is referred to as a path 
y Visualize the filtered data to look for standout values 
y Generate attack detection patterns from paths 
Example of finding an indication of attack 
y A number of attempts with different users against the same system, 
or with the same user against multiple systems, in a short period of 
time would be suspicious. 
y A security analyst has spotted unusual activity in some systems and 
decides to see what has been happening in the last day using the 
event browser 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 14
Example of browsing events 
Filter the events of the 
last day 
y 47 are failed logons 
Visualize the number of 
failed logons by terminal 
and user 
Select a user for further 
investigation 
y What has he been doing 
in the last hour? 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 15
Real-time security analysis in action
Launch pad 
The launch pad is the main entry point to the 
tools in SAP Enterprise Threat Detection 
You can navigate to tools for: 
y An overview of what is happening in the 
monitored landscape 
y Working with alerts and investigations 
y Configuring and executing patterns 
y Viewing the results of executed patterns 
http://<HANAserver>:<port>/sap/hana/uis/clients/ushell-app/shells/fiori/FioriLaunchpad.html?siteId=sap.secmon.ui.mobile.launchpad|ETDLaunchpad 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 17
Patterns generate alerts when an attack is detected 
Example of real-time analysis 
y An operator looks at recent activity in the 
landscape and from the dashboard tools 
determines that there is abnormal activity 
in a particular system 
y He groups significant alerts into an 
investigation and sets the severity to very 
high for follow up by an analyst 
y The analyst uses the browsing tools to 
determine the impact of the attack and 
decide on what countermeasures need to 
be taken 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 18
Working with alerts 
Use the dashboard to get an 
overview 
Find related alerts and assign to 
an investigation 
Analyze key events 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 19
Technical aspects
Pushing log data to SAP Enterprise Threat Detection 
SAP System 
Log 
Extractor 
JSON/REST 
request 
Non-SAP System 
SAP Enterprise Threat Detection 
HANA 
ESP 
REST 
Service 
Push 
Monitored systems: 
y Push their log data 
y Schedule the date transfer 
y Minimize transferred data by using 
deltas 
y ABAP systems have a log extractor 
to support the transfer of data 
Event Stream Processor (ESP): 
y Exposes a REST service to receive 
log data 
– Currently there is no pull service 
y Pushes the log data to the HANA 
database 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 21
Data model of SAP Enterprise Threat Detection 
Security 
Audit Log 
Business 
Transaction 
… Log 
Normalization of log data 
y Information content of the source is 
not reduced 
y Unified representation of time 
stamps, user identities, … 
y Maintenance of additional 
information 
Data model is generic enough to 
cover customer-specific 
scenarios 
User 
Change Log 
HTTP Log 
System Log 
Log 
Read 
Access Log 
Customer-specific 
Log 
Unified Log 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 22
Data model of SAP Enterprise Threat Detection 
How the normalized data looks 
Log Viewer 
y Technical view of the logs 
Header 
y Contains the most 
common fields for ABAP, 
network, and system logs 
Details 
y Contains additional 
information in Name and 
Value fields 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 23
Summary
SAP Enterprise Threat Detection 
A big-data solution to a serious security challenge 
Business goals… 
• Protect the integrity of my business processes 
• Prevent theft or manipulation of business data 
… translate into technical questions: 
• Are there unexpected activities in my landscape? 
• Who is the attacker? 
• What attack actions took place? 
BIG DATA ACQUIRE ANALYZE ACT REAL RESULTS 
Evaluate attack 
detection patterns. 
Browse & analyze. 
REAL TIME 
Vast amount of log 
data scattered across 
the landscape. 
Bring data together in 
one place with a 
common format. 
Lock user account, 
cut off connection, … 
Detect attacks early 
and prevent harm. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 25
Key takeaways 
Technological breakthroughs in processing big 
data enable real-time monitoring and analysis 
of large landscapes 
SAP HANA leads the way in real-time data 
processing 
SAP Enterprise Threat Detection leverages SAP 
HANA to greatly improve your overall system 
security 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 26
Further Information 
Community Network 
Get more information and updates 
SAP Enterprise Threat Detection 
http://scn.sap.com/docs/DOC-58501 
Security Community 
http://scn.sap.com/community/security 
Documentation on SAP Help Portal 
http://help.sap.com/sapetd 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 27
© 2014 SAP SE or an SAP affiliate company. All rights reserved. 
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an 
SAP affiliate company. 
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE 
(or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark 
information and notices. 
Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. 
National product specifications may vary. 
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its 
affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or 
SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing 
herein should be construed as constituting an additional warranty. 
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or 
release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future 
developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for 
any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking 
statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place 
undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 28

Contenu connexe

Tendances

Tech JAM 2016 TEC 11 実践 SAP HANA 大解剖
Tech JAM 2016 TEC 11 実践 SAP HANA 大解剖Tech JAM 2016 TEC 11 実践 SAP HANA 大解剖
Tech JAM 2016 TEC 11 実践 SAP HANA 大解剖Koji Shinkubo
 
SAP HANA Use Cases in 27 Industries
SAP HANA Use Cases in 27 IndustriesSAP HANA Use Cases in 27 Industries
SAP HANA Use Cases in 27 IndustriesSAP Asia Pacific
 
Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"panayaofficial
 
Sap bw4 hana architecture archetypes
Sap bw4 hana architecture archetypesSap bw4 hana architecture archetypes
Sap bw4 hana architecture archetypesLuc Vanrobays
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 trainingsuresh
 
Introduction to SAP Signavio
Introduction to SAP SignavioIntroduction to SAP Signavio
Introduction to SAP Signaviortoscanoevoluto
 
Core Archive for SAP Solutions
Core Archive for SAP SolutionsCore Archive for SAP Solutions
Core Archive for SAP SolutionsOpenText
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers Verbella CMG
 
SAP HANA 2.0 Cockpit Installation and Configuration.pdf
SAP HANA 2.0 Cockpit Installation and Configuration.pdfSAP HANA 2.0 Cockpit Installation and Configuration.pdf
SAP HANA 2.0 Cockpit Installation and Configuration.pdfYevilina Rizka
 
S4 HANA simplification
S4 HANA simplificationS4 HANA simplification
S4 HANA simplificationharsh shah
 
Informatica student meterial
Informatica student meterialInformatica student meterial
Informatica student meterialSunil Kotthakota
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture DesignPriyanka Aash
 
Best Practices to Administer, Operate, and Monitor an SAP HANA System
Best Practices to Administer, Operate, and Monitor an SAP HANA SystemBest Practices to Administer, Operate, and Monitor an SAP HANA System
Best Practices to Administer, Operate, and Monitor an SAP HANA SystemSAPinsider Events
 
Azure data platform overview
Azure data platform overviewAzure data platform overview
Azure data platform overviewJames Serra
 

Tendances (20)

SABSA overview
SABSA overviewSABSA overview
SABSA overview
 
Tech JAM 2016 TEC 11 実践 SAP HANA 大解剖
Tech JAM 2016 TEC 11 実践 SAP HANA 大解剖Tech JAM 2016 TEC 11 実践 SAP HANA 大解剖
Tech JAM 2016 TEC 11 実践 SAP HANA 大解剖
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
SAP HANA Platform
SAP HANA Platform SAP HANA Platform
SAP HANA Platform
 
SAP HANA Use Cases in 27 Industries
SAP HANA Use Cases in 27 IndustriesSAP HANA Use Cases in 27 Industries
SAP HANA Use Cases in 27 Industries
 
Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"
 
Sap bw4 hana architecture archetypes
Sap bw4 hana architecture archetypesSap bw4 hana architecture archetypes
Sap bw4 hana architecture archetypes
 
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0
 
Migration to sap s4 hana
Migration to sap s4 hanaMigration to sap s4 hana
Migration to sap s4 hana
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
Introduction to SAP Signavio
Introduction to SAP SignavioIntroduction to SAP Signavio
Introduction to SAP Signavio
 
Core Archive for SAP Solutions
Core Archive for SAP SolutionsCore Archive for SAP Solutions
Core Archive for SAP Solutions
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers
 
SAP HANA 2.0 Cockpit Installation and Configuration.pdf
SAP HANA 2.0 Cockpit Installation and Configuration.pdfSAP HANA 2.0 Cockpit Installation and Configuration.pdf
SAP HANA 2.0 Cockpit Installation and Configuration.pdf
 
S4 HANA simplification
S4 HANA simplificationS4 HANA simplification
S4 HANA simplification
 
Informatica student meterial
Informatica student meterialInformatica student meterial
Informatica student meterial
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Best Practices to Administer, Operate, and Monitor an SAP HANA System
Best Practices to Administer, Operate, and Monitor an SAP HANA SystemBest Practices to Administer, Operate, and Monitor an SAP HANA System
Best Practices to Administer, Operate, and Monitor an SAP HANA System
 
SAP ECC to S/4HANA Move
SAP ECC to S/4HANA MoveSAP ECC to S/4HANA Move
SAP ECC to S/4HANA Move
 
Azure data platform overview
Azure data platform overviewAzure data platform overview
Azure data platform overview
 

Similaire à SAP Enterprise Threat Detection Overview

Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP SystemsOnapsis Inc.
 
SAP HANA SPS09 - Smart Data Streaming
SAP HANA SPS09 - Smart Data StreamingSAP HANA SPS09 - Smart Data Streaming
SAP HANA SPS09 - Smart Data StreamingSAP Technology
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis Inc.
 
Deploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large ScaleDeploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large ScaleAchim D. Brucker
 
SAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeSAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeOnapsis Inc.
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 
SAP HANA Data Center Intelligence Overview
SAP HANA Data Center Intelligence OverviewSAP HANA Data Center Intelligence Overview
SAP HANA Data Center Intelligence OverviewSAP Technology
 
Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)Twan van den Broek
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...Tunde Ogunkoya
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security ConfigurationsOnapsis Inc.
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP SystemsOnapsis Inc.
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...akquinet enterprise solutions GmbH
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Incident_Management_with_SAPEHSM
Incident_Management_with_SAPEHSMIncident_Management_with_SAPEHSM
Incident_Management_with_SAPEHSMChristian Polivka
 
Cyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsCyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsOnapsis Inc.
 
Onapsis Security Platform: Detection and Response
Onapsis Security Platform: Detection and ResponseOnapsis Security Platform: Detection and Response
Onapsis Security Platform: Detection and ResponseOnapsis Inc.
 
The Future of Finance
The Future of FinanceThe Future of Finance
The Future of FinanceSAP Ariba
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 

Similaire à SAP Enterprise Threat Detection Overview (20)

Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP Systems
 
SAP HANA SPS09 - Smart Data Streaming
SAP HANA SPS09 - Smart Data StreamingSAP HANA SPS09 - Smart Data Streaming
SAP HANA SPS09 - Smart Data Streaming
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
 
Deploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large ScaleDeploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large Scale
 
SAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeSAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crime
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
SAP HANA Data Center Intelligence Overview
SAP HANA Data Center Intelligence OverviewSAP HANA Data Center Intelligence Overview
SAP HANA Data Center Intelligence Overview
 
Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Incident_Management_with_SAPEHSM
Incident_Management_with_SAPEHSMIncident_Management_with_SAPEHSM
Incident_Management_with_SAPEHSM
 
Cyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsCyber-attacks to SAP Systems
Cyber-attacks to SAP Systems
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
Onapsis Security Platform: Detection and Response
Onapsis Security Platform: Detection and ResponseOnapsis Security Platform: Detection and Response
Onapsis Security Platform: Detection and Response
 
The Future of Finance
The Future of FinanceThe Future of Finance
The Future of Finance
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 

Plus de SAP Technology

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1SAP Technology
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...SAP Technology
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...SAP Technology
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesSAP Technology
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...SAP Technology
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformSAP Technology
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...SAP Technology
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANASAP Technology
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Technology
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...SAP Technology
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsSAP Technology
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...SAP Technology
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...SAP Technology
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareSAP Technology
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP Technology
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANASAP Technology
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Technology
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESAP Technology
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP Technology
 

Plus de SAP Technology (20)

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processes
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANA
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer Products
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and Healthcare
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital Core
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial Data
 
Why SAP HANA?
Why SAP HANA?Why SAP HANA?
Why SAP HANA?
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASE
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance Features
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

SAP Enterprise Threat Detection Overview

  • 1. SAP Enterprise Threat Detection Overview October 15, 2014 Public
  • 2. Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to develop or release any functionality mentioned in this presentation. This presentation and SAP's strategy and possible future developments are subject to change and may be changed by SAP at any time for any reason without notice. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP assumes no responsibility for errors or omissions in this document, except if such damages were caused by SAP intentionally or grossly negligent. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 2
  • 3. Agenda The challenge The solution Ad hoc analysis in action Real-time security analysis in action Technical aspects Summary © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 3
  • 5. The threat environment is changing and becoming more dangerous Monitoring System Alarm System Anti-virus Traditional defenses no longer provide sufficient protection for business-critical software More exposure to risk: y Interconnected systems, mobile applications, … y Increased interest in SAP software by cybercriminals y Threats from inside nullify technical precautions Attackers will penetrate to your critical systems y What will you do then? © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 5
  • 6. IT security organizations have serious blind spots Cybercriminals are working in the dark areas of the IT landscape What‘s going on? y Are there unexpected activities in the landscape? y Are there ongoing attacks? y Who is involved? y What end-to-end attack actions took place? y What was the damage? If you cannot look, you cannot see y If you cannot see, you cannot react effectively © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 6
  • 7. What are the current threats? – A big-data solution is needed Vast quantity of security-relevant data y A tiny fraction is indicative of a particular threat You must react in real time to neutralize some attacks To react in real time you must: y Analyze in real time y Understand in real time y Get actionable information in real time © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 7
  • 9. The missing piece to defend against cyber-attacks What does it do? y Automatically detects suspicious activities y Enables real-time analysis of security events How does it do it? y Stores security events in a central database y Enriches events with context information y Automatically evaluates attack detection patterns to generate alerts SAP Enterprise Threat Detection is based on SAP HANA and SAP Event Stream Processor SAP Enterprise Threat Detection © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 9
  • 10. SAP Enterprise Threat Detection Main use cases Real-time security monitoring y Gather events from the landscape y Evaluate attack detection patterns y React on critical alerts y Gain an overview of the threat situation Ad hoc analysis y Analyze existing suspicions y Perform forensic investigation y Support compliance processes © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 10
  • 11. Overview of how threat detection works SAP System Log Data Extractor SAP System Log Data Extractor SAP SAP System Log Data Extractor SAP System Log Data Extractor SAP Enterprise Threat Detection SAP System User Interface Log Data Extractor System Log Data Extractor SAP System Log Data Extractor Monitored Landscape Dashboard Alerts & KPIs Browsing & Analysis, Pattern Creation Pattern Configuration, Scheduling, & Monitoring Non-SAP System SAP HANA ESP (Event Stream Processor) Push Systems provide log data Normalize & enrich log data Evaluate & analyze Generate Alerts © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 11
  • 12. Ad hoc analysis in action
  • 13. Launch pad The launch pad is the main entry point to the tools in SAP Enterprise Threat Detection The Browse Events tile takes you to the tool where you do ad hoc analysis and create attack detection patterns http://<HANAserver>:<port>/sap/hana/uis/clients/ushell-app/shells/fiori/FioriLaunchpad.html?siteId=sap.secmon.ui.mobile.launchpad|ETDLaunchpad © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 13
  • 14. Browsing events When you browse events you are essentially applying filters to the normalized log data that exists in the SAP HANA database y A series of filter is referred to as a path y Visualize the filtered data to look for standout values y Generate attack detection patterns from paths Example of finding an indication of attack y A number of attempts with different users against the same system, or with the same user against multiple systems, in a short period of time would be suspicious. y A security analyst has spotted unusual activity in some systems and decides to see what has been happening in the last day using the event browser © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 14
  • 15. Example of browsing events Filter the events of the last day y 47 are failed logons Visualize the number of failed logons by terminal and user Select a user for further investigation y What has he been doing in the last hour? © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 15
  • 17. Launch pad The launch pad is the main entry point to the tools in SAP Enterprise Threat Detection You can navigate to tools for: y An overview of what is happening in the monitored landscape y Working with alerts and investigations y Configuring and executing patterns y Viewing the results of executed patterns http://<HANAserver>:<port>/sap/hana/uis/clients/ushell-app/shells/fiori/FioriLaunchpad.html?siteId=sap.secmon.ui.mobile.launchpad|ETDLaunchpad © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 17
  • 18. Patterns generate alerts when an attack is detected Example of real-time analysis y An operator looks at recent activity in the landscape and from the dashboard tools determines that there is abnormal activity in a particular system y He groups significant alerts into an investigation and sets the severity to very high for follow up by an analyst y The analyst uses the browsing tools to determine the impact of the attack and decide on what countermeasures need to be taken © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 18
  • 19. Working with alerts Use the dashboard to get an overview Find related alerts and assign to an investigation Analyze key events © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 19
  • 21. Pushing log data to SAP Enterprise Threat Detection SAP System Log Extractor JSON/REST request Non-SAP System SAP Enterprise Threat Detection HANA ESP REST Service Push Monitored systems: y Push their log data y Schedule the date transfer y Minimize transferred data by using deltas y ABAP systems have a log extractor to support the transfer of data Event Stream Processor (ESP): y Exposes a REST service to receive log data – Currently there is no pull service y Pushes the log data to the HANA database © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 21
  • 22. Data model of SAP Enterprise Threat Detection Security Audit Log Business Transaction … Log Normalization of log data y Information content of the source is not reduced y Unified representation of time stamps, user identities, … y Maintenance of additional information Data model is generic enough to cover customer-specific scenarios User Change Log HTTP Log System Log Log Read Access Log Customer-specific Log Unified Log © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 22
  • 23. Data model of SAP Enterprise Threat Detection How the normalized data looks Log Viewer y Technical view of the logs Header y Contains the most common fields for ABAP, network, and system logs Details y Contains additional information in Name and Value fields © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 23
  • 25. SAP Enterprise Threat Detection A big-data solution to a serious security challenge Business goals… • Protect the integrity of my business processes • Prevent theft or manipulation of business data … translate into technical questions: • Are there unexpected activities in my landscape? • Who is the attacker? • What attack actions took place? BIG DATA ACQUIRE ANALYZE ACT REAL RESULTS Evaluate attack detection patterns. Browse & analyze. REAL TIME Vast amount of log data scattered across the landscape. Bring data together in one place with a common format. Lock user account, cut off connection, … Detect attacks early and prevent harm. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 25
  • 26. Key takeaways Technological breakthroughs in processing big data enable real-time monitoring and analysis of large landscapes SAP HANA leads the way in real-time data processing SAP Enterprise Threat Detection leverages SAP HANA to greatly improve your overall system security © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 26
  • 27. Further Information Community Network Get more information and updates SAP Enterprise Threat Detection http://scn.sap.com/docs/DOC-58501 Security Community http://scn.sap.com/community/security Documentation on SAP Help Portal http://help.sap.com/sapetd © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 27
  • 28. © 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 28