2
IDENTIFY, ANALYZE, AND PROTECT AGAINST CYBER THREATS SAP ENTERPRISE THREAT DETECTION HARDENS YOUR CYBER DEFENSES Advanced persistent cyber threats are more pervasive and sophisticated than ever before. Oſten, the greatest cyber threat comes from within. Traditional security measures are not able to address the complexity of today’s cyber threats. Current solutions typically monitor critical business system at the infrastructure layer only. This leaves glaring vulnerabilities. When your business systems are responsible for managing critical national security data, a breach is simply not an option. DESIGNED TO MAXIMIZE SECURITY OF SAP TECHNOLOGY For organizations that rely on SAP applications, SAP Enterprise Threat Detection can offer vastly improved security capabilities to detect and mitigate both internal and external threats on your critical business systems. SAP Enterprise Threat Detection is engineered to detect cyber threats on the application level and monitor your SAP landscape based on pre-delivered SAP patterns, to protect business critical systems and data. KEY FEATURES z Monitor your landscape based on pre-delivered SAP patterns z Create patterns without programming for customer-specific requirements z Detect suspicious activities in seconds, not days or months, to prevent damage z Enhance the events via log learning techniques z Find out what happened aſter a known attack to take the right action z Analyze the impact of a detected attack on the business system z Based on SAP HANA®, it correlates security events in real time www.sapns2.com WAVE OF CHANGE SAP NS2 ® SOLUTIONS SUMMIT

IDENTIFY, ANALYZE, AND PROTECT AGAINST CYBER THREATS - SAP … · security data, a breach is simply not an option. DESIGNED TO MAXIMIZE SECURITY OF SAP TECHNOLOGY For organizations

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IDENTIFY, ANALYZE, AND PROTECT AGAINST CYBER THREATS - SAP … · security data, a breach is simply not an option. DESIGNED TO MAXIMIZE SECURITY OF SAP TECHNOLOGY For organizations

IDENTIFY, ANALYZE, AND PROTECT AGAINST CYBER THREATS

SAP ENTERPRISE THREAT DETECTION HARDENS YOUR CYBER DEFENSES

Advanced persistent cyber threats are more pervasive and sophisticated than ever before. Often, the greatest cyber threat comes from within. Traditional security measures are not able to address the complexity of today’s cyber threats. Current solutions typically monitor critical business system at the infrastructure layer only. This leaves glaring vulnerabilities. When your business systems are responsible for managing critical national security data, a breach is simply not an option.

DESIGNED TO MAXIMIZE SECURITY OF SAP TECHNOLOGY

For organizations that rely on SAP applications, SAP Enterprise Threat Detection can offer vastly improved security capabilities to detect and mitigate both internal and external threats on your critical business systems. SAP Enterprise Threat Detection is engineered to detect cyber threats on the application level and monitor your SAP landscape based on pre-delivered SAP patterns, to protect business critical systems and data.

KEY FEATURES

z Monitor your landscape based on pre-delivered SAP patterns

z Create patterns without programming for customer-specific requirements

z Detect suspicious activities in seconds, not days or months, to prevent damage

z Enhance the events via log learning techniques

z Find out what happened after a known attack to take the right action

z Analyze the impact of a detected attack on the business system

z Based on SAP HANA®, it correlates security events in real time

www.sapns2.com

WAVE OF CHANGESAP NS2® SOLUTIONS SUMMIT

Page 2: IDENTIFY, ANALYZE, AND PROTECT AGAINST CYBER THREATS - SAP … · security data, a breach is simply not an option. DESIGNED TO MAXIMIZE SECURITY OF SAP TECHNOLOGY For organizations

TRANSFORMATIVE BENEFITS

z Efficiently analyze and correlate logs – analyze logs from any and all systems to get a complete picture of the activities taking place in your landscape.

z Perform forensic investigations and discover new patterns – analyze an existing suspicion about an ongoing attack or analyze historical log and security data in forensic investigations or as part of a regulatory compliance process.

z Enable custom integration and configuration – open API for customized integration of other systems and components for your specific needs.

z Tap into the power of a real-time data platform – SAP Event Stream Processor combined with the SAP HANA® platform to enable you to process and analyze any type of log data.

z Find software–specific threats related to known attacks – Use log data from software to analyze suspicious activity.

POWERED BY SAP HANA® BACKED BY SAP NS2

SAP NS2 uses SAP HANA® to fuse cyber data from multiple sources into a single analytics environment through an in-memory data management and analytical platform. This advanced computing capability is enhanced by expert support from the SAP NS2 team. Our people are trusted at the highest echelons of government, giving groups at the tactical edge, as well as enterprise-level national security organizations, an offset advantage in the cyber domain.

Email: [email protected]

Phone: 877-972-7672

Website: www.sapns2.com

© 2016 SAP National Security Services (SAP NS2®). All rights reserved.No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permis sion of SAP NS2. The information contained herein may be changed without prior notice. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE in Germany and other countries. Please see www.sap. com/corporate-en/legal/copyright/index.epx#trademark for additional trademark information and notices.

STRENGTHEN YOUR CYBER DEFENSES

Contact us to learn more about SAP Enterprise Threat Detection, delivered and supported by the trusted experts at SAP NS2.

Structured/Unstructured Data Sources

RAM MEMORY

Open APIs

IN-MEMORY DATABASE

TEXTANALYSIS

GEOSPATIAL

MACHINE-LEARNING

GRAPH