Search
Close this search box.

Centralized Security Monitoring

Protecting SAP systems from cyberthreats has become an increasingly difficult and complex task due to the networked nature of modern ERP platforms.

Xiting’s centralized security monitoring solutions enable organizations to better defend SAP systems against internal and external threats and to mitigate common vulnerabilities including dangerous RFCs, changes to security-relevant configuration and security parameters, critical authorizations assigned to your users (e.g. SAP_ALL), attempted commands on the operating system level on your SAP gateway, and many more. 

Your Contact

Alessandro Banzer
Cyber Security Expert
[email protected]

Interested in Xitng's SIEM COnnector?

Get more information here!

Xiting's solution at a glance...

On-Demand Video

In this webinar, we’ll introduce you to Xiting’s centralized security monitoring solutions that enable organizations to better defend SAP systems against internal and external threats and to mitigate common vulnerabilities.

Holisitic Security Monitoring

The SIEM Connector offers you the option of reading out various SAP logs and forwarding them to your SIEM system in a standardized format. In addition, it offers you the option of performing checks through the Security Architect, a powerful module of the XAMS, and thus, to generate safety-critical events, which are not in the logs.

There are several options available for transferring the logs to a SIEM system, such as: the syslog protocol or the transfer via file. If the logs are sent directly to the SIEM system, they can be encrypted to prevent the logs from being accessed while they are being transferred. The desired line format can also be freely selected, e.g. JSON or CEF format.

In order to make the connection of a complex and distributed SAP landscape as simple as possible, the SIEM connector can be operated in a central mode. A SAP ABAP central system is defined, which connects all other SAP systems in the landscape via RFC, controls the log and event collection and communicates with the SIEM system. This can be used as a central entry and connection point between the SIEM and SAP world, instead of having to set up a separate log collector for each individual SAP system.

In conjunction with a SIEM system, the SIEM Connector manages to make even large SAP landscapes evaluable and transparent in real time. It is therefore a crucial component for the integration and the development of a holistic security monitoring system.

Why use our SIEM Connector?

Contact

Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]
Contact
Webinars

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now