{"id":16672,"date":"2021-09-10T09:11:56","date_gmt":"2021-09-10T13:11:56","guid":{"rendered":"https:\/\/www.xiting.de\/?page_id=16672"},"modified":"2026-02-24T13:55:44","modified_gmt":"2026-02-24T12:55:44","slug":"siem-connector","status":"publish","type":"page","link":"https:\/\/xiting.com\/de\/xams\/siem-connector\/","title":{"rendered":"SIEM Connector"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"16672\" class=\"elementor elementor-16672\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2abeb56 elementor-section-stretched page-header elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2abeb56\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-90887c2\" data-id=\"90887c2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bea2a80 elementor-widget elementor-widget-heading\" data-id=\"bea2a80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><span class=\"xiting-rot\">SIEM Connector f\u00fcr Ihre SAP-Systeme<\/span> <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8494ab5 elementor-widget elementor-widget-text-editor\" data-id=\"8494ab5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Angriffe auf SAP ERP-Systeme nehmen vermehrt zu, werden jedoch oft gar nicht oder erst zu sp\u00e4t aufgedeckt. Die L\u00f6sung hierf\u00fcr bieten SIEM-Systeme, welche Softwarelogs in Echtzeit \u00fcberwachen und bei kritischen Ereignissen einen Alarm ausl\u00f6sen.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7d3b3b2 elementor-section-stretched elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d3b3b2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d118818\" data-id=\"d118818\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ea58f80 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"ea58f80\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-772f255\" data-id=\"772f255\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-246d891 elementor-widget elementor-widget-heading\" data-id=\"246d891\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"xiting-rot\">SIEM Connector<\/span> \u2013 Verbinden Sie jetzt ihr SAP-System mit einer SIEM-L\u00f6sung!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-665a201 elementor-widget elementor-widget-text-editor\" data-id=\"665a201\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mit dem Einsatz von SIEM-L\u00f6sungen steigt in vielen Unternehmensbereichen das Sicherheitsniveau stetig an. Was hierbei jedoch nicht vergessen werden darf und einen relevanten Einfluss hat, sind die Aktivit\u00e4ten, die im SAP-System durchgef\u00fchrt werden.<\/p><p>Mit unserem SIEM-Connector erm\u00f6glichen wir unseren Kunden diese L\u00fccke zu schlie\u00dfen und den blinden Fleck der Echtzeit\u00fcberwachung zu eliminieren. Besonders im Hinblick auf stetig wachsende Anforderungen, gesetzliche Erweiterungen und Use Cases aus unterschiedlichen Unternehmensbereichen spielt die passende Grundlage zur \u00dcberwachung eine wichtige Rolle. Hierzu bieten wir vordefinierte Logs und Analysen unserer langj\u00e4hrigen SAP-Expertise, die in individuellen Workshops erweitert und auf Unternehmenseigene Vorgaben erg\u00e4nzt werden k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10312f0 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10312f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Integration von SAP-Landschaften in SIEM-Systeme<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> Vermeidung von exponentiell hohen Kosten im SIEM-Betrieb <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">250+ Compliance- &amp; Bedrohungs-Checks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> 50+ komplexe Angriffserkennungs-Pattern f\u00fcr Echtzeit-Log-Analysen <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5254690 elementor-widget elementor-widget-spacer\" data-id=\"5254690\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-872b294 elementor-widget elementor-widget-image\" data-id=\"872b294\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"303\" src=\"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-1024x485.png\" class=\"attachment-large size-large wp-image-16678\" alt=\"\" srcset=\"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-1024x485.png 1024w, https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-300x142.png 300w, https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-768x364.png 768w, https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-1536x728.png 1536w, https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-2048x971.png 2048w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d4b8309\" data-id=\"d4b8309\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74a7d14 elementor-section-stretched elementor-section-content-middle xiting-cta-banner elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74a7d14\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f0bef8\" data-id=\"6f0bef8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c9d8aa elementor--h-position-center elementor--v-position-middle elementor-arrows-position-inside elementor-pagination-position-inside elementor-widget elementor-widget-slides\" data-id=\"1c9d8aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition&quot;:&quot;slide&quot;,&quot;transition_speed&quot;:500}\" data-widget_type=\"slides.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"fadeInUp\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-6c0eb26 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\" aria-label=\"lock\"><\/div><div class=\"elementor-background-overlay\"><\/div><a class=\"swiper-slide-inner\" href=\"https:\/\/xiting.com\/de\/sap-knowledge\/sicherheit\/sap-security-monitoring\/\"><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">Security Monitoring<\/div><div class=\"elementor-slide-description\">Profitieren Sie von einer zentralen Monitoring-L\u00f6sung in Kombination mit Echtzeit-Angriffserkennung f\u00fcr Ihre SAP-Systeme!<\/div><div  class=\"elementor-button elementor-slide-button elementor-size-sm\">Mehr erfahren<\/div><\/div><\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c44011b elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c44011b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-391397a1\" data-id=\"391397a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a7c900c elementor-widget elementor-widget-heading\" data-id=\"2a7c900c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Security Monitoring<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c227f1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3c227f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fa4b3bc elementor-widget elementor-widget-heading\" data-id=\"5fa4b3bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">SIEM Connector<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e1f7fca elementor-widget elementor-widget-text-editor\" data-id=\"3e1f7fca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #333333;\">Verbinden Sie jetzt Ihr SAP-System mit Ihrer eigenen SIEM-L\u00f6sung und schaffen Sie dadurch mehr Sicherheit und Transparenz in Ihrem Unternehmen!<br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-26f810eb\" data-id=\"26f810eb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be3d17d elementor-widget elementor-widget-toggle\" data-id=\"be3d17d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1991\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1991\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"><span class=\"xiting-rot\"<=\"\" span=\"\">Welche Funktionalit\u00e4ten gibt es?<\/span><\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1991\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1991\"><ul><li><span style=\"color: #000000;\">Automatische Erstellung systembezogener Sicherheitskonzepte per Knopfdruck<\/span><\/li><li><span style=\"color: #000000;\">Pr\u00fcfung des SAP-Systems gegen Sicherheitsvorgaben (Monitoring und Validierung)<\/span><\/li><li><span style=\"color: #000000;\">Integration und Aufbau eines ganzheitlichen Security Monitoring<\/span><\/li><li><span style=\"color: #000000;\">Konfigurierbares SIEM-Cockpit<\/span><\/li><li><span style=\"color: #000000;\">Flexible SAP Log-Extraktionen<\/span><\/li><li><span style=\"color: #000000;\">Integration von Checks aus dem Security Architect (Konzeptabgleich)<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1992\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1992\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"><span class=\"xiting-rot\"<=\"\" span=\"\">Was kann \u00fcberwacht werden?<\/span><\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1992\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1992\"><ul><li><span style=\"color: #000000;\">Berechtigungen &#8211; Zuweisung von kritischen Profilen<\/span><\/li><li><span style=\"color: #000000;\">Systemkonfiguration &#8211; \u00c4nderungen an sicherheitsrelevanten Systemeinstellungen<\/span><\/li><li><span style=\"color: #000000;\">Datenleck &#8211; Anzeigen oder Extrahieren von Daten aus vertraulichen Datenbanken<\/span><\/li><li><span style=\"color: #000000;\">Kritische Ressourcen &#8211; Aufruf von verbotenen Transaktionen, Programmen und Funktionsbausteinen<\/span><\/li><li><span style=\"color: #000000;\">Debugging &#8211; Debugging in produktiven Systemen inkl. \u00c4ndern von Variablen<\/span><\/li><li><span style=\"color: #000000;\">Logeinstellungen &#8211; Ver\u00e4ndern oder Abstellen von SAP-Logs, um kritische Vorg\u00e4nge zu verschleiern<\/span><\/li><li><span style=\"color: #000000;\">SAP Standard-Benutzer &#8211; Nicht genehmigtes Ausnutzen von SAP Standard-Benutzern<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1993\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1993\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"><span class=\"xiting-rot\"<=\"\" span=\"\">Wo liegen die Vorteile?<\/span><\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1993\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1993\"><ul><li><span style=\"color: #000000;\"><strong><span class=\"xiting-rot\">100 %<\/span><\/strong> Transparenz \u00fcber die genutzten SAP-Systeme in Echtzeit und die Einhaltung von Sicherheitsanforderungen<\/span><\/li><li><span style=\"color: #000000;\"><strong><span class=\"xiting-rot\">100 % <\/span><\/strong>Flexibilit\u00e4t in der Informationsverarbeitung im SIEM<\/span><\/li><li><span style=\"color: #000000;\"><strong><span class=\"xiting-rot\">100 %<\/span><\/strong> Abdeckung kundenspezifischer Anforderungen und Vorgaben<\/span><\/li><li><span style=\"color: #000000;\"><strong><span class=\"xiting-rot\">85 %<\/span><\/strong> weniger Zeitaufwand zur Implementierung und Connection des SAP-Systems zur Echtzeit\u00fcberwachung mit dem gew\u00fcnschten SIEM-Produkt<\/span><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d42d7d elementor-section-stretched elementor-section-content-middle xiting-cta-banner elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d42d7d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-1e55c31\" data-id=\"1e55c31\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c19e4eb elementor-widget elementor-widget-heading\" data-id=\"c19e4eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">SIEM Connector: Jetzt Flyer herunterlden<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a5b24b elementor-widget elementor-widget-text-editor\" data-id=\"0a5b24b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Holen Sie sich alle Informationen zu den Security-Monitoring-L\u00f6sungen von Xiting.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-a7ae389\" data-id=\"a7ae389\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2fe887c elementor-align-right button-auf-rot elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"2fe887c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/xiting.com\/wp-content\/uploads\/2024\/09\/de_2023_siem-framework-und-sa_flyer_v1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Flyer<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0dd53fe elementor-section-stretched elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0dd53fe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10bf8b2\" data-id=\"10bf8b2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89ee132 elementor-widget elementor-widget-heading\" data-id=\"89ee132\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ganzheitliches Security Monitoring mit dem SIEM Connector von Xiting!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-33cd75c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33cd75c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bac3159\" data-id=\"bac3159\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15cffd9 elementor-widget elementor-widget-text-editor\" data-id=\"15cffd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #cd1316;\">Ihre Herausforderung<\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-195e574 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"195e574\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Erstellung von revisionskonformen SAP-Sicherheitskonzepten ist aufw\u00e4ndig und erfordert Know-how<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">G\u00fcltigkeit und Aktualit\u00e4t von Sicherheitskonzepten bei stetig \u00e4ndernden Bedingungen in der Konfiguration der SAP-Systeme ist nicht zu gew\u00e4hrleisten<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">L\u00fccken und Fehler in den Sicherheitsanforderungen k\u00f6nnen durch Cyber-Kriminalit\u00e4t ausgenutzt werden k\u00f6nnen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ber\u00fccksichtigung von Compliance-Vorgaben und regulatorischen Standards (DSAG-Pr\u00fcfleitfaden, GDPR etc.) kann nicht gew\u00e4hrleistet werden<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\u00dcberpr\u00fcfung der Einhaltung von Sicherheitsanforderungen ist durch komplexe und vernetzte Systemlandschaften zeitintensiv und schwierig<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Unzureichende Anbindung von SAP-Systemen an Ihre SIEM-Systeme <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Keine standardisierte und reproduzierbare Vorgehensweise <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a03135a\" data-id=\"a03135a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a14ed49 elementor-widget elementor-widget-text-editor\" data-id=\"a14ed49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #cd1316;\">Unsere L\u00f6sung<\/span><\/h3><p>Der SIEM Connector bietet Ihnen die M\u00f6glichkeit diverse SAP Logs auszulesen und sie normalisiert in einem einheitlichen Format an Ihre SIEM-L\u00f6sung weiterzuleiten. Zus\u00e4tzlich bietet er die M\u00f6glichkeit, Analysen aus dem Security Architect durchzuf\u00fchren und somit sicherheitskritische Events zu generieren, die in den Logs nicht verf\u00fcgbar w\u00e4ren.<\/p><p>Zur \u00dcbertragung der Logs an Ihre SIEM-L\u00f6sung stehen mehrere M\u00f6glichkeiten zur Verf\u00fcgung, z. B. das syslog-Protokoll oder die \u00dcbertragung per Datei. Beim direkten \u00dcbertragen an die SIEM-L\u00f6sung k\u00f6nnen die Logs verschl\u00fcsselt werden, um ein Abgreifen der Informationen beim Senden zu Verhindern. Auch das gew\u00fcnschte Zeilenformat kann frei gew\u00e4hlt werden, wie z. B. JSON oder CEF-Format.<\/p><p>Um die Anbindung einer komplexen und verteilten SAP-Landschaft m\u00f6glichst einfach zu gestalten, kann der SIEM-Connector in einem Zentralmodus betrieben werden. Dabei wird ein SAP ABAP Zentralsystem definiert, welches alle weiteren SAP-Systeme der Landschaft per RFC anbindet, die Log- und Event-Kollektion steuert und mit Ihrer SIEM-L\u00f6sung kommuniziert. Hiermit kann ein zentraler Einstiegs- und Verbindungspunkt zwischen der SIEM- und SAP-Welt geschaffen werden, statt f\u00fcr jedes einzelne SAP-System einen separaten Log Collector einrichten zu m\u00fcssen.<\/p><p>Im Zusammenspiel mit Ihrer SIEM-L\u00f6sung schafft es der SIEM Connector selbst gro\u00dfe SAP-Landschaften in Echtzeit auswertbar und transparent zu machen. Somit ist er ein entscheidender Baustein f\u00fcr die Integration und den Aufbau eines <a href=\"https:\/\/xiting.com\/de\/security-monitoring\/\">ganzheitlichen Security Monitorings<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-787c490 elementor-widget elementor-widget-image\" data-id=\"787c490\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2058\" height=\"1149\" src=\"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/siem-connector.png\" class=\"attachment-full size-full wp-image-16676\" alt=\"SIEM Connector Abbildung\" srcset=\"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/siem-connector.png 2058w, https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/siem-connector-300x167.png 300w, https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/siem-connector-1024x572.png 1024w, https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/siem-connector-768x429.png 768w, https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/siem-connector-1536x858.png 1536w, https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/siem-connector-2048x1143.png 2048w\" sizes=\"(max-width: 2058px) 100vw, 2058px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8814e06 elementor-section-stretched elementor-section-content-middle xiting-cta-banner elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8814e06\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-89c1787\" data-id=\"89c1787\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d962bda elementor-widget elementor-widget-heading\" data-id=\"d962bda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sie interessieren sich f\u00fcr den SIEM Connector?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a18783 elementor-widget elementor-widget-text-editor\" data-id=\"8a18783\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Kontaktieren Sie uns f\u00fcr ein unverbindliches Angebot!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e2d558f\" data-id=\"e2d558f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8241316 elementor-align-right button-auf-rot elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"8241316\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/xiting.com\/de\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt kontaktieren<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SIEM Connector f\u00fcr Ihre SAP-Systeme Angriffe auf SAP ERP-Systeme nehmen vermehrt zu, werden jedoch oft gar nicht oder erst zu sp\u00e4t aufgedeckt. Die L\u00f6sung hierf\u00fcr bieten SIEM-Systeme, welche Softwarelogs in Echtzeit \u00fcberwachen und bei kritischen Ereignissen einen Alarm ausl\u00f6sen. SIEM Connector \u2013 Verbinden Sie jetzt ihr SAP-System mit einer SIEM-L\u00f6sung! Mit dem Einsatz von SIEM-L\u00f6sungen [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":107,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[],"class_list":["post-16672","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SIEM Connector f\u00fcr Ihre SAP-Systeme<\/title>\n<meta name=\"description\" content=\"Angriffe auf SAP-Systeme k\u00f6nnen durch SIEM-L\u00f6sungen verhindert werden, welche Softwarelogs in Echtzeit \u00fcberwachen und bei kritischen Ereignissen alarmieren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiting.com\/de\/xams\/siem-connector\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIEM Connector\" \/>\n<meta property=\"og:description\" content=\"SIEM Connector f\u00fcr Ihre SAP-Systeme Angriffe auf SAP ERP-Systeme nehmen vermehrt zu, werden jedoch oft gar nicht oder erst zu sp\u00e4t aufgedeckt. Die L\u00f6sung\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiting.com\/de\/xams\/siem-connector\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XitingAG\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T12:55:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration.png\" \/>\n\t<meta property=\"og:image:width\" content=\"5803\" \/>\n\t<meta property=\"og:image:height\" content=\"2751\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiting.com\/de\/xams\/siem-connector\/\",\"url\":\"https:\/\/xiting.com\/de\/xams\/siem-connector\/\",\"name\":\"SIEM Connector f\u00fcr Ihre SAP-Systeme\",\"isPartOf\":{\"@id\":\"https:\/\/xiting.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xiting.com\/de\/xams\/siem-connector\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xiting.com\/de\/xams\/siem-connector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-1024x485.png\",\"datePublished\":\"2021-09-10T13:11:56+00:00\",\"dateModified\":\"2026-02-24T12:55:44+00:00\",\"description\":\"Angriffe auf SAP-Systeme k\u00f6nnen durch SIEM-L\u00f6sungen verhindert werden, welche Softwarelogs in Echtzeit \u00fcberwachen und bei kritischen Ereignissen alarmieren.\",\"breadcrumb\":{\"@id\":\"https:\/\/xiting.com\/de\/xams\/siem-connector\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiting.com\/de\/xams\/siem-connector\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/xiting.com\/de\/xams\/siem-connector\/#primaryimage\",\"url\":\"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-1024x485.png\",\"contentUrl\":\"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-1024x485.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiting.com\/de\/xams\/siem-connector\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiting.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Xiting Authorizations Management Suite (XAMS)\",\"item\":\"https:\/\/xiting.com\/de\/?page_id=8108\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SIEM Connector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiting.com\/de\/#website\",\"url\":\"https:\/\/xiting.com\/de\/\",\"name\":\"Xiting\",\"description\":\"Your Expert for SAP Security\",\"publisher\":{\"@id\":\"https:\/\/xiting.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiting.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiting.com\/de\/#organization\",\"name\":\"Xiting\",\"url\":\"https:\/\/xiting.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/xiting.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg\",\"contentUrl\":\"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Xiting\"},\"image\":{\"@id\":\"https:\/\/xiting.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XitingAG\",\"https:\/\/www.linkedin.com\/company\/1345129\/\",\"https:\/\/www.instagram.com\/xiting.global\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SIEM Connector f\u00fcr Ihre SAP-Systeme","description":"Angriffe auf SAP-Systeme k\u00f6nnen durch SIEM-L\u00f6sungen verhindert werden, welche Softwarelogs in Echtzeit \u00fcberwachen und bei kritischen Ereignissen alarmieren.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiting.com\/de\/xams\/siem-connector\/","og_locale":"de_DE","og_type":"article","og_title":"SIEM Connector","og_description":"SIEM Connector f\u00fcr Ihre SAP-Systeme Angriffe auf SAP ERP-Systeme nehmen vermehrt zu, werden jedoch oft gar nicht oder erst zu sp\u00e4t aufgedeckt. Die L\u00f6sung","og_url":"https:\/\/xiting.com\/de\/xams\/siem-connector\/","og_site_name":"Xiting","article_publisher":"https:\/\/www.facebook.com\/XitingAG","article_modified_time":"2026-02-24T12:55:44+00:00","og_image":[{"width":5803,"height":2751,"url":"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/xiting.com\/de\/xams\/siem-connector\/","url":"https:\/\/xiting.com\/de\/xams\/siem-connector\/","name":"SIEM Connector f\u00fcr Ihre SAP-Systeme","isPartOf":{"@id":"https:\/\/xiting.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xiting.com\/de\/xams\/siem-connector\/#primaryimage"},"image":{"@id":"https:\/\/xiting.com\/de\/xams\/siem-connector\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-1024x485.png","datePublished":"2021-09-10T13:11:56+00:00","dateModified":"2026-02-24T12:55:44+00:00","description":"Angriffe auf SAP-Systeme k\u00f6nnen durch SIEM-L\u00f6sungen verhindert werden, welche Softwarelogs in Echtzeit \u00fcberwachen und bei kritischen Ereignissen alarmieren.","breadcrumb":{"@id":"https:\/\/xiting.com\/de\/xams\/siem-connector\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiting.com\/de\/xams\/siem-connector\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/xiting.com\/de\/xams\/siem-connector\/#primaryimage","url":"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-1024x485.png","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2021\/09\/security-architect-configuration-1024x485.png"},{"@type":"BreadcrumbList","@id":"https:\/\/xiting.com\/de\/xams\/siem-connector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiting.com\/de\/"},{"@type":"ListItem","position":2,"name":"Xiting Authorizations Management Suite (XAMS)","item":"https:\/\/xiting.com\/de\/?page_id=8108"},{"@type":"ListItem","position":3,"name":"SIEM Connector"}]},{"@type":"WebSite","@id":"https:\/\/xiting.com\/de\/#website","url":"https:\/\/xiting.com\/de\/","name":"Xiting","description":"Your Expert for SAP Security","publisher":{"@id":"https:\/\/xiting.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiting.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/xiting.com\/de\/#organization","name":"Xiting","url":"https:\/\/xiting.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/xiting.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","width":1,"height":1,"caption":"Xiting"},"image":{"@id":"https:\/\/xiting.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XitingAG","https:\/\/www.linkedin.com\/company\/1345129\/","https:\/\/www.instagram.com\/xiting.global\/"]}]}},"_links":{"self":[{"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/pages\/16672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/comments?post=16672"}],"version-history":[{"count":10,"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/pages\/16672\/revisions"}],"predecessor-version":[{"id":57789,"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/pages\/16672\/revisions\/57789"}],"up":[{"embeddable":true,"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/pages\/107"}],"wp:attachment":[{"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/media?parent=16672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiting.com\/de\/wp-json\/wp\/v2\/categories?post=16672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}