Search
Close this search box.

SIEM Connector ā€“ Connect Your SAP system with a SIEM solution now!

The use of SIEM solutions in companies constantly increases the level of security in many business divisions. However, the activities carried out in the SAP system must be kept in mind because these have a significant influence on the security level.

Our SIEM connector enables customers to close gaps in the compliance with security requirements and eliminate the blind spot of real-time monitoring. The appropriate framework for monitoring plays an important role, especially with regard to constantly growing security requirements, legal extensions and use cases from different company areas. Based on our many years of SAP expertise, we offer predefined logs and analyzes, which can be expanded in individual workshops and tailored to the company’s own specifications.

Your Contact

Marc Spitzer
Cybersecurity Management
[email protected]

Security Monitoring
SIEM Connector

Connect your SAP system with your own SIEM solution now and increase the security and transparency in your company!

  • Automatic creation of system-related security concepts at the push of a button
  • Checking the SAP system against security requirements (monitoring and validation)
  • Integration and development of a holistic security monitoring
  • Configurable SIEM cockpit
  • Flexible SAP log extractions
  • Integration of checks from the Security Architect (concept comparison)
  • Authorizations – Assignment of critical profiles
  • System configuration ā€“ changes to security-related system settings
  • Data Leak ā€“ Viewing or extracting data from confidential databases
  • Critical Resources – Calling forbidden transactions, programs, and function modules
  • Debugging ā€“ Debugging in productive systems incl. changing variables
  • Log settings – Changing or disabling SAP logs to conceal critical processes
  • SAP Standard Users – Unauthorized access to SAP through SAP standard users
  • 100 % transparency of the SAP systems used in real time and in compliance with security requirements
  • 100 % flexibility in information processing in the SIEM
  • 100 % coverage of customer-specific requirements and specifications
  • 85 % less time to implement and connect the SAP system for real-time monitoring with the desired SIEM product

All information and services at a glance...

Holistic Security Monitoring with Xiting's SIEM Connector!

Your Challenge

Our solution

The SIEM Connector offers you the option of reading various SAP logs and forwarding them to your SIEM system in a standardized format. In addition, it offers the possibility of performing checks through the Security Architect and thus generating security-critical events, which would not be available in the logs.

There are several options available for transferring the logs to your SIEM solution, e.g., the syslog protocol or the transfer via file. If the logs are sent directly to the SIEM solution, they can be encrypted to prevent the information from being accessed while being transferred. The desired line format can also be freely selected, e.g., JSON or CEF format.

In order to make the connection of a complex and distributed SAP landscape as simple as possible, the SIEM connector can be operated in a central mode. A SAP ABAP central system is defined, which connects all other SAP systems in the landscape via RFC, controls the log and event collection and communicates with the SIEM system. This can be used as a central entry and connection point between the SIEM and SAP world, instead of having to set up a separate log collector for each individual SAP system.

In conjunction with a SIEM solution, the SIEM Connector manages to make even large SAP landscapes evaluable and transparent in real time. It is therefore a crucial component for the integration and the development of a holistic security monitoring system.

Are you interested in SIEM Connector?

Contact us for a non-binding offer!

Contact

Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]
Contact
Webinars

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now