Centralized Security Monitoring

Protecting SAP systems from cyberthreats has become an increasingly difficult and complex task due to the networked nature of modern ERP platforms.

Xiting’s centralized security monitoring solutions enable organizations to better defend SAP systems against internal and external threats and to mitigate common vulnerabilities including dangerous RFCs, changes to security-relevant configuration and security parameters, critical authorizations assigned to your users (e.g. SAP_ALL), attempted commands on the operating system level on your SAP gateway, and many more. 

Your Contact

Alessandro Banzer
Security Monitoring Expert
[email protected]

Attend our webinar to learn how Xiting’s solutions can centrally monitor your hybrid SAP landscape. We will also cover how you can connect your SAP system with an existing SIEM solution or email notification system, and integrate custom as well as standard SAP logs.

By attending the webinar, you will receive a Fact Sheet with the most important SAP logs and security configuration settings to look out for.

In this webinar, learn how the Xiting solutions can centrally monitor your hybrid SAP landscape with optional integration to your SIEM system, and see the wide variety of fully customizable security checks. Understand how the solutions can help you to integrate custom as well as standard SAP logs into your SIEM solution, and/or raise email alerts in case of any findings.

October 2812:00 - 1:00pm EST1 h


Xiting’s solution at a glance…

holisitc Security Monitoring with Xiting's SIEM Connector

The SIEM Connector offers you the option of reading out various SAP logs and forwarding them to your SIEM system in a standardized format. In addition, it offers you the option of performing checks through the Security Architect and thus, to generate safety-critical events, which are not in the logs.

There are several options available for transferring the logs to a SIEM system, such as: the syslog protocol or the transfer via file. If the logs are sent directly to the SIEM system, they can be encrypted to prevent the logs from being accessed while they are being transferred. The desired line format can also be freely selected, e.g. JSON or CEF format.

In order to make the connection of a complex and distributed SAP landscape as simple as possible, the SIEM connector can be operated in a central mode. A SAP ABAP central system is defined, which connects all other SAP systems in the landscape via RFC, controls the log and event collection and communicates with the SIEM system. This can be used as a central entry and connection point between the SIEM and SAP world, instead of having to set up a separate log collector for each individual SAP system.

In conjunction with a SIEM system, the SIEM Connector manages to make even large SAP landscapes evaluable and transparent in real time. It is therefore a crucial component for the integration and the development of a holistic security monitoring system.

Why use our SIEM connector?

Are you interested in Security Monitoring?

Get in touch with us!


Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 9888 155
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]