Centralized Security Monitoring: How to get a quick overview to protect your systems

23.2.202319:00 CET1 hour

Convert to my timezone

Attacks on SAP ERP systems are on the rise but are often not detected at all or only too late. How can such attacks be detected automatically, promptly and across system boundaries in order to initiate appropriate countermeasures in good time? The solution to this is offered by SIEM systems, which monitor software logs in real time and trigger an alarm when critical events occur, such as the assignment of critical authorization profiles. However, these systems are often not connected to SAP systems due to technical challenges. On the one hand, this presentation will show how you can get a system-wide overview of your current security configuration at the push of a button so that you can invest your time in securing your systems rather than analyzing them. We will also present the new standardized interface of the Xiting Authorizations Management Suite, which enables a connection between SAP systems and your SIEM system.

Webinar takeaways:
• How to get a security-related overview of your SAP landscape
• Benefits of a security monitoring tool within your SAP systems
• How to avoid pain points of security monitoring projects

Speaker: Andre Tenbuß

[gotowebinar_additional_output]
* Privacy Policy

By checking this box, you agree that your contact details may be used by Xiting for the purpose of marketing measures for information on our services, products, events, our company and topics on SAP security. You may revoke your consent at any time by contacting Xiting. All information provided here is used exclusively in accordance with Xiting’s Privacy Policy.

Contact

Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]
Contact
Webinars

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now