GET A FREE TRIAL

Cyber Defences up and running

Defending digital assets is a constant battle

If you are in charge of catching intruders and defending against vast armies of malware you are well aware of the problem with SAP®: despite the SAL (Security Audit Log) it still is kind of a black box.

You don’t see clearly what’s going on inside it. You cannot capture events and correlate them in SIEM, like you could for most other software. What you might have instead is a collection of single-aspect tools that give you fractions of the info you would really need, and require individual attention for updating and operation. Yet you are in charge of keeping it all safe.

What’s more, SAP® audit preparation and audit reporting is eating up way too much time.

You have a new weapon now: it’s called agileSI™

agileSI™ gives you what you most need for defending SAP®, both from outside attacks and inside corruption: transparency. It offers you a selection of data-extractors that fully integrate with current SIEM solutions. No more fractional solutions to watch over permissions or configuration parameters.

reporting.png
  • One solution to cover the majority of security relevant events in SAP®: changes in Permissions, user interaction, changes to table data or configuration, SAL, functional modules, etc.
  • Covers all flavours of SAP®: ABAP, HANA & JAVA
  • Full power of correlation with events outside of SAP® like host login events, malware detection, identity management systems in your SIEM
  • Lots of common practice use-cases ready to use instantly
front-end.png
  • Full power of your response processes applied to SAP®, e.g. automatic login blocking from malware infected clients, log level rising of privileged user accounts etc.
  • Easy and fast generation of compliance and audit reports
  • Preset dashboards for Security analysts, focussing on the information they need
  • Easy and fast to setup
  • No time for yet another tool, even if it integrates nicely with your current systems? Don’t worry: we offer you agileSI™ as managed service, taking the entire SAP® monitoring off your shoulders.
compliance-scr.png

Ad-hoc reporting

Web-based access to SAP® security-relevant information needed? HPE ArcSight Command Center provides access to log management functionality of HPE ArcSight ESM for ad-hoc reporting or forensic analysis.

access-control.png

Access Control

Access Control violations (or so-called SoD or Segregation of duties conflicts) are identified with a dedicated agileSI™ Extractor for Access Control. The drilldown information provides the Overall system landscape incidents, as well as the SAP® SID information as drilldown, and the Top 10 incidents, visualizing the most common configuration problem, plus technical details on the SoD conflicts.

“iT-CUBE established a SIEM-solution inclusive a SAP® security monitoring with agileSI™, which was easy to implement just like standard software. This relieved our personnel capacity remarkably as a special project team was not necessary. Because of this simplicity the project just went through during the normal production activities.”

Alexander Maute

Manager, IT Infrastructure, Eissmann Group Automotive

Read the full success story