Skip to Content

Recent studies have shown that, in many places, SAP is the blind spot of IT security. Particularly the small and midsize companies using SAP applications lack the financial and human resources to protect themselves against the increasingly professional attacks. A sensible solution is offered by support from specialized SAP security providers.

To this end, SAP and Virtual Forge have strengthened their collaboration, in which the security solutions of both partners have always been the main focus. SAP Enterprise Threat Detection (SAP ETD) is a solution for analyzing IT security risks in SAP landscapes in real time, allowing fast and reliable detection of cyber attacks and fraud attempts.

With the new SAP ETD managed service from Virtual Forge, companies can benefit from the SAP security solution even if they lack the necessary internal know-how to run the solution themselves – which is ever more common in times of increasing shortages of skilled labor. The SAP ETD managed service bundles the expertise that Virtual Forge has gained as a service partner for implementing SAP ETD. Customers are supported during maintenance, configuration, and upgrades.

The core of the SAP ETD managed service, however, is continuous security monitoring in SAP environments. This involves constantly recording the log files of connected systems – including network components, databases, as well as SAP and non-SAP systems – which produces a huge amount of data. Virtual Forge takes over the task of analyzing these logs at regular intervals for customers and creating customized reports based on the analyses. This can take place daily or weekly – depending on the individual service agreement.

In any event, the regular reports give companies using SAP applications transparency on whether any security incidents took place in their SAP system landscape within a certain period and, if so, how often they took place and what caused them. At the same time, the customer receives concrete recommendations for action from Virtual Forge to effectively close the loopholes detected.

By analyzing and assessing potential security incidents, the SAP ETD managed service helps customers protect their SAP system environments against attackers even more effectively. In this respect, continuous monitoring in conjunction with historical analyses can be compared to surveillance cameras in a house that record every break-in and thus allow conclusions to be drawn on the loophole through which the perpetrator or perpetrators accessed the building.

However, would it not make more sense using the SAP ETD managed service from Virtual Forge offering a 24/7 service instead of historical analyses to fend off potential attacks in real time? – some industry experts may well ask this question. In fact, talks with small and midsize companies have revealed that round-the-clock analyses of this kind would exceed personnel resources considerably. What is recommended for such companies is a regular glance in the rearview mirror – and if necessary, step-by-step expansion of the analyses as part of the SAP ETD managed service.

This idea of scalability is supported by the partnership that Virtual Forge and SAP have formed exclusively with Freudenberg IT for the SAP ETD managed service. This led to the proven SAP hosting provider becoming the third member of the alliance.

Our customers benefit from the strengths of all three partners. Virtual Forge provides the basic customizing and support services (patches, upgrades, monitoring and provision of standard reports), while SAP ensures that ETD is always up to date and plans to make industry-specific content available to customers in the form of patterns at regular intervals.

FIT ensures the technical provision (installation of HANA and SDS) as well as the secure and ongoing operation for medium-sized companies.

The following factors influence the performance of the system:
● Number of incoming log data
● How often does the system evaluate attack detection patterns?
● Number of active attack detection patterns
● Complexity of attack detection patterns
● Amount of evaluated log data

FIT determines the sizing of the system based on network bandwidths, physical memory, CPU processing power, and I/O capacity and provides the system according to the customer’s individual requirements for reliability and availability.

To report this post you need to login first.

Be the first to leave a comment

You must be Logged on to comment or reply to a post.

Leave a Reply