Developers: | SAP SE |
Reflection of the attacks in real time
- § Collecting of events from all SAP landscape
- Identification of suspicious activity of users
- Correlation of events in incidents
- Formation of automatic reaction
- Receiving signal of threat emergence
- Investigation of incidents
- Integration with SIEM
Conducting investigations
- Comparison of the revealed events with historical data
- An opportunity to reveal the primary source of the attack
- Visualization of points of distribution of threat in the infrastructure card
- Incident Management