Implementing SAP Enterprise Threat Detection

  • 56m
  • Gaurang Joshi, Glen Hoaglund, Mercedes Barrachina, Ryan Throop
  • Rheinwerk Publishing Inc.
  • 2024

Stay ahead of cybersecurity vulnerabilities with SAP Enterprise Threat Detection. Learn to set up and use standard and nonstandard logs to analyze risks in your SAP environment. Review attack detection patterns and create your own custom patterns based on log data. Get tips for managing, evaluating, and responding to security alerts. Safeguard your SAP system and applications with this hands-on E-Bite!

  • Use standard and nonstandard logs in SAP Enterprise Threat Detection
  • Activate attack detection patterns and learn to create custom patterns
  • Analyze, investigate, and resolve alerts

About the Author

Mercedes Barrachina

Mercedes Barrachina is an SAP security innovation lead at IBM (SAP Center of Competence in Europe). She holds a BSc and MSc in telecommunications engineering from the University of Malaga, developed her master thesis in the German Aerospace Center (DLR) and holds a BSc in economics as well as a PhD. She has completed several SAP training courses, including SAP Process Control, SAP Risk Management, SAP Fraud Management, SAP Access Control and SAP HANA. She has completed several courses related to data science and machine learning at Berkeley (USA), MIT (USA), and IE (Spain). She has published articles in national and international journals related to the analysis of biosignals applying different machine learning techniques. You can find her on LinkedIn at https://www.linkedin.com/in/mercedes-barrachina-14b35260

Glen Hoaglund

Glen Hoaglund is an SAP cybersecurity consultant at IBM. He has worked as an SAP consultant for more than 18 years, focusing on large SAP deployments involving security, controls, and governance, risk, and compliance (GRC). His primary interest is in helping clients develop a robust cyber resilience program for their SAP environments, including the implementation of SAP Enterprise Threat Detection, Unified Connectivity, RFC security, and various vulnerability management solutions. Based in the U.S., Glen can be reached at www.linkedin.com/in/glen-hoaglund-b857634

Gaurang Joshi

Gaurang Joshi is an SAP cyber security consultant at IBM Security. He has delivered SAP solutions in complex and multi-component system landscapes. He has experience in solution architecture design and leading and managing teams. He has also handled multiple roles as software architect, consultant, and project lead. His SAP experience includes security; enterprise threat detection; governance, risk, and compliance (GRC) access control; authorization reviews; and more. You can find him on LinkedIn at https://www.linkedin.com/in/gaurang-joshi-b0579039

Ryan Throop

Ryan Throop is the America’s SAP security, GRC, and cybersecurity leader at IBM. He has worked in the SAP security space for more than 14 years in numerous industry verticals. His expertise is in designing, implementing, and supporting SAP security solutions for clients across the globe. His focus and motivation is to assist clients in securing their SAP landscapes from internal and external threats. Ryan holds his undergraduate degree from the University of North Carolina at Chapel Hill and his MBA from Duke University’s Fuqua School of Business. You can find him on LinkedIn at http://www.linkedin.com/in/ryanthroop

In this Book

  • Introduction to Threat Management and Vulnerability Management
  • Getting Started with SAP Enterprise Threat Detection
  • Using SAP Logs
  • Working with Non-Standard Logs
  • Patterns and Alerts
  • Alerts and Investigations
  • Integration with Other Security Information and Event Management Solutions
  • What’s Next?