The IT security fair held at Nuernberg, it-sa, saw the launch of SAP security expert SECUDE's Security Intelligence to the global market. During the launch, the product was adjudged the 'Innovation of the Year' by a ten-member panel that represented the IT industry, business associations, and the media. Security Intelligence was chosen for the award as it closes a critical gap in monitoring data and security events in complex SAP environments.
it-sa was organized by IT-Verlag, a well-known publishing company house. The IT security trade fair provides an attractive combination of technical competence available, practical demonstrations, and a galaxy of IT security solutions.
The Need for Security Intelligence
SAP's global customers face increasing legal and regulatory pressure to set up controls to minimize risk in their IT environment. Typical external requirements come from regulations and standards such as PCI, SOX, FDA, Basel II, and other data protection laws. One critical necessity is to continuously monitor the SAP environment. This also includes the ability to provide proofs of working controls in audits. However, Security Intelligence and Event Monitoring (SIEM) solutions today do not provide sufficient SAP connectivity. These tools are blind to vital data and processes in the complex SAP landscapes.
Security Intelligence provides an interface between the various sources of security and compliance relevant data within SAP systems and solutions that are used to monitor IT landscapes. It enables central security monitoring and analysis of SAP landscapes, a requirement that many SAP customers face due to increasing legal or regulatory pressure, or to fulfill their internal security policy.
The main component of Security Intelligence, C-BUS, is an infrastructure to extract security- and compliance-relevant data from SAP landscapes and transfer them to SIEM solutions. The first release in October 2010 provides access to SAP security audit logs, system logs, system parameter, table content, transfer information, and change documents. The data is transferred to third-party SIEM solutions or to other compliance-log-archive solutions.
For further information about Security Intelligence please visit www.secude.com/...