Today’s business landscapes tend to be heterogeneous with interconnected systems and increasing number of mobile and cloud-based applications. This diversity makes it difficult to use traditional approaches to protect assets from internal threats. The amount of security-relevant data generated by systems and applications in today’s landscapes is huge and is spread across a vast number of logs. And for organizations running SAP systems, a further challenge is to gain insights into SAP business systems to identify security risks.

SAP Enterprise Threat Detection

Camelot ITLab handles these challenges through SAP Enterprise Threat Detection (ETD), a native SAP HANA application which SAP designed to protect its own business data. It combines the high-performance complex event processing functionality of SAP Event Stream Processor (SAP ESP) and the real-time capabilities of SAP HANA to create a powerful solution for processing and analyzing security-relevant data. SAP ETD helps security administrators to detect, monitor, and analyze security events to provide insight into what is happening throughout heterogeneous landscapes including SAP and non-SAP systems by scanning log files.

Systems monitored by SAP Enterprise Threat Detection are known as log providers. Log data is extracted and transferred from the log providers to SAP ETD. The SAP ESP engine pre-processes the incoming log data and makes it compatible for SAP HANA, and then sends it to the SAP HANA database, where it is stored. Then, SAP ETD runs attack detection patterns on the log data and generates alerts when suspicious patterns are found. It is all based on a user-friendly SAP Fiori interface.

Data compliance within ETD

The information contained in all alerts such as system, user, or terminal information is very useful for threat analysis. As we make use of only normalized, enriched and pseudonymized information instead of the raw log data, data compliance is not compromised and greatly reduces the amount of information being transferred to the external tool. Camelot ITLab imposes a division of responsibility between those who can access individual’s identities and those who cannot, when legal follow-ups or actions are required for a forensic investigation.

Real-time analysis in ETD

SAP Enterprise Threat Detection allows you to perform real-time analysis and correlation of vast log data regardless of its original source, and it is used as a stand-alone security monitoring solution. It helps you identify the attacks as they happen using real-time data and analyze the threats quick enough to neutralize them before serious damage occurs.

The speed at which ETD analyzes security-relevant log data gives a significant advantage in combating cybercrime. The earlier you can address a threat, the smaller the window for causing damage to your business. Security breaches in large landscapes is the key problem that SAP ETD is designed to solve, as security threats continue to evolve.

We would like to thank Nicy Thekkethala for her valuable contribution to this article.


The Community for Data Driven Leaders

The Global Community for Data Driven Leaders is designed to promote networking between industry experts and to keep you up to date with the latest innovations and exclusive insights.

Join the Data Driven Leaders

Recommended articles


Master Data Whisperer: How You Really Understand Your Data

In times where trailblazing decisions are made based on data analysis, it is vital to identify important business-critical correlations and customer-specific …

read more
New Now in Organizations

Procurement: From Side Player to Strategic Hero through Automation?

How automation helps to boost the value proposition of procurement. The procurement function is facing a transformation, and automation technologies are …

read more
Supply Chain Management

Setting the Table: Designing a Supply Chain Network in Grocery Retail

In this article, we will focus on the retailer’s network model as the key enabler of a successful grocery supply …

read more

Reimagine your Value Chain with us

Contact us