24/7 SAP Security
The frequency of cyberattacks on SAP systems and regulatory requirements are increasing. The greatest possible security and comprehensive protection of your IT systems are therefore a top priority.
Apart from this, legal regulations such as the NIS2 Directive, but also the protection of personal data within the framework of the GDPR and DSG, must be complied with by means of suitable technical and organisational measures (TOM) and documented in accordance with compliance and audit requirements. Depending on the industry in which your company operates and if it is part of the critical infrastructure (KRITIS), even stricter security requirements may apply. SAP security must be continuously monitored, adapted and optimised, for example with regard to critical system parameters, privileged authorisations or the installation of SAP Security Notes and patches. And in the event of a security incident, an adequate response must be provided within the shortest possible time.
This shows that you need a holistic, customised concept to fully monitor and secure your SAP landscape in the best possible way. A security wall with seamlessly interlocking components. This poses a challenge for your internal IT department, especially as it is busy with strategic projects and often does not have the necessary SAP Basis and security specialists due to the shortage of skilled labour.
The SAP Security Operations Center (SOC) from itesys takes the pressure off your SAP Basis by offering managed services that optimise the security of your SAP landscape around the clock and serve to build up your SAP security wall.
SAP SOC Services
Our SAP Security Operations Centre offers managed services that you can select and combine according to your specific requirements and objectives.
24/7 Expert Desk
In the Mission Control Center, the itesys Expert Desk handles security issues through certified SAP Technology Consultants.
Security
Incident Management
Our security experts monitor security threats and recognise vulnerabilities, which are remedied directly or in coordination with the service recipient as part of incident management.
SAP Security Notes
SAP delivers monthly software corrections in the form of SAP Security Notes on SAP Security Patch Day. We check these for relevance to your system and implement the security notes on the individual SAP systems.
SAP Security Monitoring
Automated, proactive monitoring of your SAP system landscapes thanks to dedicated security monitoring queries. Our Scansor software monitors critical SAP processes, events, authorisations and parameter settings.
Reporting
Detailed SOC reporting that shows current security threats and security risks, providing the transparency you need to optimise IT security in a targeted manner.
SIEM: The Core Tool of the SOC
SIEM (Security Information and Event Management) acts as the central monitoring and alerting system within the SOC. It analyzes SAP logs (e.g., Security Audit Log) and generates alerts when configured attack scenarios are detected. It supports incident response processes and helps meet compliance and audit requirements. The objective is to quickly identify, assess, and remediate security incidents before damage occurs.
We forward your SAP system logs directly to our SAP SIEM platform and monitor them 24/7 for potential attacks or operational misuse. Through automated threat detection, rapid response capabilities, and strong integration into existing security technologies, we provide comprehensive protection.
Our experience and expertise — along with the high quality of our processes and services, confirmed by triple ISO certification (ISO 9001, ISO 27001, ISO 20000-1) — make us a trusted partner.
Key Benefits of the SOC at a Glance
- arrow_forward
Real-time transparency: Clear visibility into security-critical activities within SAP.
- arrow_forward
Risk-based focus: Targeted monitoring based on customer-specific threat scenarios.
- arrow_forward
Efficient alerting: Reduced false positives and focused escalation through customer-specific tuning.
- arrow_forward
Planning reliability: Transparent cost and service structure through clearly defined service packages.
- arrow_forward
End-to-end service: Our SAP security experts maintain use cases and integrate log sources.
- arrow_forward
Maximum flexibility: Optional integration of alerts into your central SIEM solution.
More info?
Would you like to find out more about the SAP Security Operations Center (SOC) from itesys? We will be happy to talk to you.