SAP Enterprise Threat Detection (ETD)

Create the conditions to defend against cyber attacks in real time and protect your company from security threats from inside and outside


Real-time monitoring


Detection of irregularities


Avoidance of financial losses and reputational damage


  • Detect external and internal cyber security threats

  • Improve security through continuous monitoring

  • Analysis of suspicious activities and detection of security vulnerabilities

  • Real-time data processing of events from connected SAP systems

  • Complement for existing SIEM solutions or stand-alone operation

  • Pre-configured patterns map known attack patterns

What SAP Enterprise Threat Detection offers

With SAP Enterprise Threat Detection (ETD), companies protect themselves effectively against cyber threats. The software provides a detailed overview of suspicious activities in SAP landscapes and detects breaches as they occur. This enables companies to neutralize danger in a timely manner and protect their data, their customers, and their brand from harm.

SAP Enterprise Threat Detection gives you real-time insights into critical actions and conspicuous events within the SAP system landscape.

When it comes to deploying SAP ETD, companies have a choice: SAP Enterprise Threat Detection can be integrated into existing SIEM (Security Information and Event Management) systems as well as operated as a stand-alone solution that ensures the monitoring of SAP and non-SAP systems.

Pre-configured patterns map already known attack patterns. Since new attack patterns are constantly being developed, SAP always provides updates. This ensures that the patterns are always up to date. In addition, individual patterns can also be created – for special purposes in which, for example, the need to protect certain data is particularly high.

SAP Enterprise Threat Detection provides real-time insights into critical actions and conspicuous events within the SAP system landscape. This enables you to detect, analyze, and neutralize cyberattacks on your SAP applications before serious damage is done.

Act before serious damage occurs

Cyber attacks on companies are in the news almost daily. Since SAP applications often contain valuable data and handle critical business processes in the company, they are increasingly targeted by fraudsters. The permanent increase in cyber threats and cyber attacks makes it necessary for companies to take further appropriate and effective steps for IT security in addition to preventive measures.

To effectively protect their own data, real-time monitoring of the system landscape is required to detect and analyze unusual and suspicious activities as quickly as possible and to initiate the right measures to combat cyber attacks.

SAP Enterprise Threat Detection is a real-time enterprise threat detection software. It is specifically tailored to SAP applications and helps companies detect cyber attacks as early as possible.

Your contact person


Simon Toepper

+49 7131 2711-3000

Using SAP Enterprise Threat Detection as a comprehensive solution for detecting hacker attacks and unauthorized access minimizes the response time of companies and offers the opportunity to take countermeasures at an early stage. This helps avert financial losses and damage to the company’s image.

Discover our further cyber security offerings

Identity Lifecycle Management | IBsolution

Identity Lifecycle Management

Identity lifecycle management is part of enterprise security and describes all processes for assigning roles and authorizations − from when an employee joins the company, through changing responsibilities or even department changes, to when he or she leaves.

Learn more
SAP Identity Management | IBsolution

SAP Identity Management

SAP Identity Management focuses on the traceable management and consistent distribution of digital identities throughout their lifecycle – assignment, repeated adjustments, deletion.

Learn more
SAP Access Control | IBsolution

SAP Access Control

SAP Access Control is a product for identifying risks, minimizing risks, and automating workflows. The focus is on the traceable management and consistent distribution of users and authorizations throughout their lifecycle.

Learn more
SAP Single Sign-On | IBsolution

SAP Single Sign-On

SAP Single Sign-On enables end-to-end authentication against SAP and non-SAP applications. Central management of access data increases security, as only one user ID is required for all applications.

Learn more
SAP Cloud Identity | IBsolution

SAP Cloud Identity

SAP Cloud Identity solutions enable authentication (IAS), single sign-on (SSO) and provisioning (IPS) against SAP cloud systems. Especially in hybrid system landscapes, they ensure complete integration.

Learn more
SAP Authorization Management | IBsolution

SAP Authorization Management

Authorizations in SAP systems grant users access to the applications they need to perform their activities. In order to map the processes securely and correctly, SAP authorizations must be subject to regular control and post-processing.

Learn more
SECMENDO product suite | IBsolution

SECMENDO product suite

The tools of the SECMENDO product suite extend the capabilities of existing SAP Identity & Access Management (IAM) solutions. The goals are an improved user experience, enhanced functionality and more efficient processes.

Learn more

Would you like more information about monitoring your SAP landscape using SAP Enterprise Threat Detection?

Simply complete the form and submit it. We look forward to your request and will contact you as soon as possible.