{"id":56594,"date":"2019-01-29T11:49:19","date_gmt":"2019-01-29T10:49:19","guid":{"rendered":"http:\/\/e3mag.com\/?p=56594"},"modified":"2024-01-19T14:50:56","modified_gmt":"2024-01-19T13:50:56","slug":"acortar-distancias-entre-siem-y-sap","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/acortar-distancias-entre-siem-y-sap\/","title":{"rendered":"Cerrar la brecha entre SIEM y SAP"},"content":{"rendered":"<p>La supervisi\u00f3n del estado actual de los riesgos y el cumplimiento de la normativa y los an\u00e1lisis r\u00e1pidos aumentan la seguridad de los datos sensibles y garantizan el cumplimiento de todas las obligaciones legales.<\/p>\n<p>Muchas empresas suelen utilizar las denominadas soluciones SIEM para supervisar y analizar la informaci\u00f3n.<\/p>\n<p>Sin embargo, existe una laguna cuando se trata de supervisar sistemas SAP. Esto se debe a que los sistemas SAP son un punto ciego para las herramientas SIEM, ya que no disponen de reglas de comprobaci\u00f3n especiales para SAP. Por lo tanto, las amenazas y los ataques no suelen identificarse debido a la falta de patrones de ataque.<\/p>\n<p>Aqu\u00ed es donde entra en juego el radar de seguridad SAST SUITE, que no s\u00f3lo analiza las autorizaciones y las configuraciones del sistema por fecha clave, sino que tambi\u00e9n realiza escaneos de vulnerabilidad de todos los niveles tecnol\u00f3gicos en tiempo real.<\/p>\n<p>Y la integraci\u00f3n con una herramienta SIEM completa permite a los responsables consolidar todos los incidentes de seguridad de sus sistemas SAP con otros sistemas inform\u00e1ticos relevantes. De este modo se descubren los incidentes cr\u00edticos y se pueden tomar contramedidas de inmediato.<\/p>","protected":false},"excerpt":{"rendered":"<p>Los sistemas SAP constituyen el n\u00facleo de las TI en la mayor\u00eda de las empresas. Por lo tanto, es esencial una supervisi\u00f3n permanente de las transacciones y aplicaciones a modo de protecci\u00f3n. <\/p>","protected":false},"author":38,"featured_media":56595,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,27969],"tags":[4949,174,12211,1516],"coauthors":[19920],"class_list":["post-56594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1902","tag-analysen","tag-compliance","tag-monitoring","tag-security","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die SAP-Systeme sind in den meisten Unternehmen das Herzst\u00fcck der IT. Eine permanente \u00dcberwachung von Transaktionen und Anwendungen als Schutz ist daher unerl\u00e4sslich. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/categoria\/escena\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/es\/categoria\/noticias-sap\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/es\/categoria\/mag-1902\/\" rel=\"category tag\">MAG 19-02<\/a>","author_info_v2":{"name":"Revista E-3","url":"https:\/\/e3mag.com\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/56594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=56594"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/56594\/revisions"}],"predecessor-version":[{"id":138038,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/56594\/revisions\/138038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/56595"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=56594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=56594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=56594"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=56594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}