{"id":56594,"date":"2019-01-29T11:49:19","date_gmt":"2019-01-29T10:49:19","guid":{"rendered":"http:\/\/e3mag.com\/?p=56594"},"modified":"2024-01-19T14:50:56","modified_gmt":"2024-01-19T13:50:56","slug":"combler-le-fosse-entre-siem-et-sap","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/combler-le-fosse-entre-siem-et-sap\/","title":{"rendered":"Combler le foss\u00e9 entre SIEM et SAP"},"content":{"rendered":"<p>Le suivi de l'\u00e9tat actuel des risques et de la conformit\u00e9 ainsi que des analyses rapides augmentent la s\u00e9curit\u00e9 des donn\u00e9es sensibles et garantissent le respect de toutes les obligations l\u00e9gales.<\/p>\n<p>Pour la surveillance et l'\u00e9valuation des informations, de nombreuses entreprises ont souvent recours \u00e0 des solutions dites SIEM.<\/p>\n<p>La surveillance des syst\u00e8mes SAP pr\u00e9sente toutefois une lacune. En effet, pour les outils SIEM, les syst\u00e8mes SAP se trouvent dans un angle mort, car ils ne disposent pas de r\u00e8gles de contr\u00f4le SAP sp\u00e9cifiques. En raison de l'absence de mod\u00e8les d'attaque, les menaces et les attaques ne sont donc g\u00e9n\u00e9ralement pas identifi\u00e9es.<\/p>\n<p>C'est l\u00e0 qu'intervient le radar de s\u00e9curit\u00e9 de SAST SUITE, qui ne se limite pas \u00e0 une analyse ponctuelle des autorisations et de la configuration du syst\u00e8me, mais effectue des scans de vuln\u00e9rabilit\u00e9 de tous les niveaux technologiques en temps r\u00e9el.<\/p>\n<p>Et gr\u00e2ce \u00e0 l'int\u00e9gration avec un outil SIEM global, les responsables peuvent consolider tous les incidents de s\u00e9curit\u00e9 de leurs syst\u00e8mes SAP avec d'autres syst\u00e8mes informatiques pertinents. Les incidents critiques sont ainsi d\u00e9tect\u00e9s et les contre-mesures peuvent \u00eatre prises imm\u00e9diatement.<\/p>","protected":false},"excerpt":{"rendered":"<p>Dans la plupart des entreprises, les syst\u00e8mes SAP sont au c\u0153ur de l'informatique. Il est donc indispensable de surveiller en permanence les transactions et les applications pour les prot\u00e9ger. <\/p>","protected":false},"author":38,"featured_media":56595,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,27969],"tags":[4949,174,12211,1516],"coauthors":[19920],"class_list":["post-56594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag-1902","tag-analysen","tag-compliance","tag-monitoring","tag-security","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_98777801-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die SAP-Systeme sind in den meisten Unternehmen das Herzst\u00fcck der IT. Eine permanente \u00dcberwachung von Transaktionen und Anwendungen als Schutz ist daher unerl\u00e4sslich. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/scene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/sap-nouvelles\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-1902\/\" rel=\"category tag\">MAG 19-02<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/56594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=56594"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/56594\/revisions"}],"predecessor-version":[{"id":138038,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/56594\/revisions\/138038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/56595"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=56594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=56594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=56594"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=56594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}