SAP team has the proper context and details to make quick decisions .
“ Second , we needed a way to consistently measure our ability to detect priority threats across the MITRE ATT & CK framework in real-time and ensure we have a proper understanding of where and how we need to improve .
“ Third ,” Costea adds , “ we had to streamline how detections are managed , deployed , and version controlled , while also improving the time to deploy them .
“ Fourth , we had to improve our triage and analysis capabilities by understanding correlation relationships fast . And fifth , we use several tools in our Detection Lifecycle , and we were looking for a way to centralise everything .”
That , Costea adds , is where SAP ’ s work with the automated threat detection platform Anvilogic comes in , “ which helps us to address these five challenges .”
A focus on zero trust The rapid adoption of cloud services in recent years brings a new focus on Zero Trust principles . Organisations can no longer trust perimeter security alone with an “ implicit trust ” granted to assets or user accounts based solely on their physical or network location .
Most cyberattacks and data breaches come as the result of a stolen identity , and while more and more corporations are using identity protection solutions , this type of protection is not built into the architecture . Zero trust is designed to solve these shortcomings .
“ SAP applications are business-critical applications for many enterprises and all of them think about two main use cases in regard to zero trust : to make connections between SAP solutions zero-trust compliant ,
cybermagazine . com 37