SYSTEM AND USER CONTEXT IN ENTERPRISE THREAT DETECTION

    公开(公告)号:US20220006828A1

    公开(公告)日:2022-01-06

    申请号:US17479850

    申请日:2021-09-20

    Applicant: SAP SE

    Abstract: A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes receiving user data associated with a particular user identifier in the backend computing system, transferring the received user data to an event stream processor, receiving system data associated with a particular log providing computing system in the backend computing system, transferring the received user data to the event stream processor, and executing a transfer of log data associated with logs of computing systems connected to the backend computing system.

    SYSTEM AND USER CONTEXT IN ENTERPRISE THREAT DETECTION

    公开(公告)号:US20190007442A1

    公开(公告)日:2019-01-03

    申请号:US16125256

    申请日:2018-09-07

    Applicant: SAP SE

    Abstract: A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes receiving user data associated with a particular user identifier in the backend computing system, transferring the received user data to an event stream processor, receiving system data associated with a particular log providing computing system in the backend computing system, transferring the received user data to the event stream processor, and executing a transfer of log data associated with logs of computing systems connected to the backend computing system.

    Real-time configuration check framework

    公开(公告)号:US11349713B2

    公开(公告)日:2022-05-31

    申请号:US17066298

    申请日:2020-10-08

    Applicant: SAP SE

    Abstract: A computer-implemented method receives a program code and a signature associated with the program code from a database persistency associated with an enterprise threat detection (ETD) system. The received program code is associated with a configuration check, and the configuration check is developed at a development computing system and can collect information associated with a computing system. The received program code and the signature associated with the program code is distributed to a plurality of computing systems that are monitored by the ETD system. At least one configuration check result is received, and the configuration check result is generated by executing the program code on the computing system. The at least one configuration check result then transmitted to the database persistence, and the at least one result is displayed on a database graphical user interface (GUI) associated with the database persistency.

    REAL-TIME CONFIGURATION CHECK FRAMEWORK
    10.
    发明申请

    公开(公告)号:US20200044924A1

    公开(公告)日:2020-02-06

    申请号:US16053376

    申请日:2018-08-02

    Applicant: SAP SE

    Abstract: A computer-implemented method receives a program code and a signature associated with the program code from a database persistency associated with an enterprise threat detection (ETD) system. The received program code is associated with a configuration check, and the configuration check is developed at a development computing system and can collect information associated with a computing system. The received program code and the signature associated with the program code is distributed to a plurality of computing systems that are monitored by the ETD system. At least one configuration check result is received, and the configuration check result is generated by executing the program code on the computing system. The at least one configuration check result then transmitted to the database persistence, and the at least one result is displayed on a database graphical user interface (GUI) associated with the database persistency.

Patent Agency Ranking