Download PDF version Contact company

Logpoint has announced the release of Logpoint Business-Critical Security (BCS) for SAP Business Technology Platform (BTP), a threat detection and monitoring solution for applications built and managed on the SAP BTP platform. Logpoint BCS for SAP BTB offers extensive threat visibility, which helps secure the platform against malicious activities.

SAP BTP is a set of integrated services and tools that facilitate application development, deployment, and management. It offers database and data management, analytics, machine learning, and more capabilities, making it a versatile platform for creating various applications, including web and mobile applications. However, as SAP BTP serves as a central point to the entire cloud infrastructure, it potentially provides threat actors with access to applications built on the platform and all integrations between SAP BTP and other applications. 

Author's quote

SAP Basis Managers have had to access, review and correlate reports in each cloud system individually

Organisations use SAP BTP for developing and deploying applications, and if it gets compromised, the entire cloud infrastructure can be at risk,” says Sükrü Ilker Birakoglu, Senior Director at Logpoint.

Until now, SAP Basis Managers have had to access, review and correlate reports in each cloud system individually, which requires a substantial amount of effort, pioneering to missed opportunities to handle security breaches before they turn into problems.”

Overview of security incidents

Logpoint BCS for SAP BTP empowers organisations to proactively mitigate threats and keep attacks at bay with real-time monitoring of security-related events such as logins, users’ geography, timeframes and changes to roles and configurations.

The new solution helps organisations to save time, resources and alleviates alert fatigue with intuitive dashboards, offering an easy and prioritised overview of security incidents. Logpoint BCS for SAP BTP allows users to act promptly and effectively mitigate threats.

Real-time capabilities

A login from an unauthorised location triggers an alert for immediate notification

Our solution elevates the security of SAP BTP and boosts the security posture,” says Sükru Ilker Birakoglu. “A login from an unauthorised location triggers an alert for immediate notification. The monitoring capability empowers administrators to quickly scrutinise patterns and deviations from established norms and discern potential security threats and anomalies."

"With our real-time capabilities and actionable dashboards, we empower SAP Basis Managers to be proactive and mitigate threats in the early stages of an attack.”

Logpoint BCS for SAP solutions

Logpoint BCS for SAP BTP is an add-on to Logpoint BCS for SAP solutions, which provides visibility across the SAP environment and empowers organisations to effectively respond to threats.

Logpoint BCS for SAP integrates with Logpoint’s Converged SIEM platform, delivering comprehensive threat detection and incident response across the entire IT infrastructure.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?