Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

3/14/2019
03:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Onapsis and Exabeam Partner to Bring ERP to the Security Operations Center

New integration Improves Monitoring, Threat Detection, Incident Response and Compliance

Boston, MA – March 13 - Onapsis, the global leader in ERP cybersecurity and compliance, today announced a technology alliance and product integration with Exabeam, the Smarter SIEM TM company, to give security teams access to enterprise resource planning (ERP) vulnerability logs in their security incident and event management (SIEM) for security monitoring, threat detection, incident response and audit compliance.

Global 2000 organizations run their business on, and store their sensitive data in, ERP applications such as SAP and Oracle E-Business Suite. Nation-state threat actors, hacktivitists and cybercriminals are turning their sights to these systems with targeted campaigns using technology found on the dark web. Many organizations remain vulnerable, having not updated security patches, despite warnings from DHS US CERT to update critical patches, or because they continue to rely on legacy security approaches. In addition, a lot of the biggest breaches broke through the perimeter with phishing, third parties, or common vulnerabilities and then pivoted to compromise ERP systems.

By making business-critical ERP applications an integrated part of the Security Operations Center (SOC), organizations gain visibility and context needed to investigate and respond to incidents and comply with data-intensive regulations such as GDPR. The new joint solution integrates Onapsis and the Exabeam Security Management Platform (SMP) to allow security teams to quickly detect and respond to threats by providing them with continuous visibility of ERP vulnerabilities, additional context to investigate security alerts and the ability to quickly respond to incidents.

The new integration allows the Exabeam SMP to ingest ERP vulnerability logs from Onapsis via syslog to gather all the critical vulnerabilities, misconfigurations and ERP security events detected by Onapsis. ERP data is combined with data from other systems, modeled using behavioral analytics, and displayed in Exabeam Smart Timelines™, machine-created timelines of user and device behavior, so analysts can quickly detect and investigate attacker tactics, techniques and procedures.

“InfoSec professionals today work in a threat environment where they face adversaries with unprecedented sophistication, persistence and technology,” said Ted Plumis, VP of Worldwide Channels at Exabeam. “We are excited to work with Onapsis to deliver a streamlined security solution for ERP systems. This partnership ensures that our mutual customers can quickly identify suspicious activity and remediate threats in their environment.”

“We are excited to be onboard as a partner of Exabeam and combining our product offerings. With the growing trend in attacks targeting the organization’s core applications, it is imperative that security teams understand and evaluate the logs and events of their ERP systems. Our partnership with Exabeam will allow companies to gain awareness into the security posture of their ERP business applications as it will now be fed into and displayed on their SIEM dashboard,” said Darren Gaeta, VP of Worldwide Alliances and Channels, Onapsis Inc.

The Onapsis Security Platform™ is the most widely-used SAP-certified cybersecurity solution on the market. Unlike generic security products, Onapsis's context-aware solution delivers both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data.

About Onapsis

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses.

Headquartered in Boston, MA, Onapsis serves over 200 customers including many of the Global 2000. Onapsis's solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, Deloitte, E&Y, IBM, KPMG and PwC. For more information, please visit www.onapsis.com, or connect with us on Twitter, Google+, or LinkedIn.

About Exabeam

 

Exabeam is the Smarter SIEMTM company. We empower enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarter. Security organizations no longer have to live with excessive logging fees, missed distributed attacks and unknown threats, or manual investigations and remediation. With the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident response, both on-premises or in the cloud. Exabeam Smart TimelinesTM, sequences of user and device behavior created using machine learning, further reduce the time and specialization required to detect attacker tactics, techniques, and procedures. For more information, visit  https://www.exabeam.com.

Exabeam, Smarter SIEM, Smart Timelines and Security Management Platform are trademarks of Exabeam, Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2019 Exabeam, Inc. All rights reserved.

 

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Tim Mackey, Principal Security Strategist, CyRC, at Synopsys,  6/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12881
PUBLISHED: 2019-06-18
i915_gem_userptr_get_pages in drivers/gpu/drm/i915/i915_gem_userptr.c in the Linux kernel 4.15.0 on Ubuntu 18.04.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact via crafted ioctl calls to /dev/dri/card0.
CVE-2019-3953
PUBLISHED: 2019-06-18
Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 10012 RPC call.
CVE-2019-12133
PUBLISHED: 2019-06-18
Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system ...
CVE-2019-12592
PUBLISHED: 2019-06-18
A universal Cross-site scripting (UXSS) vulnerability in the Evernote Web Clipper extension before 7.11.1 for Chrome allows remote attackers to run arbitrary web script or HTML in the context of any loaded 3rd-party IFrame.
CVE-2017-8328
PUBLISHED: 2019-06-18
An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of changing the administrative password for the web management interface. It seems that the device does not implement any cross site request forgery prot...