Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

3/14/2019
03:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Onapsis and Exabeam Partner to Bring ERP to the Security Operations Center

New integration Improves Monitoring, Threat Detection, Incident Response and Compliance

Boston, MA – March 13 - Onapsis, the global leader in ERP cybersecurity and compliance, today announced a technology alliance and product integration with Exabeam, the Smarter SIEM TM company, to give security teams access to enterprise resource planning (ERP) vulnerability logs in their security incident and event management (SIEM) for security monitoring, threat detection, incident response and audit compliance.

Global 2000 organizations run their business on, and store their sensitive data in, ERP applications such as SAP and Oracle E-Business Suite. Nation-state threat actors, hacktivitists and cybercriminals are turning their sights to these systems with targeted campaigns using technology found on the dark web. Many organizations remain vulnerable, having not updated security patches, despite warnings from DHS US CERT to update critical patches, or because they continue to rely on legacy security approaches. In addition, a lot of the biggest breaches broke through the perimeter with phishing, third parties, or common vulnerabilities and then pivoted to compromise ERP systems.

By making business-critical ERP applications an integrated part of the Security Operations Center (SOC), organizations gain visibility and context needed to investigate and respond to incidents and comply with data-intensive regulations such as GDPR. The new joint solution integrates Onapsis and the Exabeam Security Management Platform (SMP) to allow security teams to quickly detect and respond to threats by providing them with continuous visibility of ERP vulnerabilities, additional context to investigate security alerts and the ability to quickly respond to incidents.

The new integration allows the Exabeam SMP to ingest ERP vulnerability logs from Onapsis via syslog to gather all the critical vulnerabilities, misconfigurations and ERP security events detected by Onapsis. ERP data is combined with data from other systems, modeled using behavioral analytics, and displayed in Exabeam Smart Timelines™, machine-created timelines of user and device behavior, so analysts can quickly detect and investigate attacker tactics, techniques and procedures.

“InfoSec professionals today work in a threat environment where they face adversaries with unprecedented sophistication, persistence and technology,” said Ted Plumis, VP of Worldwide Channels at Exabeam. “We are excited to work with Onapsis to deliver a streamlined security solution for ERP systems. This partnership ensures that our mutual customers can quickly identify suspicious activity and remediate threats in their environment.”

“We are excited to be onboard as a partner of Exabeam and combining our product offerings. With the growing trend in attacks targeting the organization’s core applications, it is imperative that security teams understand and evaluate the logs and events of their ERP systems. Our partnership with Exabeam will allow companies to gain awareness into the security posture of their ERP business applications as it will now be fed into and displayed on their SIEM dashboard,” said Darren Gaeta, VP of Worldwide Alliances and Channels, Onapsis Inc.

The Onapsis Security Platform™ is the most widely-used SAP-certified cybersecurity solution on the market. Unlike generic security products, Onapsis's context-aware solution delivers both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data.

About Onapsis

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses.

Headquartered in Boston, MA, Onapsis serves over 200 customers including many of the Global 2000. Onapsis's solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, Deloitte, E&Y, IBM, KPMG and PwC. For more information, please visit www.onapsis.com, or connect with us on Twitter, Google+, or LinkedIn.

About Exabeam

 

Exabeam is the Smarter SIEMTM company. We empower enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarter. Security organizations no longer have to live with excessive logging fees, missed distributed attacks and unknown threats, or manual investigations and remediation. With the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident response, both on-premises or in the cloud. Exabeam Smart TimelinesTM, sequences of user and device behavior created using machine learning, further reduce the time and specialization required to detect attacker tactics, techniques, and procedures. For more information, visit  https://www.exabeam.com.

Exabeam, Smarter SIEM, Smart Timelines and Security Management Platform are trademarks of Exabeam, Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2019 Exabeam, Inc. All rights reserved.

 

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4428
PUBLISHED: 2019-12-09
IBM Watson Assistant for IBM Cloud Pak for Data 1.0.0 through 1.3.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session....
CVE-2019-4611
PUBLISHED: 2019-12-09
IBM Planning Analytics 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 168519.
CVE-2019-4612
PUBLISHED: 2019-12-09
IBM Planning Analytics 2.0 is vulnerable to malicious file upload in the My Account Portal. Attackers can make use of this weakness and upload malicious executable files into the system and it can be sent to victim for performing further attacks. IBM X-Force ID: 168523.
CVE-2019-4621
PUBLISHED: 2019-12-09
IBM DataPower Gateway 7.6.0.0-7 throug 6.0.14 and 2018.4.1.0 through 2018.4.1.5 have a default administrator account that is enabled if the IPMI LAN channel is enabled. A remote attacker could use this account to gain unauthorised access to the BMC. IBM X-Force ID: 168883.
CVE-2019-19230
PUBLISHED: 2019-12-09
An unsafe deserialization vulnerability exists in CA Release Automation (Nolio) 6.6 with the DataManagement component that can allow a remote attacker to execute arbitrary code.