Skip to content

Interface Traffic Monitor

SecurityBridge

Interface Traffic Monitor

Take back governance of all SAP interface traffic

Interfaces between SAP systems and other systems have increased in numbers to the point where it is literally impossible to keep track of all connections.

Built into SecurityBridge is the ability to instantly gain a visual of all the data exchanges between SAP systems themselves, and non-SAP systems, via the Interface Traffic Monitor. This is an instantly accessible module, available to all SecurityBridge clients, and out-of-the-box ready. The Monitor will produce a connectivity map showing all data streams and the communication between SAP systems or non-SAP systems, and landscapes so that the SAP interface security can be analyzed and documented where necessary.

The dynamic graphic interface instantly shows all data streams and exchanges between systems, e.g.: Which RFC have been called? Which user has instigated the communication? Which destination has been called and how often?

SAP interface security is complex and needs to be controlled and maintained. This is something that is well known by attackers who will often apply scripts to infiltrate the interface layer.

SecurityBridge gives you the power to take back governance. Rapdidly changing machine-to-machine communication is instantly and dynamically displayed. New interfaces are created, copied, or enhanced creating the potential for another attack vector.

Interface Traffic Monitor "in a nutshell"

Instantly available

This is an instantly accessible module, available to all SecurityBridge clients, and out-of-the-box ready. The Monitor will produce a connectivity map showing all data streams and the communication between SAP systems or non-SAP systems, and landscapes so that the data can be analyzed and documented where necessary.

SecurityBridge

PLATFORM

One Platform to address all security needs of SAP customers.

Incident & Response
interface-governance

Take back governance of SAP interface security

With a 360° dynamic view of every traffic instance, all security-critical traffic and vulnerable interfaces are immediately obvious. Malicious data transfers or external data accesses are readily identified.

The RFC interface is often used for integration scenarios with non-SAP environments. Remote function calls provide a way for an internal interface written in e.g. Python, C, C++, Java, etc to communicate directly with the SAP system supporting in and outbound integration. The volume of RFC’s are substantial and can be impossible to map and document. This leads to critical vulnerabilities as an attacker can run a successful exploit by hiding in the mass of traffic. 

Other resources

We got you covered

With the rise of digitalization, the degree of machine-to-machine communication has increased. SAP systems process enterprise-critical data that they receive or share with other systems. Robust integration, transparent monitoring, and encryption of communication data are essential to ensure confidentiality, integrity, and availability. SecurityBridge Interface Traffic Monitor generates an interactive communication map that provides all the insight that is needed to implement effective governance and to identify and eliminate existing attack vectors even in complex environments.

Relevant articles

Solution Brief - Interface Traffic Monitor

In a nutshell

Looking for a condensed document explaining all the information about SecurityBridge’s Interface Traffic Monitor solution? We’ve got you covered. The Solution Brief combines all the relevant information you need to know about the built-in Interface Traffic Monitor solution of SecurityBridge for SAP.

Security focused

SecurityBridge – Interface Traffic Monitor allows you to just select the security-critical functions so you can immediately focus on security, for example, who’s looking at passwords, who’s requesting data, where is the data sent, and at what time and date do these transactions happen. All relevant details are available and are just one click away.

Instant. Integrated. Intuitive. The defense you need to apply governance across all your SAP and non-SAP interface communication.

By submitting the contact form, you acknowledge that you have read and agreed to our Privacy Policy.
Security & Compliance Monitor

Take back control of SAP interface security.