Features and functionalities: * Analyze and efficiently enrich and correlate logs for review * Evaluate for automated detection of attack patterns with real-time alerting * Investigate with forensic analysis and modeling of existing and new attack detection patterns and dashboards * Integrate to collect SAP and non-SAP log data |
Features and functionalities: * Manage policies by creating, disseminating, and acknowledging data protection and privacy (DPP) policies * Survey and track to gather and report on records of processing activities (RoPA) * Access business impact by performing data privacy (DPIA) and cybersecurity business impact analysis * Manage risks and controls to identify and audit related risks and mitigating controls * Monitor and report on status and details via a unified cockpit |
Features and functionalities: * Data transparency to monitor and report on data access, storage, movement, processing, and location in the public Cloud * Data control to create and enforce public Cloud data access, location, movement, and processing policies |
Features and functionalities: * Log data access for coherent log of users’ input and system output on the user interface level, enriched with meta information for analysis * Gain insight to understand how and which data is accessed, and set up alerts in case of access to critical or sensitive data * Investigate by receiving alerts to specific, questionable activities, and enabling deep-dive into the log file to identify and prove improper data access * Report to draw on comprehensive access data to report internally and externally * Integrate with SAP UI Masking for better data protection, and with SAP Enterprise Threat Detection for advanced and automated analysis of access |
Features and functionalities: * Secure access by determining sensitive fields and applying protective actions in runtime based on users’ authorizations * Automate authorization by determining users’ special authorization in runtime, based on static roles or dynamic attribute-role settings * Gain insights to understand who tries and who succeeds in accessing sensitive data, and whether to refine the solution setup * Integrate by leveraging SAP UI Logging and SAP Enterprise Threat Detection to identify potential data abuse |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
2 | |
2 | |
2 | |
2 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 |