former_member195335
Explorer
Member since ‎2014 May 12

User Statistics

  • 11 Posts
  • 3 Solutions
  • 0 Kudos given
  • 6 Kudos received

User Activity

For describing the misuse of the internet, words starting with "cyber...", like cyberwar, cybertheft, cybermobbing, are commonly used. Normally people then mean attacks through the internet, possibly by hackers.The prefix "Cyber-" probably became pop...
If you browse the UI Logging SCN space then IT security is probably already an important matter to you. But did you know that security is ranked number three in this year's most relevant IT trends? ... needless to say that UI Logging and UI Masking ...
    In case you need to evaluate an access logging solution, the following check list may be helpful:Overall quality of logged data: Does it provide enough detail and completeness for all of my use cases?Is the solution fully integrated into the SAP ...
UI logging provides features for logging of SAP access through the most relevant SAP UI and interface technologies (SAP GUI, Web Dynpro, RFC and many more). It complements existing security features by logging of what a user has seen and entered on a...
Kudos from