Cybersecurity and Data Protection in an SAP Hybrid Environment
How to protect your environment by identifying personal data leakage with auditability of inappropriate access and real-time reporting? How to detect a possible attack and provide evidence?
In this session deck, you will learn how SAP Enterprise Threat Detection and UI Data Protection Masking and Logging can address data theft, data manipulation, and removal of evidence traces. You will have access to tamper-proof auditable events for compliance and legal requirements. You will have the ability to apply rule-based data obfuscation and appropriate unmasking.
Read the presentation here.