logging of Web Client UI

How to do SRM UI Customization

In this blog I am going to describe how we can replace the standard Service data with custom Service data for SRM Applications. Below is the screen shot which is contain standard service data, To replace this standard data with custom data , we have to follow below steps. 1) Create custom project and create a custom JS file 2) Add code in CUSTOM_PRE_EXIT or CUSTOM_POST_EXIT method 3)And we have …

Read More »

InformationWeek: ‘The Insiders: A Rogues Gallery’

InformationWeek’s offering for the “information security community” has recently published a commentary by Mike Tierney identifiying “The Insiders: A Rogues Gallery“, thought to help organiziations spot and prevent potential threats to their data integrity. Tierney identifies three categories into which potential security threats fall: external threats posing as internals, e.g. through account takeovers; malicious insiders and non-malicious insiders. He also describes six main “archetypes” of internal threats, by behaviour and …

Read More »

Report: Data Breaches In 2015 Exposed 140 Million Records

ITRC (Identity Theft Resource Center) has released a report that highlights again just how prevalent – and troubling – record-exposing data breaches have become. ITRC collected 533 data breaches in 2015, exposing over 140 million records. The four most heavily affected sectors account for 60% of exposed records: healthcare (35%), financial (10%), education (8.5%) and government/military (7.5%) This is no real change from the situation last year – so the …

Read More »

Data Leaks: Internal Threats, Incidence, and Damages

Security is never a sexy topic. It costs money without directly adding value to your business and processes. In the best case, it’s unobtrusive, not requiring huge efforts to run – like that dental insurance you hope you’ll never need. Alas, security threats are a topic with the potential to cause more harm than a passing toothache. This is particularly true for the information in your organization; a critical and …

Read More »

Why Cyberwords are Misleading

For describing the misuse of the internet, words starting with “cyber…”, like cyberwar, cybertheft, cybermobbing, are commonly used. Normally people then mean attacks through the internet, possibly by hackers. The prefix “Cyber-” probably became popular in the 1980s when Ronald Reagan started the Strategic Defense Initiative, which made a “cyberwar” possible. The program was frightening and mysterious because of its new unprecedented technical dimension. More than three decades later internet …

Read More »

Security is Key Trend in IT

If you browse the UI Logging SCN space then IT security is probably already an important matter to you. But did you know that security is ranked number three in this year’s most relevant IT trends? … needless to say that UI Logging and UI Masking deliver powerful features to improve the security in your SAP environment.

Read More »

How to Implement SAP UI Logging – User’s & Developer’s Point of View

Objective: To showcase the user and developer experience on using and implementing the SAP GUI Logging Solution for Windows. About Product: SAP UI Logging for windows will help to log/record all the activities/actions on the SAP GUI transaction code by the user. It logs every input or action or user entered value on the screen. Based on the logged data we can write our own rules to raise violations. It …

Read More »

‘Insider’ data leaks are costly – and hard to defend

The Economist recently featured a special report on cyber security, focussing on external threats to data security (mainly revolving around external threats posed e.g. by hackers). There is a also a paragraph homing in on inside threats in the article on “Digital Disease Control”: Inside threats appear to be a very costly risk: A study by Carnegie Mellon University of 100+ cases of intellectual property theft by insiders found that …

Read More »

Welcome to the UI logging SCN space!

UI logging provides features for logging of SAP access through the most relevant SAP UI and interface technologies (SAP GUI, Web Dynpro, RFC and many more). It complements existing security features by logging of what a user has seen and entered on an SAP frontend. One of its most relevant use case is the protection against data theft and data leakages. Logging provides a powerful and efficient way to increase …

Read More »

Checklist for evaluating a logging solution

    In case you need to evaluate an access logging solution, the following check list may be helpful: Overall quality of logged data: Does it provide enough detail and completeness for all of my use cases? Is the solution fully integrated into the SAP environment? Are there sufficient options for setting up filters on any level (from very broad to very detailed)? Can I maintain users in an inclusion / …

Read More »