logging of Web Client UI
11 Blog Posts
6 Contributors
-
Sorry to disappoint you, but no, NSA’s mission statement is not “In God We Trust, All the Others We Monitor” but something much less controversial, albeit more ambitious I find: “Defending our Nation. Securing the Future”. Regardless, I... Read More »2Comments1Like
-
This blog will provide the steps to identify the Fiori apps and assign them to users. SAP Fiori SAP Fiori Design SAP Fiori was introduced in 2013 and has since then evolved from a collection of apps into the new user experience for SAP software.... Read More »20Comments32Likes
-
There are a few definitions of Digital Trust out there, so I won’t create a new one. Instead I’ll simply refer to PwC’s that I think is very clear and straight forward: “the level of confidence in people, processes and technology to build a... Read More »0Comments0Likes
-
Former Member posted on January 19, 2016In this blog I am going to describe how we can replace the standard Service data with custom Service data for SRM Applications. Below is the screen shot which is contain standard service data, To replace this standard data with custom data , we... Read More »0Comments0Likes
-
ITRC (Identity Theft Resource Center) has released a report that highlights again just how prevalent – and troubling – record-exposing data breaches have become. ITRC collected 533 data breaches in 2015, exposing over 140 million... Read More »0Comments0Likes
-
For describing the misuse of the internet, words starting with “cyber…”, like cyberwar, cybertheft, cybermobbing, are commonly used. Normally people then mean attacks through the internet, possibly by hackers. The prefix... Read More »0Comments1Like
-
If you browse the UI Logging SCN space then IT security is probably already an important matter to you. But did you know that security is ranked number three in this year’s most relevant IT trends? … needless to say that UI... Read More »0Comments1Like
-
Objective: To showcase the user and developer experience on using and implementing the SAP GUI Logging Solution for Windows. About Product: SAP UI Logging for windows will help to log/record all the activities/actions on the SAP GUI transaction... Read More »15Comments10Likes
-
The Economist recently featured a special report on cyber security, focussing on external threats to data security (mainly revolving around external threats posed e.g. by hackers). There is a also a paragraph homing in on inside threats in... Read More »0Comments0Likes
-
In case you need to evaluate an access logging solution, the following check list may be helpful: Overall quality of logged data: Does it provide enough detail and completeness for all of my use cases? Is the solution fully... Read More »0Comments1Like