SAP UI Data Protection Logging & Masking

The Solutions

Enterprises today are exposed to an ever-broadening range of IT security threats, from emailed viruses, to targeted phishing-style attacks that trick employees into clicking on dangerous links that install malware, steal credentials, or in some other way jeopardise the security of the enterprise. As threats have evolved over time, new approaches to threat detection and remediation have become necessary for organisations that are at risk.

UI data protection masking and UI data protection logging empower businesses to have control over which data, if deemed sensitive, should remain visible for a user to fulfill his or her job. It keeps an audit trail of user access and analyses it, helping eliminate the need to micromanage.

UI data protection masking and UI data protection logging target insider threats — be they intentional or unintentional. Rules can be set to obfuscate or reveal specific data to users according to nominated authorization levels.

The process of masking happens on the server side but only at the user interface layer and does not impact the application or data base layers. Masking is commonly used in concealing data such as personally identifiable information (PII), HR, financials, intellectual property, customer information, trade secrets, and anything that can be subject to harmful intent or mistake, thereby putting the business at significant risk.

UI logging is the ability to gather audit logs, allowing tracking and tracing of the journey of the data, including users who accessed them. It is synonymous to leaving a fingerprint at every turn. This is ideal for audit and investigative processes.

UI masking and UI logging also help address regulatory compliance requirements such as General Data Protection Regulation (GDPR). It may be EU-centric, but the regulation affects anyone or any entity outside of the EU who accesses, processes, or stores data of EU natural persons.

More and more geographies are enacting similar legislation, often based on a similar direction as GDPR, such as the California Consumer Privacy Act (CCPA).

Click here to arrange a demo & solution overview

Arrange a 1:1 demo

 

Insights:

To help clients, Winterhawk has created:

The History of  UI Data Protection Logging & Masking.

Click the thumbnail to open in a new window.

Client Success Stories

Hundreds of satisfied clients around the world

SAP Security Authorisation concepts enable an administration to restrict sensitive access by transaction codes (and different values), and Access Control systems can help to detect Segregation of Duties, but there are two key things that they cannot do – and that’s where UI Data Protection Logging and Masking have become critical applications, providing an additional security layer.

Masking allows you to make specific data unusable to all but specifically-defined users; logging keeps data accessible while logging & analysing access, to then take appropriate measures. Both UI Data Protection Logging and Masking are quick to deploy. With no additional infrastructure required, they’re proving increasingly popular with clients seeking to increase data protection assurance.

Implementation

We offer a fast low cost deployments of SAP UI Logging and/or UI Masking. Typically deployed in less than 30 days.

Purchase options

Available either On Premise (client hosted – perpetual license) or via Cloud for UI Data Protection Logging & Cloud for UI Data Protection Masking (SAP hosted – subscription license).

Get in touch

Get in touch for a solution demo, or to discuss implementing  UI Data Protection Logging & Masking.