Records all behavioral data of users who handle sensitive data within the SAP system using the 5W1H method to comply with legal regulations and enforce internal security system.
Situation
Overview
A new security device is required due to the increased value of information and tightened regulations.
01. Solution Outline
02. System Architecture
Features
Behavioral Data Record
Records user behavioral information using the 5W1H method
Behavioral Data Record
Records user behavioral information using the 5W1H method
Respond to Audit Regulations
Provides log sheets for responding to a security audit or IT audit
Respond to Audit Regulations
Provides log sheets for responding to a security audit or IT audit
Manage Log Volume
Compresses and stores the refined logs and separately stores any expired logs
Manage Log Volume
Compresses and stores the refined logs and separately stores any expired logs
Add-on Software
No additional server or report modification or development is required
Add-on Software
No additional server or report modification or development is required
Permission Control
Records or manages the reason for downloading and controls access per accessing media
Permission Control
Records or manages the reason for downloading and controls access per accessing media
Status Monitoring
Monitors work progress and sends an alarm upon finding a threat
Status Monitoring
Monitors work progress and sends an alarm upon finding a threat
Records all behavioral data of users who handle sensitive data within the SAP system using the 5W1H method to comply with legal regulations and enforce internal security system.
Situation
Overview
A new security device is required due to the increased value of information and tightened regulations.
01.
Solution Outline
02.
System Architecture
Features
Record Behavioral Data
Records user behavioral information using the 5W1H method
Record Behavioral DataRecords user behavioral information using the 5W1H method
Respond to Audit Regulations
Provides log sheets for responding to a security audit or IT audit
Respond to Audit RegulationsProvides log sheets for responding to a security audit or IT audit
Manage Log Volume
Compresses and stores the refined logs and separately stores any expired logs
Manage Log VolumeCompresses and stores the refined logs and separately stores any expired logs
Add-on Software
No additional server or report modification or development is required
Add-on SoftwareNo additional server or report modification or development is required
Permission Control
Records or manages the reason for downloading and controls access per accessing media
Permission ControlRecords or manages the reason for downloading and controls access per accessing media
Status Monitoring
Monitors work progress and sends an alarm upon finding a threat
Status MonitoringMonitors work progress and sends an alarm upon finding a threat
Benefits
Response to Legal Regulations
Responds to legal regulations while tracking and monitoring violations of data protection rules.
Response to Legal Regulations
Responds to legal regulations while tracking and monitoring violations of data protection rules.
Audit Data Support
Collects evidence of violations to support quick audit and data generation.
Audit Data Support
Collects evidence of violations to support quick audit and data generation.
Log Forgery Prevention
Collects and saves time series log data to prevent log forgery.
Log Forgery Prevention
Collects and saves time series log data to prevent log forgery.
Access Control
Controls user access and tracks permission changes to enhance internal and external security.
Access Control
Controls user access and tracks permission changes to enhance internal and external security.
Behavior Detection
Detects threatening behaviors of users and protects business assets.
Behavior Detection
Detects threatening behaviors of users and protects business assets.
Intrusion Analysis & Tracking
Detects leakage of sensitive data as well as analyzes and tracks intrusion patterns
Intrusion Analysis & Tracking
Detects leakage of sensitive data as well as analyzes and tracks intrusion patterns