Support  |  1-800-620-4210  |  

Webinar September 02nd : Can You Control Cloud Application Risks With Your SAP Compliance Program? by Isaac Kimmel

Why is SAP security audit logging important? 

It is very likely that the usage of the Security Audit Log is already required in your organization from an audit or compliance perspective. But why is it required? The SAP security audit logging tool is designed to help auditors take a detailed look at what occurs in your AS ABAP system. The tool is intended to capture detailed information that may otherwise be missed and can then be reviewed by team members or auditors as needed. Examples of the type of information it captures are successful and unsuccessful login attempts, changes to user master records, and changes to the audit configuration. All of this information is critical and should be logged. You can’t just assume that this information is being captured elsewhere and if you wait for an incident to occur it might be too late! 

Join Isaac Kimmel, Senior Product Manager at Security Weaver, as he discusses reasons that turning on your SAP audit log is important and how it can ensure better reporting come audit time. In this webinar, Isaac will explain what a security audit log is, why it matters, and practical considerations to take into account when planning your security audit plan.

Click here for details on how to attend the webinar event, and to view the recording following the live session.

Here's a sneak peek into our previous webinar. To watch the full recording, Join our Security Weaver User Group on LinkedIn.

February 25, 2021 - Guarding Your Precious Assets - 3 Ways to Protect SAP by Devin McLaughlin

Devin McLaughlin, Senior Manager of Client Engagement & Global Service Delivery at Security Weaver, will discuss three key ways to maintain the security of your SAP environment. Examples will include how to automate security audit logging, what security-related parameters need to be set to safeguard your SAP landscape, and how continuous monitoring can help you avoid gaps in your security.

Watch Full Video

Related Topics
Role lifecycle Management
Reporting & Analytics
User Transaction Monitoring
Audit Trial
Transaction Archive