Combat Cybercrime And Secure The Intelligent Enterprise

This session shows how Security Event Management and – Monitoring is set up and implemented in practice. Furthermore, it covers topics such as:

- Dealing with Big Data
- Setup and implementation of security relevant processes
- Attack vectors and how they can be analyzed

This content is available to SAPinsider Premium Members.Please click below to log in or create an account

Login Now »


Create Account »

EXPLORE BY TOPIC