SAP Security consulting, how to choose?

Posted by Klea Duro on May 26, 2023 8:15:00 AM

There are many companies that provide SAP consulting. Each of these, in most cases, also provides support in the SAP security area.

 

 

This is absolutely normal. But what is the degree of expertise on these issues?

Read More

Functional stupidity (digital stupidity) in Cyber Security

Posted by Klea Duro on May 19, 2023 8:15:00 AM

How much does slavishly following company procedures lead to problems?

 

Are there any solutions? But what are the impacts in security management? Can we be affected by digital stupidity?

Read More

Is creating users by copying wrong?

Posted by Klea Duro on May 12, 2023 8:15:00 AM

How many times have we heard in the company when creating a new user, "give me a colleague as a reference," that is, in the process of defining a new user, we reason more by copy than by corporate trade.

 

But is this approach correct? Or does it present some possible problems?

Read More

WHAT ARE SAP HANA ROLES?

Posted by Klea Duro on May 5, 2023 8:15:00 AM

Profiling also exists and can be implemented in the SAP HANA database.

 

 

But not all roads lead to the same result. Some choices may not be ideal in the long run and in the management of authorizations in SAP HANA. What is important to know when defining SAP HANA roles?

 

This is not always done as this database is mainly used when using SAP applications. Such as S/4HANA.

Read More

BioLock for SAP: what is it?

Posted by Andrea Mazzolani on Apr 28, 2023 8:15:00 AM

Topics like Least Privileged Access, True Compliance and Accountability are commonplace when it comes to SAP Security.

 

 

However, an additional layer of protection, that of biometrics, can be added to the existing set of standard security tools provided by SAP.

 

Read More

Topics: governance, sap cyber security, Threat detection, biometric

SAP User Management: password, 5 points for reflection

Posted by Andrea Mazzolani on Apr 21, 2023 8:15:00 AM

Do you use a password to login to SAP systems?

Which are the most obvious cases which you should pay attention to?

Read More

Topics: sap password, sap logon

SOAR, what does it mean? Why is it important?

Posted by Andrea Mazzolani on Apr 14, 2023 8:15:00 AM

SOAR is the acronym for Security Orchestration, Automation, and Response.

 

Why is it important to know what it is and how is it used? The definition of a SOAR SAP Security system is strategic.

 

Read More

Topics: soar, sap siem, sap etd, sap splunk

Teal Organization and SAP Security, what does it mean?

Posted by Andrea Mazzolani on Apr 7, 2023 8:15:00 AM

Have you ever heard of this kind of organization?

 

What is it? How does it work? How is SAP Security managed in this kind of organizations?

Read More

Topics: sap security teal

SAP AMS Support, How to Choose?

Posted by Andrea Mazzolani on Mar 31, 2023 8:15:00 AM

What is it? How should you structure it in our opinion?

 

 

How should you prepare to activate and evaluate it?

Read More

Topics: security ams, supporto sap ams

Standard SAP Roles, are they used or it's better not to use them?

Posted by Andrea Mazzolani on Mar 24, 2023 8:15:00 AM

 

SAP provides pre-defined roles instead of having to create them from scratch.

 

 

Is it worth using them or not? Why are they often, or almost always, not used?

Read More

Topics: pfcg, sap standard role

Content not found

Yes Subscribe!

Blog Aglea, what you could find out?

Every Friday a new post, interview or content related to SAP Security.

  • Tips on how to design SAP Security
  • How to
  • Checklist
  • Common error and pitfall on security SAP
  • Interview with experts
  • Who we are and Aglea vision on SAP Security

Recent Posts

Post By Topic

See all