SAP Fiori Launchpad the latest GUI to be able to use the latest SAP products.
How is it used? What aspects are also relevant to end users?
SAP Fiori Launchpad the latest GUI to be able to use the latest SAP products.
How is it used? What aspects are also relevant to end users?
Topics: FIORI Security, SAP FIORI Security
Microsoft Sentinel and SAP: How can these systems be leveraged to have continuous threat monitoring in SAP systems? How do you protect data security in SAP with this tool?
A recent but promising solution for Continuous Threat Monitoring management for SAP systems.
Have you ever wondered how to spell, correctly, the acronyms of SAP products?
Did you know that if publications are made with incorrect acronyms, it is not allowed by SAP?
This is a new model to strive for. Definitely not easy as of today to implement. Unfortunately, it cannot be purchased!
But how could it be in SAP?
Topics: sap sso, zero trust security
Did you know that there are "special" SAP users whose credentials are known, public?
This is not an SAP oversight; it is something known and familiar. Especially in the initial setup processes of the system, utilities are activated that should be secured immediately thereafter. But what are they and what should you do?
Topics: sap super user, cyber security, sap password, password policy, userid
In this series of articles we discuss the "tip" of the day. That is, real cases of requests received in counseling.
Today we discuss "is it worth using user parameters to manage permissions?" What are the advantages and disadvantages?
Topics: SAP IDM, SAP GRC, sap gui, parameter sap
In the day-to-day these terms are often used as synonyms , but they're actually not
They can be confused and often it's not clear whether it's correct to talk about SAP profiles or roles. Let's try to underline the differences between these two terms, by starting from the past!
Topics: sap security blog, HANA Roles, authorization concept, authorization model, Profiles
For some SE16 may be an unknown acronym. For others it is the "bread and butter." It is a SAP transaction remarkably familiar to administrators. And often not only them, unfortunately.
But what is it used for? How many versions of it are there? How do you use it and what are the risks involved?
We discuss it in this article!
Topics: SAP Security, SAP GDPR, sap query, supporto sap ams, se16, se16n
This one's a bad habit. Most common causes are:
Why should you remove these users, even non-interactive ones, ASAP? Let's see some examples!
Topics: sap_all, auditing, rfc, rfc security, rfc destination, system users
Every Friday a new post, interview or content related to SAP Security.
Aglea s.r.l. - Subject to the management and coordination of Horsa S.p.A. - P. IVA: IT 03868780960 - 2024 | Privacy Policy - Cookie Policy