Have you replaced the database with SAP HANA? There are several new Security features to activate!
Enable all features for SAP HANA Security! Follow the tips to protect data and ensure database compliance.
Have you replaced the database with SAP HANA? There are several new Security features to activate!
Enable all features for SAP HANA Security! Follow the tips to protect data and ensure database compliance.
Topics: SAP Security, auditing, sap hana
Data retrieval is normal in a management system. But what are the tools available in a SAP ERP system? Is it correct reporting in a transactional system?
What are the security impacts in doing corporate data reporting in SAP and how can they be mitigated? What is the SAP query survival manual?
Topics: governance, tabelle, sicurezza dei dati sap, sap consulenza security, sap query
Currently, there is no one-size-fits-all solution to address all the issues required by the GDPR.
SAP proposes different systems, see what they are and what they are used for. SAP offers different systems: what are those and what are they for?
Topics: SAP GDPR, sap ilm gdpr, sap tdms, sap data masking, data privacy
Having within the company’s awareness also on the part of SAP developments is certainly important. Especially in order not to be dependent on third parties even for simple problems.
We don’t talk about ABAP developers directly. But what are or could be the impacts in having an internal group of developers for the security aspects.
Is it better, regarding the SAP security, to have an internal or external development team?
Topics: programmazione sicura, codice sicuro SAP, CVA
Is it possible to customize passwords for categories of users? Where and how are passwords managed in SAP?
How can these aspects be checked during an audit?
Topics: sap password, secpol, password policy
Those areas that are often poorly guarded, when you send emails, may contain sensitive or personal data in the body of the email or in the attachments.
In SAP there is a feature to see all outgoing mails from SAP, also in content terms. Let us see what it is and why it is often underestimated in terms of security.
Topics: sap password, mail security sap, sost
Do we need days of work every time we have to deal with this issue?
To understand which licenses and how to read the reports extracted from SAP?
Some tips in this article to make the licensing process easier in SAP.
Topics: usmm, sap license auditing, slaw, audit sap
What are the main questions before starting a revising project of the authorizations in SAP?
Topics: SAP Security, S4/HANA, documentazione sap security
How does one know if you have set up a good authorization concept in SAP??
What are the metrics and how to best exploit them? Does a SAP Security Score exist?
Topics: User Access Management, sap custom, autorizzazioni sap, Statistiche security SAP
Is it really possible that external consultants do not have any access to SAP production systems?
Clearly there are various case studies, occasional or ongoing consultants, for example for maintenance contracts.
Is it really necessary to release an access to the production systems even in this last case? Can we control what happens and why it is requested?
Every Friday a new post, interview or content related to SAP Security.
Aglea s.r.l. - Subject to the management and coordination of Horsa S.p.A. - P. IVA: IT 03868780960 - 2024 | Privacy Policy - Cookie Policy