Adopt Data Management Strategies to Optimize SAP CRM 7.0

  • by Kehinde Eseyin, Security Architect
  • August 25, 2009
Effective data management and appropriate configuration settings go a long way to combat the effect that high data growth in database tables has on system performance. Learn how to manage SAP CRM tables that are vulnerable to high volume data growth by leveraging data management best practices and customization settings to enhance the performance of your SAP CRM 7.0 system.
Key Concept

Data management for SAP CRM database tables involves several activities (e.g., data prevention, deletion, archiving, and reorganization) that ensure the data in SAP CRM-related tables is necessary for SAP CRM core business processes. Data management also helps ensure that database tables do not grow large enough to affect the performance of the SAP CRM system.

SAP CRM 7.0 generates a high volume of data during transaction processing of sales, marketing, and service activities. High volumes of table growth can have a serious effect on the performance and availability of your SAP CRM system. In fact, if database growth is not properly controlled, it can lead to a blockage of all dialog work processes, system downtime, and a consequent loss of sales and revenue.

You can employ a number of data or table management strategies to effectively manage and control database growth — including data prevention, data deletion, data archiving, and data reorganization. Although these data management approaches differ conceptually, they all strive to ensure that data does not grow unnecessarily large in order to optimize disk space usage and enhance your system performance.

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.