Security

[53 Matches Found]
Page 1 of 3         1 2 3      
Article icon
by Abhijit Ingale, SAP Analytics Technical Architect, Tata Consultancy Services November 13, 2017
BI/HR/SAP Professional Journal – 

Big Data technologies offer a huge opportunity to organizations to consolidate data from a variety of data sources and derive meaningful insights from it that can help in achieving business growth. With this opportunity, there are also challenges with respect to information security. Database technologies offer a variety of ways to implement information security. SAP HANA uses analytic authorizations to implement row-level security ensuring the information is consumed only by its rightful users. However, SAP HANA does not offer a column-level security feature out of the box. Abhijit Ingale describes the process to implement column-level security in SAP HANA.


Article icon
by Akash Kumar, Technical Consultant, SAP Labs September 15, 2017
SAP Professional Journal/HR/SCM/BI/Financials – 

Akash Kumar explains the concept of blockchain and explores the services released by SAP Cloud Platform Blockchain service that allow users to develop blockchain scenarios.


Article icon
by Kehinde Eseyin, Security Architect June 14, 2017
SAP Professional Journal/BI/HR – 

Kehinde Eseyin shows how to activate tracing to resolve authorization errors in SAP HANA. You then can troubleshoot authorization errors related to repository role activation, SQL privileges, and analytical privileges.


Article icon
by Taha M. Mahmoud, Senior BI Consultant March 21, 2017
BI – 
Taha M. Mahmoud shows how to implement security in the Universe using enterprise database security tables. He also provides a comparison between using enterprise database security tables or using the Information Design Tool security editor to help you to understand when and where to use each approach.

Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Video icon
BI – 
In this demo video, Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create different security profiles.

Article icon
by Taha M. Mahmoud, Senior BI Consultant December 27, 2016
BI – 

Taha M. Mahmoud offers a comprehensive introduction to the enterprise security model in the SAP BusinessObjects BI platform. Learn about the main differences among the three different security levels in the SAP BusinessObjects BI platform 4.x: object-level, application-level, and Universe-level security. Find the right references to know more about each security level, and get two helpful security matrix templates to use for your own security implementation projects.


Article icon
by Rakesh Kalahasthi, Project Manager, PwC SDC, Bangalore, India March 8, 2016
SAP Professional Journal/BI – 

Rakesh Kalahasthi walks you through a step-by-step approach to overcome a limitation when you are developing geographical charts in SAP Lumira by pulling data from SAP Business Warehouse (SAP BW) powered by SAP HANA. SAP Lumira doesn’t allow you to create geographical charts by directly accessing SAP BW data models. This drawback can be addressed by importing optimized InfoCubes as native SAP HANA models and accessing them in SAP Lumira, which provides the ability to develop all types of geographical charts.


Article icon
by Ned Falk, Senior Education Consultant, SAP November 4, 2015
BI – 

Ned Falk gives an overview of the techniques used to build analytic privileges to control access to the data in information views (calculation, analytic, and attribute) in SAP HANA. He shows the options of using SQL privileges and XML-based analytical privileges, along with dynamic versions of both to accomplish row-level security. He also discusses the difference between both catalog (run-time) and repository (design-time) role creation of these privileges.


Article icon
by Ned Falk, Senior Education Consultant, SAP October 7, 2015
BI – 

Ned Falk gives an overview of the techniques used to build security roles to control access to data and the administration features of the SAP HANA database and how they should be assigned. With two graphical options for building roles, the design-time/repository method and the run-time/catalog method, learn the best option to use, and when.


Article icon
by Adam Getz, Manager – Business Intelligence, CGI Federal May 15, 2015
BI – 

Adam Getz explains how to configure and set up delegated administration in BusinessObjects Enterprise 4.1 for groups, and how to limit the availability of users and groups within the Central Management Console (CMC) to a specific sub-administrator group.


Article icon
by Kehinde Eseyin, Security Architect December 18, 2013
BI/Financials/SAP Professional Journal – 

Kehinde Eseyin explains how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.

 


Quick tips icon
by Ashish Saxena, Director, Accrete Solutions, LLC | LeighAnne Holtzman, Manager, Accrete Solutions, LLC May 15, 2013
BI/Financials/HR/SAP Professional Journal/SCM – 

/Project Management/Mobile – Here is a quick and handy guide to the SAP-related mobility options currently available.


Article icon
by William Newman, Managing Principal, Newport Consulting Group May 6, 2013
BI/SAP Professional Journal – 
Get a helpful, seven-point checklist on how to prepare your environment for data governance of mobile BI.

Article icon
by William Newman, Managing Principal, Newport Consulting Group May 6, 2013
BI/SAP Professional Journal – 

Data governance can cripple a good mobility program — or ensure its likely success.  Find out why data governance is important for mobile BI performance.


Article icon
by Sunil Mehta, Solution Architect, SAP | Biswajit Biswas, Subject Matter Expert in SAP Analytics, SAP GD April 26, 2013
BI/SAP Professional Journal – 

Learn how to create dashboards and mobile applications with SAP BusinessObjects Design Studio, and find out how Design Studio integrates with SAP NetWeaver BW. 


Article icon
by Jennifer McKune, Senior Consultant, Decision First Technologies February 13, 2013
BI – 
Through written instruction and a video demo, discover best practices for creating a corporate reporting template and learn tips and tricks for rapid template development within SAP BusinessObjects Web Intelligence.

Quick tips icon
by Judith M. Myerson , Systems Engineer and Architect/Owner December 17, 2012
BI/Financials/HR/SAP Professional Journal/SCM – 
Here is list of CRM security terms that you will find useful in helping you understand the concept using backup and recovery in depth.

Article icon
by Manoj Kunta, Certified SAP NetWeaver Security Architect August 1, 2012
BI – 
See how to simplify the security setup for SAP BusinessObjects reports when a user is reporting from SAP NetWeaver BW or from a non-SAP system.

Quick tips icon
by Scott Wallask, Managing Editor July 6, 2012
BI – 
From a BI technical team member’s view, a well-managed BI system must function within acceptable parameters.

Page 1 of 3         1 2 3