Security

[209 Matches Found]
Page 1 of 11         1 2 3 4 5 6 7 8 9 10      
Article icon
by Abhijit Ingale, SAP Analytics Technical Architect, Tata Consultancy Services November 13, 2017
BI/HR/SAP Professional Journal – 

Big Data technologies offer a huge opportunity to organizations to consolidate data from a variety of data sources and derive meaningful insights from it that can help in achieving business growth. With this opportunity, there are also challenges with respect to information security. Database technologies offer a variety of ways to implement information security. SAP HANA uses analytic authorizations to implement row-level security ensuring the information is consumed only by its rightful users. However, SAP HANA does not offer a column-level security feature out of the box. Abhijit Ingale describes the process to implement column-level security in SAP HANA.


Article icon
by Akash Kumar, Technical Consultant, SAP Labs September 15, 2017
SAP Professional Journal/HR/SCM/BI/Financials – 

Akash Kumar explains the concept of blockchain and explores the services released by SAP Cloud Platform Blockchain service that allow users to develop blockchain scenarios.


Quick tips icon
by Andrea Haynes, Group Editor, SAP Experts August 8, 2017
SAP Professional Journal/Financials/HR – 

Raymond Mastre, a director at PwC and a speaker at the GRC 2017 SAPinsider conference in Las Vegas, discusses SAP system security.



Article icon
by Kehinde Eseyin, Security Architect June 14, 2017
SAP Professional Journal/BI/HR – 

Kehinde Eseyin shows how to activate tracing to resolve authorization errors in SAP HANA. You then can troubleshoot authorization errors related to repository role activation, SQL privileges, and analytical privileges.


Article icon
by Taha M. Mahmoud, Senior BI Consultant March 21, 2017
BI – 
Taha M. Mahmoud shows how to implement security in the Universe using enterprise database security tables. He also provides a comparison between using enterprise database security tables or using the Information Design Tool security editor to help you to understand when and where to use each approach.

Article icon
by Sapna N. Modi, SAP Practice Unit & Key Accounts Automation Champion, L&T Infotech Ltd (LTI) March 1, 2017
SAP Professional Journal – 

Sapna Modi explains how to customize an ABAP Test Cockpit (ATC) check variant, to transport it, and to set up ATC reports. See how to decide if an error should be corrected or ignored and learn to manage the mass results of ATC reports runs. 


Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Video icon
BI – 
In this demo video, Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create different security profiles.

Article icon
by Taha M. Mahmoud, Senior BI Consultant December 27, 2016
BI – 

Taha M. Mahmoud offers a comprehensive introduction to the enterprise security model in the SAP BusinessObjects BI platform. Learn about the main differences among the three different security levels in the SAP BusinessObjects BI platform 4.x: object-level, application-level, and Universe-level security. Find the right references to know more about each security level, and get two helpful security matrix templates to use for your own security implementation projects.


Article icon
by Hernan Huwyler, Risk and Compliance Expert September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Juan Pablo Perez-Etchegoyen, CTO, Onapsis September 2, 2016
SAP Professional Journal/Financials – 
Juan Pablo Perez-Etchegoyen explains the details of the United States Computer Emergency Readiness Team (US-CERT) alert TA16-132A issued by the US Department of Homeland Security (DHS) and the vulnerability that triggered it. He also describes the mitigation steps that organizations using SAP systems need to follow to close the security gap potentially opened by this vulnerability.

Video icon
by Jonathan Haun, Director, Data and Analytics, Protiviti May 13, 2016
SAP Professional Journal – 
Jonathan Haun explains how SAP HANA’s security mechanism works and gives expert recommendations on how to implement and maintain the best security models for your SAP HANA system.

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Rakesh Kalahasthi, Project Manager, PwC SDC, Bangalore, India March 8, 2016
SAP Professional Journal/BI – 

Rakesh Kalahasthi walks you through a step-by-step approach to overcome a limitation when you are developing geographical charts in SAP Lumira by pulling data from SAP Business Warehouse (SAP BW) powered by SAP HANA. SAP Lumira doesn’t allow you to create geographical charts by directly accessing SAP BW data models. This drawback can be addressed by importing optimized InfoCubes as native SAP HANA models and accessing them in SAP Lumira, which provides the ability to develop all types of geographical charts.


Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys March 3, 2016
SAP Professional Journal/HR – 

Nitin Aggarwal and Sanjeev Kotwal show how to use the training verification functionality in SAP Access Control to automate the training check in the user access provisioning process.


Article icon
by Faisal Altaf, SAP Technical Division Head, Al Yamamah Steel Industries Co. January 25, 2016
SAP Professional Journal – 
Faisal Altaf explains how to generate email alerts on the display or change of any critical node in the SAP Customizing IMG (transaction code SPRO) using an implicit enhancement option. For example, if any user wants to display or change rule maintenance of Bank Communication Management, which is a very critical part of the configuration, the system should send alerts to managers so that they can take immediate action against the activity if required.

Article icon
by Kehinde Eseyin, Security Architect December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Kehinde Eseyin, Security Architect November 16, 2015
Financials – 

Kehinde Eseyin shows how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents.


Article icon
by Anjali Butley, Solution Architect, SAP SCM and SAP Integrated Business Planning November 11, 2015
SCM/SAP Professional Journal – 
Anjali Butley explains how to manage stakeholder access for SAP Integrated Business Planning for sales and operations 4.0. She also describes the challenges of ensuring that SAP Integrated Business Planning for sales and operations data is accessed and shared by the right users.

Article icon
by Ned Falk, Senior Education Consultant, SAP November 4, 2015
BI – 

Ned Falk gives an overview of the techniques used to build analytic privileges to control access to the data in information views (calculation, analytic, and attribute) in SAP HANA. He shows the options of using SQL privileges and XML-based analytical privileges, along with dynamic versions of both to accomplish row-level security. He also discusses the difference between both catalog (run-time) and repository (design-time) role creation of these privileges.


Page 1 of 11         1 2 3 4 5 6 7 8 9 10