Security

[206 Matches Found]
Page 1 of 11         1 2 3 4 5 6 7 8 9 10      
Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. April 7, 2017
SAP Professional Journal/Financials – 
Joshu Madina explains the process of Information Lifecycle Management (ILM) enablement for SAP Access Control 10.1. He also provides you with details regarding blocking personal data after the residence period by limiting access, and the destruction of personal data after the retention period.

Article icon
by Taha M. Mahmoud, Senior BI Consultant March 21, 2017
BI – 
Taha M. Mahmoud shows how to implement security in the Universe using enterprise database security tables. He also provides a comparison between using enterprise database security tables or using the Information Design Tool security editor to help you to understand when and where to use each approach.

Article icon
by Sapna N. Modi, SAP Business Unit Automation Lead, L&T Infotech Ltd. March 1, 2017
SAP Professional Journal – 

Sapna Modi explains how to customize an ABAP Test Cockpit (ATC) check variant, to transport it, and to set up ATC reports. See how to decide if an error should be corrected or ignored and learn to manage the mass results of ATC reports runs. 


Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Video icon
BI – 
In this demo video, Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create different security profiles.

Article icon
by Taha M. Mahmoud, Senior BI Consultant December 27, 2016
BI – 

Taha M. Mahmoud offers a comprehensive introduction to the enterprise security model in the SAP BusinessObjects BI platform. Learn about the main differences among the three different security levels in the SAP BusinessObjects BI platform 4.x: object-level, application-level, and Universe-level security. Find the right references to know more about each security level, and get two helpful security matrix templates to use for your own security implementation projects.


Article icon
by Hernan Huwyler, Risk Management and Internal Control Director, Veolia September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Juan Pablo Perez-Etchegoyen, CTO, Onapsis September 2, 2016
SAP Professional Journal/Financials – 
Juan Pablo Perez-Etchegoyen explains the details of the United States Computer Emergency Readiness Team (US-CERT) alert TA16-132A issued by the US Department of Homeland Security (DHS) and the vulnerability that triggered it. He also describes the mitigation steps that organizations using SAP systems need to follow to close the security gap potentially opened by this vulnerability.

Video icon
by Jonathan Haun, Director, Data and Analytics, Protiviti May 13, 2016
SAP Professional Journal – 
Jonathan Haun explains how SAP HANA’s security mechanism works and gives expert recommendations on how to implement and maintain the best security models for your SAP HANA system.

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Rakesh Kalahasthi, Project Manager, PwC SDC, Bangalore, India March 8, 2016
SAP Professional Journal/BI – 

Rakesh Kalahasthi walks you through a step-by-step approach to overcome a limitation when you are developing geographical charts in SAP Lumira by pulling data from SAP Business Warehouse (SAP BW) powered by SAP HANA. SAP Lumira doesn’t allow you to create geographical charts by directly accessing SAP BW data models. This drawback can be addressed by importing optimized InfoCubes as native SAP HANA models and accessing them in SAP Lumira, which provides the ability to develop all types of geographical charts.


Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys March 3, 2016
SAP Professional Journal/HR – 

Nitin Aggarwal and Sanjeev Kotwal show how to use the training verification functionality in SAP Access Control to automate the training check in the user access provisioning process.


Article icon
by Faisal Altaf, SAP Technical Division Head, Al Yamamah Steel Industries Co. January 25, 2016
SAP Professional Journal – 
Faisal Altaf explains how to generate email alerts on the display or change of any critical node in the SAP Customizing IMG (transaction code SPRO) using an implicit enhancement option. For example, if any user wants to display or change rule maintenance of Bank Communication Management, which is a very critical part of the configuration, the system should send alerts to managers so that they can take immediate action against the activity if required.

Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. November 16, 2015
Financials – 

Kehinde Eseyin shows how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents.


Article icon
by Anjali Butley, Solution Architect, SAP SCM and SAP Integrated Business Planning November 11, 2015
SCM/SAP Professional Journal – 
Anjali Butley explains how to manage stakeholder access for SAP Integrated Business Planning for sales and operations 4.0. She also describes the challenges of ensuring that SAP Integrated Business Planning for sales and operations data is accessed and shared by the right users.

Article icon
by Ned Falk, Senior Education Consultant, SAP November 4, 2015
BI – 

Ned Falk gives an overview of the techniques used to build analytic privileges to control access to the data in information views (calculation, analytic, and attribute) in SAP HANA. He shows the options of using SQL privileges and XML-based analytical privileges, along with dynamic versions of both to accomplish row-level security. He also discusses the difference between both catalog (run-time) and repository (design-time) role creation of these privileges.


Article icon
by Ned Falk, Senior Education Consultant, SAP October 7, 2015
BI – 

Ned Falk gives an overview of the techniques used to build security roles to control access to data and the administration features of the SAP HANA database and how they should be assigned. With two graphical options for building roles, the design-time/repository method and the run-time/catalog method, learn the best option to use, and when.


Article icon
by Jonathan Haun, Director, Data and Analytics, Protiviti September 14, 2015
SAP Professional Journal – 

When organizations implement SAP HANA, they need to devise a strategy to protect the data that the system manages in-memory. Depending on your SAP HANA use case, failure to protect this data can lead to significant monetary or productivity losses. One way to protect the data is through the implementation of a backup and restore strategy. Jonathan Haun helps to fortify your general knowledge of the SAP HANA backup and restore process and also discusses a few key questions that should be asked when devising a backup strategy for SAP HANA.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. July 20, 2015
SAP Professional Journal/Financials – 

Kehinde Eseyin provides concise descriptions of associated risks with security vulnerabilities in the SAP HANA landscape and offers recommendations to prevent the identified risks from materializing. The preventive measures he describes provide information about what auditors and auditees should be interested in when planning and performing a technical review of an SAP HANA database system.


Page 1 of 11         1 2 3 4 5 6 7 8 9 10