Security

[87 Matches Found]
Page 1 of 5         1 2 3 4 5      
Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. April 7, 2017
SAP Professional Journal/Financials – 
Joshu Madina explains the process of Information Lifecycle Management (ILM) enablement for SAP Access Control 10.1. He also provides you with details regarding blocking personal data after the residence period by limiting access, and the destruction of personal data after the retention period.

Article icon
by Hernan Huwyler, Risk Management and Internal Control Director, Veolia September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Juan Pablo Perez-Etchegoyen, CTO, Onapsis September 2, 2016
SAP Professional Journal/Financials – 
Juan Pablo Perez-Etchegoyen explains the details of the United States Computer Emergency Readiness Team (US-CERT) alert TA16-132A issued by the US Department of Homeland Security (DHS) and the vulnerability that triggered it. He also describes the mitigation steps that organizations using SAP systems need to follow to close the security gap potentially opened by this vulnerability.

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Kehinde Eseyin, Security Architect, Turnkey Consulting Ltd. December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Kehinde Eseyin, Security Architect, Turnkey Consulting Ltd. November 16, 2015
Financials – 

Kehinde Eseyin shows how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents.


Article icon
by Kehinde Eseyin, Security Architect, Turnkey Consulting Ltd. July 20, 2015
SAP Professional Journal/Financials – 

Kehinde Eseyin provides concise descriptions of associated risks with security vulnerabilities in the SAP HANA landscape and offers recommendations to prevent the identified risks from materializing. The preventive measures he describes provide information about what auditors and auditees should be interested in when planning and performing a technical review of an SAP HANA database system.


Video icon
by Michael Kosonog, Partner Deloitte Consulting June 29, 2015
Financials/SAP Professional Journal – 

Walk through five required attributes to effectively track the SAP control optimization activities at your organization. Gather tips and tricks for applying the appropriate governance and organizational recommendations within your current control environment to increase adoption and sustainability of optimization efforts.


Video icon
by Tom LaBonte, Senior Manager, Risk and Vulnerability Team, Honeywell Global Security June 29, 2015
Financials/SAP Professional Journal – 

Learn how Honeywell implemented and continues to use SAP Access Control 10.1.


Video icon
Financials/SAP Professional Journal – 

In this video, walk through a maturity model that provides the core characteristics of top-performing organizations, including what separates them from bottom-performing organizations.


Video icon
by Gordon Roland, SAP Security, Controls, and GRC Solutions Senior Consultant, PwC August 14, 2014
Financials/SAP Professional Journal – 

Internal mistakes, fraud, and vendor inconsistencies all can wreak havoc on your accounts payable and purchasing activities. In this video Gordon Roland of PwC explains how to implement both standard ERP and SAP GRC functionality to solve these common problems within the purchase-to-payables process.


Article icon
by Gary Byrne, Managing Editor, Financials Expert and SCM Expert February 28, 2014
Financials – 

Bruce Carpenter offers some advice on how organizations can meet challenges pertaining to internal auditing and risk assessment.


Quick tips icon
by Meta Hoetjes, SAP Security Expert, CSI-tools December 31, 2013
SAP Professional Journal/Financials – 
Meta Hoetjes defines what access governance is and explains why it is so important for organizations to use good supporting tools for implementing access governance in organizations using SAP systems.

Article icon
by Kehinde Eseyin, Security Architect, Turnkey Consulting Ltd. December 18, 2013
BI/Financials/SAP Professional Journal – 

Kehinde Eseyin explains how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.

 


Video icon
by Tracy Levine, SAP Application Consultant, itelligence November 27, 2013
SAP Professional Journal/Financials – 
In this webinar, Tracy Levine, SAP GRC Consultant at itelligence, discusses strategies around surviving an SAP security audit and maintaining compliance objectives long term. Tracy shares her methodology around optimizing your SAP security landscape and utilizing SAP Access Control to prevent reintroduction from risk exposures by taking an audit approach to SAP security.

Article icon
by Gary Byrne, Managing Editor, Financials Expert and SCM Expert November 19, 2013
SAP Professional Journal/Financials – 

Rajeev Menon, of Wharfedale Technologies Inc., shares some of the knowledge he has gleaned about securing SAP systems, cloud computing, and disaster recovery design and implementation.


Article icon
by Gary Byrne, Managing Editor, Financials Expert and SCM Expert October 1, 2013
SAP Professional Journal/Financials – 

In this Spotlight Q&A, Onapsis CEO Mariano Nunez responded to a few of my questions about securing SAP systems, mobile applications, and cloud services.


Video icon
by Bruce McCuaig, Director, Solution Marketing, Governance, Risk, and Compliance, SAP August 23, 2013
SAP Professional Journal/Financials – 

In this video recording of a session from GRC 2013, you’ll learn about the new landscape of corporate governance and enterprise risk management shaped by the causes and effects of the recent global economic crisis. Learn how to:

  • Create an enterprise risk management strategy that encompasses a broad set of ever-changing risks that affect an organization's strategic business objectives
  • Identify and address possible events and situations that may affect your company's ability to optimize performance and achieve organizational goals
  • Establish a top-down approach to integrated risk management based on how forward-thinking companies are combining risk and strategy discussions in their board and executive management meetings

Article icon
by Dr. Susanne Rothaug, Solution Manager, SOA Middleware, SAP AG | Matthias Kaempfer, Solution Manager, SAP NetWeaver Foundation, SAP August 20, 2013
SAP Professional Journal/Financials – 

Follow these typical scenarios of an implementation of SAP NetWeaver Single Sign-On. They reflect the challenges that users face with authentication in heterogeneous environments and show how SAP NetWeaver Single Sign-On can help overcome them. You can use it in the most diverse environments, including on-premise, on-demand, and legacy applications.


Article icon
by Alpesh Parmar, Managing Partner, ultimumIT, Inc. August 19, 2013
HR/SAP Professional Journal/Financials – 

Learn steps to configure SAP Access Control 10.0 to integrate with SAP ERP HCM. Take advantage of the HR Trigger functionality in SAP Access Control 10.0 to automatically provision and de-provision access via HR event triggering.


Page 1 of 5         1 2 3 4 5