Security and Authorizations

[35 Matches Found]
Page 1 of 2         1 2      
Article icon
by Hernan Huwyler, Risk Management and Internal Control Director, Veolia September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Alpesh Parmar, Managing Partner, ultimumIT, Inc. August 19, 2013
HR/SAP Professional Journal/Financials – 

Learn steps to configure SAP Access Control 10.0 to integrate with SAP ERP HCM. Take advantage of the HR Trigger functionality in SAP Access Control 10.0 to automatically provision and de-provision access via HR event triggering.


Article icon
by Eric Wood, SAP ERP HCM/SuccessFactors Solution Architect, Presence of IT February 26, 2013
HR – 

In this article by Eric Wood, he shows you how to craft an effective SAP HR security strategy using structural authorizations and position-based security. Learn step-by-step guidelines for designing appropriate SAP HR strategy and how to implement structural authorizations.


Quick tips icon
by Judith M. Myerson , Systems Engineer and Architect/Owner December 17, 2012
BI/Financials/HR/SAP Professional Journal/SCM – 
Here is list of CRM security terms that you will find useful in helping you understand the concept using backup and recovery in depth.

Article icon
by Venki Krishnamoorthy, Independent SAP ERP HCM Functional Consultant December 13, 2012
HR – 

In this article by Venki Krishnamoorthy, he shows users how to build a cloud-based appraisal application using SuccessFactors Performance Management and how to use themes when creating an appraisal application. Venki also delves into the details of SuccessFactors Performance Management functionalities like Writing Assistant (to develop competencies), SMART goals (to assist with creating benchmarks), and how to use the Manager Assistant.


Article icon
by Malcolm Dillon, Independent GRC and Security Consultant November 8, 2012
HR/SAP Professional Journal/Financials – 

Malcolm Dillon shows you how to prevent unauthorized users from making changes to historical master data after the submission has been approved by a manager or time administrator.


Article icon
by Malcolm Dillon, Independent GRC and Security Consultant June 19, 2012
HR/SAP Professional Journal/Financials – 

Learn how to configure SAP Access Control 5.3 to use an enterprise role concept across all SAP ABAP components, Java components, and LDAP user group provisioning.


Article icon
by Prashant Rastogi, Associate Manager, Accenture February 15, 2012
HR – 

Have you ever wondered how to implement structural authorizations for Nakisa? This article shows you, and helps you understand the concepts and activities required to make structural authorizations work with Nakisa components.


Article icon
by Judith M. Myerson , Systems Engineer and Architect/Owner November 2, 2010
BI/Financials/HR/SAP Professional Journal/SCM – 
Find out how to identify assets, assess risks, mitigate residual risks, and implement backup and recovery options for Sybase Mobile Sales for SAP CRM.

Article icon
by Judith M. Myerson , Systems Engineer and Architect/Owner May 17, 2010
BI/Financials/HR/SAP Professional Journal/SCM – 
Learn background information on cloud computing deployment models and see how to select a cloud service to meet your on-demand service requirements.

Article icon
by Judith M. Myerson , Systems Engineer and Architect/Owner April 15, 2010
BI/Financials/HR/SAP Professional Journal/SCM – 
Find out why multiple, in-depth layers of recovery parameters are more effective than a single layer when backing up and recovering SAP CRM data, business processes, and event logs.

Article icon
by Tero Tukiainen, SAP Authorizations Consultant, SAPORT Consulting February 19, 2010
HR – 
Whether a company is implementing the SAP standard authorizations concept or the context-specific authorizations concept, some specific switches need to be applied. Learn about the importance of the main switches for SAP ERP HCM authorizations as well as specifications for employees in a default position.

Article icon
by Judith M. Myerson , Systems Engineer and Architect/Owner February 11, 2010
BI/Financials/HR/SAP Professional Journal/SCM – 
Learn how to defend SAP CRM applications on a smartphone or a handheld device (with BlackBerry Sales Client as a specific example), and see why multiple layers of defense are more effective than a single layer when you use the defense-in-depth model.

Article icon
by Davin Wilfrid, Former Contributing Editor, SAP Experts September 14, 2009
HR/SAP Professional Journal – 
Now that C-level executives face fines or even jail time for data breaches, the pressure to keep sensitive information secure is greater than ever. For project managers, that means including security as a top consideration when planning and executing a project.

Article icon
by Tero Tukiainen, SAP Authorizations Consultant, SAPORT Consulting June 10, 2009
HR – 
Learn how to create, implement, and maintain a solid authorizations concept using transaction SUIM.

Article icon
by Katrina Burke, Senior CRM Consultant, SAP Australia August 15, 2008
BI/Financials/HR/SAP Professional Journal/SCM – 
Securing business partner data in SAP CRM 2007 has changed with the introduction of business roles and configuration keys. Find out the four ways you can secure business partner data.

Article icon
by Katrina Burke, Senior CRM Consultant, SAP Australia July 15, 2008
BI/Financials/HR/SAP Professional Journal/SCM – 
Learn about the new security concepts within the SAP CRM 2007 WebClient UI, such as new tools to use in conjunction with the Profile Generator, including the use of the Business Role and Navigation Bar. Also find out about the method you can use to determine a user’s Business Role.

Article icon
by Tero Tukiainen, SAP Authorizations Consultant, SAPORT Consulting June 15, 2008
HR – 
Empower users to troubleshoot missing authorizations error messages with transactions SU53 and SU56. Ensure that users can determine the source of an error message and resolve it with ease.

Quick tips icon
by Greg Newman, HCM Consultant, Newhit Ltd. December 15, 2007
HR – 
– Learn how to avert potential errors and create easier selection screens for your HR department. Variants help you customize input fields to accommodate specific business needs.

Page 1 of 2         1 2