Security

[54 Matches Found]
Page 1 of 3         1 2 3      
Article icon
by Abhijit Ingale, SAP Analytics Technical Architect, Tata Consultancy Services November 13, 2017
BI/HR/SAP Professional Journal – 

Big Data technologies offer a huge opportunity to organizations to consolidate data from a variety of data sources and derive meaningful insights from it that can help in achieving business growth. With this opportunity, there are also challenges with respect to information security. Database technologies offer a variety of ways to implement information security. SAP HANA uses analytic authorizations to implement row-level security ensuring the information is consumed only by its rightful users. However, SAP HANA does not offer a column-level security feature out of the box. Abhijit Ingale describes the process to implement column-level security in SAP HANA.


Article icon
by Akash Kumar, Technical Consultant, SAP Labs September 15, 2017
SAP Professional Journal/HR/SCM/BI/Financials – 

Akash Kumar explains the concept of blockchain and explores the services released by SAP Cloud Platform Blockchain service that allow users to develop blockchain scenarios.


Quick tips icon
by Andrea Haynes, Group Editor, SAP Experts August 8, 2017
SAP Professional Journal/Financials/HR – 

Raymond Mastre, a director at PwC and a speaker at the GRC 2017 SAPinsider conference in Las Vegas, discusses SAP system security.



Article icon
by Hernan Huwyler, Risk and Compliance Expert September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys March 3, 2016
SAP Professional Journal/HR – 

Nitin Aggarwal and Sanjeev Kotwal show how to use the training verification functionality in SAP Access Control to automate the training check in the user access provisioning process.


Video icon
by Greg Robinette, Systems Engineer, Huntington Ingalls Industries–Newport News Shipbuilding January 15, 2015
HR – 

Greg Robinette provides an overview of security implications associated with hosting sensitive HR data off site and examines the steps you need to take to ensure optimal off-site data protection.


Article icon
by Alpesh Parmar, Managing Partner, ultimumIT, Inc. August 19, 2013
HR/SAP Professional Journal/Financials – 

Learn steps to configure SAP Access Control 10.0 to integrate with SAP ERP HCM. Take advantage of the HR Trigger functionality in SAP Access Control 10.0 to automatically provision and de-provision access via HR event triggering.


Quick tips icon
by Ashish Saxena, Director, Accrete Solutions, LLC | LeighAnne Holtzman, Manager, Accrete Solutions, LLC May 15, 2013
BI/Financials/HR/SAP Professional Journal/SCM – 

/Project Management/Mobile – Here is a quick and handy guide to the SAP-related mobility options currently available.


Article icon
by Eric Wood, SAP ERP HCM/SuccessFactors Solution Architect, Presence of IT February 26, 2013
HR – 

In this article by Eric Wood, he shows you how to craft an effective SAP HR security strategy using structural authorizations and position-based security. Learn step-by-step guidelines for designing appropriate SAP HR strategy and how to implement structural authorizations.


Quick tips icon
by Eric Wood, SAP ERP HCM/SuccessFactors Solution Architect, Presence of IT February 18, 2013
HR – 
– This quick tip by Eric Wood shows how you can substantially reduce your security administration efforts in the SAP Netweaver Portal. By using his model as your guide, you can significantly enhance security roles while lessening your workload.

Quick tips icon
by Judith M. Myerson , Systems Engineer and Architect/Owner December 17, 2012
BI/Financials/HR/SAP Professional Journal/SCM – 
Here is list of CRM security terms that you will find useful in helping you understand the concept using backup and recovery in depth.

Article icon
by Malcolm Dillon, Independent GRC and Security Consultant November 8, 2012
HR/SAP Professional Journal/Financials – 

Malcolm Dillon shows you how to prevent unauthorized users from making changes to historical master data after the submission has been approved by a manager or time administrator.


Article icon
by Thomas Jenewein, SAP Education | Simone Buchwald, Global Solution Principal for Learning and Talent Management, EPI-USE September 28, 2012
HR – 
To learn more about how SAP Enterprise Learning and SAP Learning Solution support compliance-related processes read this article by SAP's Thomas Jenewein and EPI-USE's Simone Buchwald. In it they discuss how use SAP Learning Solution to identify training needs, record training, and track competencies, expirations, and updates. 

Article icon
by Kees Bond, Principal Consultant, CIBER Netherlands BV June 5, 2012
HR – 
Have you ever wished you could encrypt PDF-formatted payslips and email them securely to employees? This informative article shows you how you can do just that, using SAP ERP ECC.

Video icon
HR – 
In this video, Amy Petroy discusses the importance of evaluation paths in SAP ERP HCM, along with examples to illustrate her points.

Article icon
by Jacob Crane, NetWeaver Solution Architect, EPI-USE America April 30, 2012
HR – 

Learn how to configure SAP NetWeaver Portal so that you can safely access it over the Internet. By carefully designing the system and considering any effects on it, you can achieve a safe and secure system that allows more simple and efficient access to data and information.


Quick tips icon
by Larry Nguyen, SAP CRM Senior Consultant, ecenta APA Pte. Ltd. September 8, 2011
BI/Financials/HR/SAP Professional Journal/SCM – 
See how to extend attachment properties in SAP CRM for various purposes. One of the most common uses of this function is to apply authorization rules to the attachments.

Article icon
by Massimo Manara, SAP Security Consultant, Aglea s.r.l. April 25, 2011
HR – 

Learn how to set up a security-related organizational structure and what your options are for doing so.


Article icon
by Gaetano Altavilla, Senior SAP Practice Manager January 25, 2011
BI/Financials/HR/SAP Professional Journal/SCM – 

Here's a quick reference on how to create business roles and associated authorizations to reflect company requirements.


Page 1 of 3         1 2 3