Security

[51 Matches Found]
Page 1 of 3         1 2 3      
Article icon
by Hernan Huwyler, Risk Management and Internal Control Director, Veolia September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys March 3, 2016
SAP Professional Journal/HR – 

Nitin Aggarwal and Sanjeev Kotwal show how to use the training verification functionality in SAP Access Control to automate the training check in the user access provisioning process.


Video icon
by Greg Robinette, Systems Engineer, Huntington Ingalls Industries–Newport News Shipbuilding January 15, 2015
HR – 

Greg Robinette provides an overview of security implications associated with hosting sensitive HR data off site and examines the steps you need to take to ensure optimal off-site data protection.


Article icon
by Alpesh Parmar, Managing Partner, ultimumIT, Inc. August 19, 2013
HR/SAP Professional Journal/Financials – 

Learn steps to configure SAP Access Control 10.0 to integrate with SAP ERP HCM. Take advantage of the HR Trigger functionality in SAP Access Control 10.0 to automatically provision and de-provision access via HR event triggering.


Quick tips icon
by Ashish Saxena, Director, Accrete Solutions, LLC | LeighAnne Holtzman, Manager, Accrete Solutions, LLC May 15, 2013
BI/Financials/HR/SAP Professional Journal/SCM – 

/Project Management/Mobile – Here is a quick and handy guide to the SAP-related mobility options currently available.


Article icon
by Eric Wood, SAP ERP HCM/SuccessFactors Solution Architect, Presence of IT February 26, 2013
HR – 

In this article by Eric Wood, he shows you how to craft an effective SAP HR security strategy using structural authorizations and position-based security. Learn step-by-step guidelines for designing appropriate SAP HR strategy and how to implement structural authorizations.


Quick tips icon
by Eric Wood, SAP ERP HCM/SuccessFactors Solution Architect, Presence of IT February 18, 2013
HR – 
– This quick tip by Eric Wood shows how you can substantially reduce your security administration efforts in the SAP Netweaver Portal. By using his model as your guide, you can significantly enhance security roles while lessening your workload.

Quick tips icon
by Judith M. Myerson , Systems Engineer and Architect/Owner December 17, 2012
BI/Financials/HR/SAP Professional Journal/SCM – 
Here is list of CRM security terms that you will find useful in helping you understand the concept using backup and recovery in depth.

Article icon
by Malcolm Dillon, Independent GRC and Security Consultant November 8, 2012
HR/SAP Professional Journal/Financials – 

Malcolm Dillon shows you how to prevent unauthorized users from making changes to historical master data after the submission has been approved by a manager or time administrator.


Article icon
by Thomas Jenewein, SAP Education | Simone Buchwald, Global Solution Principal for Learning and Talent Management, EPI-USE September 28, 2012
HR – 
To learn more about how SAP Enterprise Learning and SAP Learning Solution support compliance-related processes read this article by SAP's Thomas Jenewein and EPI-USE's Simone Buchwald. In it they discuss how use SAP Learning Solution to identify training needs, record training, and track competencies, expirations, and updates. 

Article icon
by Kees Bond, Principal Consultant, CIBER Netherlands BV June 5, 2012
HR – 
Have you ever wished you could encrypt PDF-formatted payslips and email them securely to employees? This informative article shows you how you can do just that, using SAP ERP ECC.

Video icon
HR – 
In this video, Amy Petroy discusses the importance of evaluation paths in SAP ERP HCM, along with examples to illustrate her points.

Article icon
by Jacob Crane, NetWeaver Solution Architect, EPI-USE America April 30, 2012
HR – 

Learn how to configure SAP NetWeaver Portal so that you can safely access it over the Internet. By carefully designing the system and considering any effects on it, you can achieve a safe and secure system that allows more simple and efficient access to data and information.


Quick tips icon
by Larry Nguyen, SAP CRM Senior Consultant, ecenta APA Pte. Ltd. September 8, 2011
BI/Financials/HR/SAP Professional Journal/SCM – 
See how to extend attachment properties in SAP CRM for various purposes. One of the most common uses of this function is to apply authorization rules to the attachments.

Article icon
by Massimo Manara, SAP Security Consultant, Aglea s.r.l. April 25, 2011
HR – 

Learn how to set up a security-related organizational structure and what your options are for doing so.


Article icon
by Gaetano Altavilla, Senior SAP Solutions Architect, Instructor, Project Manager, and Team Leader January 25, 2011
BI/Financials/HR/SAP Professional Journal/SCM – 

Here's a quick reference on how to create business roles and associated authorizations to reflect company requirements.


Article icon
by Jarret Pazahanick, Managing Partner, EIC Experts | Chandan Gopalani, Managing Partner, EIC Experts January 5, 2011
HR – 

In this article by Jarret Pazahanick and Chandan Gopalani, they teach you the key concepts of securing employee data contained in the Employee Interaction Center (EIC) and how to set up authorizations for an HR shared service center.


Article icon
by Judith M. Myerson , Systems Engineer and Architect/Owner November 2, 2010
BI/Financials/HR/SAP Professional Journal/SCM – 
Find out how to identify assets, assess risks, mitigate residual risks, and implement backup and recovery options for Sybase Mobile Sales for SAP CRM.

Article icon
by Kehinde Eseyin, Security Architect, Turnkey Consulting Ltd. May 21, 2010
HR – 
Learn best practices to enhance and optimize the process of structural authorization checks, such as using evaluation paths, creating indexes, and buffering large numbers of structural authorization check objects in the SAP memory via standard SAP reports.

Page 1 of 3         1 2 3