Prepare to Keep Your SAP Systems in Top Shape with Business Process Monitoring

  • by Kehinde Eseyin, Security Architect
  • October 22, 2009
Manager
Gain insight into the prerequisites for integrating business process monitoring into SAP Solution Manager 7.0. To ensure a smooth, successful, and error-free business process monitoring integration in SAP Solution Manager, it is important that you meet all these prerequisites.
Key Concept

Business process monitoring involves a proactive and process-centric approach to monitoring the core business processes implemented in an enterprise. Business process monitoring is intended to ensure reliable and smooth operation of critical business processes by detecting problems and taking necessary actions before they occur. You need to meet a number of prerequisites to provide error handling, problem resolution, and configurable alert services from an integration of business process monitoring into SAP Solution Manager 7.0.

Business process monitoring with SAP Solution Manager identifies the implications of technical and application-based problems on important business processes. Therefore, a sound understanding of the core business processes and their requirements for operation is needed, as well as a detailed definition of roles and responsibilities for the operative use of monitoring.

A typical SAP system landscape is made up of SAP Solution Manager and other satellite systems. The communication interface between SAP Solution Manager and the satellite system is based on Remote Function Call (RFC) technology. Satellite systems are services from which SAP Solution Manager obtains critical information for system and business process monitoring, such as SAP Customer Relationship Management (CRM), SAP ERP, or SAP Advanced Planning & Optimization (SAP APO).

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.
 

See more by this author


Comments

No comments have been submitted on this article. 


Please log in to post a comment.

To learn more about subscription access to premium content, click here.