Security

[141 Matches Found]
Page 1 of 8         1 2 3 4 5 6 7 8      
Article icon
by Abhijit Ingale, SAP Analytics Technical Architect, Tata Consultancy Services November 13, 2017
BI/HR/SAP Professional Journal – 

Big Data technologies offer a huge opportunity to organizations to consolidate data from a variety of data sources and derive meaningful insights from it that can help in achieving business growth. With this opportunity, there are also challenges with respect to information security. Database technologies offer a variety of ways to implement information security. SAP HANA uses analytic authorizations to implement row-level security ensuring the information is consumed only by its rightful users. However, SAP HANA does not offer a column-level security feature out of the box. Abhijit Ingale describes the process to implement column-level security in SAP HANA.


Article icon
by Akash Kumar, Technical Consultant, SAP Labs September 15, 2017
SAP Professional Journal/HR/SCM/BI/Financials – 

Akash Kumar explains the concept of blockchain and explores the services released by SAP Cloud Platform Blockchain service that allow users to develop blockchain scenarios.


Quick tips icon
by Andrea Haynes, Group Editor, SAP Experts August 8, 2017
SAP Professional Journal/Financials/HR – 

Raymond Mastre, a director at PwC and a speaker at the GRC 2017 SAPinsider conference in Las Vegas, discusses SAP system security.



Article icon
by Kehinde Eseyin, Security Architect June 14, 2017
SAP Professional Journal/BI – 

Kehinde Eseyin shows how to activate tracing to resolve authorization errors in SAP HANA. You then can troubleshoot authorization errors related to repository role activation, SQL privileges, and analytical privileges.


Article icon
by Sapna N. Modi, SAP Practice Unit & Key Accounts Automation Champion, L&T Infotech Ltd (LTI) March 1, 2017
SAP Professional Journal – 

Sapna Modi explains how to customize an ABAP Test Cockpit (ATC) check variant, to transport it, and to set up ATC reports. See how to decide if an error should be corrected or ignored and learn to manage the mass results of ATC reports runs. 


Article icon
by Hernan Huwyler, Risk and Compliance Expert September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Juan Pablo Perez-Etchegoyen, CTO, Onapsis September 2, 2016
SAP Professional Journal/Financials – 
Juan Pablo Perez-Etchegoyen explains the details of the United States Computer Emergency Readiness Team (US-CERT) alert TA16-132A issued by the US Department of Homeland Security (DHS) and the vulnerability that triggered it. He also describes the mitigation steps that organizations using SAP systems need to follow to close the security gap potentially opened by this vulnerability.

Video icon
by Jonathan Haun, Director, Data and Analytics, Protiviti May 13, 2016
SAP Professional Journal – 
Jonathan Haun explains how SAP HANA’s security mechanism works and gives expert recommendations on how to implement and maintain the best security models for your SAP HANA system.

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Rakesh Kalahasthi, Project Manager, PwC SDC, Bangalore, India March 8, 2016
SAP Professional Journal/BI – 

Rakesh Kalahasthi walks you through a step-by-step approach to overcome a limitation when you are developing geographical charts in SAP Lumira by pulling data from SAP Business Warehouse (SAP BW) powered by SAP HANA. SAP Lumira doesn’t allow you to create geographical charts by directly accessing SAP BW data models. This drawback can be addressed by importing optimized InfoCubes as native SAP HANA models and accessing them in SAP Lumira, which provides the ability to develop all types of geographical charts.


Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys March 3, 2016
SAP Professional Journal/HR – 

Nitin Aggarwal and Sanjeev Kotwal show how to use the training verification functionality in SAP Access Control to automate the training check in the user access provisioning process.


Article icon
by Faisal Altaf, SAP Technical Division Head, Al Yamamah Steel Industries Co. January 25, 2016
SAP Professional Journal – 
Faisal Altaf explains how to generate email alerts on the display or change of any critical node in the SAP Customizing IMG (transaction code SPRO) using an implicit enhancement option. For example, if any user wants to display or change rule maintenance of Bank Communication Management, which is a very critical part of the configuration, the system should send alerts to managers so that they can take immediate action against the activity if required.

Article icon
by Kehinde Eseyin, Security Architect December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Anjali Butley, Solution Architect, SAP SCM and SAP Integrated Business Planning November 11, 2015
SCM/SAP Professional Journal – 
Anjali Butley explains how to manage stakeholder access for SAP Integrated Business Planning for sales and operations 4.0. She also describes the challenges of ensuring that SAP Integrated Business Planning for sales and operations data is accessed and shared by the right users.

Article icon
by Jonathan Haun, Director, Data and Analytics, Protiviti September 14, 2015
SAP Professional Journal – 

When organizations implement SAP HANA, they need to devise a strategy to protect the data that the system manages in-memory. Depending on your SAP HANA use case, failure to protect this data can lead to significant monetary or productivity losses. One way to protect the data is through the implementation of a backup and restore strategy. Jonathan Haun helps to fortify your general knowledge of the SAP HANA backup and restore process and also discusses a few key questions that should be asked when devising a backup strategy for SAP HANA.


Article icon
by Kehinde Eseyin, Security Architect July 20, 2015
SAP Professional Journal/Financials – 

Kehinde Eseyin provides concise descriptions of associated risks with security vulnerabilities in the SAP HANA landscape and offers recommendations to prevent the identified risks from materializing. The preventive measures he describes provide information about what auditors and auditees should be interested in when planning and performing a technical review of an SAP HANA database system.


Video icon
by Tom LaBonte, Senior Manager, Risk and Vulnerability Team, Honeywell Global Security June 29, 2015
Financials/SAP Professional Journal – 

Learn how Honeywell implemented and continues to use SAP Access Control 10.1.


Video icon
by Michael Kosonog, Partner Deloitte Consulting June 29, 2015
Financials/SAP Professional Journal – 

Walk through five required attributes to effectively track the SAP control optimization activities at your organization. Gather tips and tricks for applying the appropriate governance and organizational recommendations within your current control environment to increase adoption and sustainability of optimization efforts.


Video icon
Financials/SAP Professional Journal – 

In this video, walk through a maturity model that provides the core characteristics of top-performing organizations, including what separates them from bottom-performing organizations.


Article icon
by Ameya Pimpalgaonkar, Senior SAP Architect May 26, 2015
SAP Professional Journal – 

Ameya Pimpalgaonkar shows how to configure SAP HANA Cloud Platform to switch from the standard identity provider (IDP) or SAP ID Service to instead authenticate users using your own custom identity provider. Every organization would want to maintain its own user store and identity management for security purposes. SAP HANA Cloud Platform by default uses the SAP ID Service, which requires users to be registered users on SCN. However, at the organization level, this makes no sense. This is why it is important to have custom identity providers. Learn how to configure a local IDP that you can create on the fly within Eclipse. You can create temporary users within Eclipse so that you can test the custom IDP-based authentication without any additional configuration. You can then use these users to run applications deployed on SAP HANA Cloud Platform.


Page 1 of 8         1 2 3 4 5 6 7 8