Security

[219 Matches Found]
Page 1 of 11         1 2 3 4 5 6 7 8 9 10      
Article icon
by March 15, 2019
SAP Professional Journal – 
SAPinsider and SAP Experts have assembled ten popular pieces to provide insights for SAP customers to strengthen cybersecurity initiatives.

Article icon
Financials – 

Learn how the Merck Group (Merck KGaA, Darmstadt, Germany) integrated its global SAP landscape into its existing 24/7 Security Operations Center (SOC) monitoring and incident response processes. Learn how the company took 2 valuable teams, which traditionally operated in silos, and brought them together in a way that better protects against potential cyber attacks.


Article icon
Financials – 

Learn how American Outdoor Brands successfully deployed SAP ERP and managed a dramatic surge in business and the acquisition of 3 companies within 3 years without any major controls or business disruptions. Understand how American Outdoor Brands balanced project resources and defined, implemented, and maintained a framework to manage change and financial controls.

 


Article icon
Financials – 

Learn how Mars revamped its SAP security, minimized segregation of duties (SoD) risk, and increased efficiencies around access provisioning. Walk through the redesign of the company’s SAP landscape and the creation of task-based roles that are free of SoD risks and follow a standard naming convention.


Article icon
by J. Scott Hollands, Vivint | Patrick Kelliher, Vivint March 6, 2019
Financials/SCM – 

Take an in-depth look at how Vivint undertook its greenfield implementation of SAP S/4HANA (with regard to finance and the supply chain). Walk through the considerations Vivint took into account when implementing SAP S/4HANA, the project team assembled, and the focus on security, controls, and governance, risk, and compliance (GRC) as a part of the overall implementation program.


Article icon
by Robert Richardson, Lead SAP Security Specialist, Valero Energy March 5, 2019
HR – 
Since implementing on-premise security 10 years ago, Valero Energy has gone through numerous reorganizations as a result of acquisitions, divestitures, integration of its Canadian employee base, and an implementation of ESS/MSS functionality. Its security processes also evolved to keep up with the new or changed roles. Find out lessons learned and gain insights into vulnerabilities such as over-authorization with respect to contractor access or client copies. Learn how Valero handles sensitive transactions and authorization objects.

Article icon
Financials – 
Learn how Tyson Foods maintains Sarbanes-Oxley (SOX) compliance by taking full advantage of its SAP governance, risk, and compliance (GRC) solutions to anticipate possible controls violations before they occur. See how the company proactively performs rigorous controls self-assessments using SAP Process Control.

Article icon
Financials – 
Mars transitioned its largest SAP user population to a new global security architecture and governance process. See how Mars completed the phases of the security redesign and learn about the key tasks it performed to ensure proper security role maintenance and user assignment.

Article icon
by Erin Swartzmiller, Stanley Black & Decker March 1, 2019
Financials – 
Learn how Stanley Black & Decker approached the design phase of its global SAP security redesign. Learn how Stanley Black & Decker implemented a process to create a standard global role structure that’s easy to manage, but flexible enough to be applied across multiple business processes, segments, and regions.

Article icon
by Mahesh Ravinutula, Schlumberger | Troy Siewert, Schlumberger February 28, 2019
Financials – 
Schlumberger got security right from the beginning for its SAP implementation by defining it as an objective of the new deployment. Learn how the company reduced costs and risks while operationalizing the cybersecurity strategy for SAP applications and implementing security validation and monitoring processes.

Article icon
by Abhijit Ingale, SAP Analytics Technical Architect, Tata Consultancy Services November 13, 2017
BI/HR/SAP Professional Journal – 

Big Data technologies offer a huge opportunity to organizations to consolidate data from a variety of data sources and derive meaningful insights from it that can help in achieving business growth. With this opportunity, there are also challenges with respect to information security. Database technologies offer a variety of ways to implement information security. SAP HANA uses analytic authorizations to implement row-level security ensuring the information is consumed only by its rightful users. However, SAP HANA does not offer a column-level security feature out of the box. Abhijit Ingale describes the process to implement column-level security in SAP HANA.


Article icon
by Akash Kumar, Technical Consultant, SAP Labs September 15, 2017
SAP Professional Journal/HR/SCM/BI/Financials – 

Akash Kumar explains the concept of blockchain and explores the services released by SAP Cloud Platform Blockchain service that allow users to develop blockchain scenarios.


Quick tips icon
by Andrea Haynes, Group Editor, SAP Experts August 8, 2017
SAP Professional Journal/Financials/HR – 

Raymond Mastre, a director at PwC and a speaker at the GRC 2017 SAPinsider conference in Las Vegas, discusses SAP system security.



Article icon
by Kehinde Eseyin, Security Architect June 14, 2017
SAP Professional Journal/BI/HR – 

Kehinde Eseyin shows how to activate tracing to resolve authorization errors in SAP HANA. You then can troubleshoot authorization errors related to repository role activation, SQL privileges, and analytical privileges.


Article icon
by Taha M. Mahmoud, Senior BI Consultant March 21, 2017
BI – 
Taha M. Mahmoud shows how to implement security in the Universe using enterprise database security tables. He also provides a comparison between using enterprise database security tables or using the Information Design Tool security editor to help you to understand when and where to use each approach.

Article icon
by Sapna N. Modi, SAP Practice Unit & Key Accounts Automation Champion, L&T Infotech Ltd (LTI) March 1, 2017
SAP Professional Journal – 

Sapna Modi explains how to customize an ABAP Test Cockpit (ATC) check variant, to transport it, and to set up ATC reports. See how to decide if an error should be corrected or ignored and learn to manage the mass results of ATC reports runs. 


Article icon
BI – 

Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create security profiles. There are two main types of security profiles: data security and business security. Learn why you need to have a security matrix in place before implementing Universe security and get sample matrices to use as templates. Also, see a video demo about how to use the security editor to create different security profiles.


Video icon
BI – 
In this demo video, Taha M. Mahmoud shows how to use the security editor in the Information Design Tool to create different security profiles.

Article icon
by Taha M. Mahmoud, Senior BI Consultant December 27, 2016
BI – 

Taha M. Mahmoud offers a comprehensive introduction to the enterprise security model in the SAP BusinessObjects BI platform. Learn about the main differences among the three different security levels in the SAP BusinessObjects BI platform 4.x: object-level, application-level, and Universe-level security. Find the right references to know more about each security level, and get two helpful security matrix templates to use for your own security implementation projects.


Article icon
by Hernan Huwyler, Risk and Compliance Expert September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Page 1 of 11         1 2 3 4 5 6 7 8 9 10