Security

Security has always been important for SAP applications, but this has historically been primarily focused on access and process control for applications. With the focus on moving enterprise applications into the cloud space, overall security is becoming more and more critical, as is compliance to various government regulations and standards. Content in this topic area will focus on ensuring that SAP systems are secure from both internal and external security threats, as well as what organizations need to do to prepare systems for potential cybersecurity attacks. It will additionally cover compliance topics, the impact of different compliance regulations, and what steps SAPinsiders need to take to ensure that their applications and data meet these requirements.

Featured

  1. Female IT professional

    SAP Announces It Is Addressing Cyber Security Gaps in Multiple Cloud Solutions

  2. Impact of Cloud and SAP HANA on Enterprise Security Strategy Benchmark Report

  3. Insights for Evaluating, Identifying, and Executing Cybersecurity for Your SAP Systems

Results

  1. Capgemini

    Since 1993, Capgemini has been a leading SAP Global Integration Partner.  Collaborating closely with SAP, Capgemini is developing new products and co-innovating on industry-specific initiatives. Capgemini has the largest SAP S/4HANA® certified group of consultants in the world.  Our more than 20,000 SAP specialists work with world-renowned clients to develop solutions tailored to meet their industry challenges and unique needs, enabling them to become the renewable enterprise, a company able to constantly grow and adapt, ‘renew’ themselves, unlock business value and outpace competition.

  2. Manage Key Area Authorization Objects for Business Transactions in SAP PM

    You can manage authorizations by user role for business transactions in the Plant Maintenance (PM) module. See how to use authorization field BETRVORG to simplify your PM authorization customization. Key Concept Companies manage authorizations for working with Plant Maintenance (PM) internal orders, equipment, functional locations, and notifications within a user’s role. The role provides the…...…
  3. Speed Up Security Testing Using eCATT

    The Extended Computer Aided Test Tool (eCATT), successor of SAP’s CATT, can test a wide range of SAP applications running in the SAPGUI for Windows or Java environments. It can also access data in the database (including customizing data) and ABAP coding on the application server. See how to use eCATT to speed up testing…...…
  4. Secure the RFC Connections in Your SAP System Landscape

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  5. How SAP Protects Your Web Applications from Security Vulnerabilities

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  6. Use Authorization Objects to Provide Flexible BW Security

    BW security is different and often more difficult to implement than R/3. The author explains how to secure the data in your BW system, focusing on several key points. He discusses authorization objects, transaction code components, and the relationship between them. Examples show you how to provide your users with a flexible and safe system…....…
  7. Conquer Context Problems in HR Security

    When the same HR user is in charge of multiple tasks, conflict problems can occur on the subject of how much authorization to grant the user. The author compares the technical differences between general and structural authorization and how to optimize their usage. He also describes SAP’s context-sensitive authorization functionality in R/3 Enterprise Release 4.70…....…
  8. Implement Field-Level Security in HR Infotype Screens

    Because SAP’s HR module is fully integrated with other SAP modules, they share data. Therefore, it is important to ensure that sensitive HR data is invisible to unauthorized users. The author explains how to create and configure several infotype screens to block data to some users and allow access to others. The article uses Release…...…
  9. Achieving Network Security and Secure Load Balancing with the SAP Web Dispatcher

    These are some of the major tasks for a BW to HANA migration. by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Peter Graf, Vice President of Marketing, SAPMarkets SAPinsider - 2000 (Volume 1), June (Issue 1) by Karl Kessler and Joachim Jakob, SAP AG SAPinsider -…
  10. Is User ‘Sally Smith’ Really Who She Claims to Be?! Lessons for Establishing Rock-Solid Authentication and Single Sign-On (SSO) Practices

    Authentication forms the foundation of your security infrastructure, and access privileges granted to users (or systems) are predicated on the notion that users are who they claim to be. There are a number of options available to help you do this with SAP systems, including password parameters, secure network communications (SNC), X.509 digital certificates, and…...…