Building a Business Data Fabric with Reliable Data

316 results

  1. How SAP Users Can Optimize Cloud Migration by Leveraging Partnerships

    The countdown toward the deadline for SAP ECC maintenance in 2027 is getting closer and closer for SAP users. Cloud migration is now one of the most discussed and sought-after ERP enhancements. Knowing how complex the transformation is going to be for many companies, SAP has been consistently developing and enhancing its RISE with SAP…

  2. Anomaly Detection Algorithms in Supply Chain Analytics

    Anomaly detection algorithms do exactly what the name suggests – detect anomalies in the data. The simplest example is your body temperature. If you had a sensor measuring your body temperature, and the date is being fed to an anomaly detector in the form of time series data (like every one hour), if the temperature…

  3. Detect and Prevent Malicious Business Transactions with SAP Fraud Management

    Learn how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents. Key Concept The Serious Fraud Office (SFO), which is a department in the office of the US Attorney General, defines fraud as an act of deception intended for personal gain or...…

  4. How to Configure SAP Enterprise Threat Detection for Increased Surveillance and Real-Time Analysis of Security Threats

    Mining of important security-related logs has always been a challenge for most enterprises in terms of how to gain appropriate security intelligence from collected data sets in order to forestall malicious attacks from within and outside an enterprise. Kehinde Eseyin shows how to set up the SAP Enterprise Threat Detection system landscape to facilitate log...…

  5. An Integrated Approach to Identifying Security Risks

    As technology becomes more sophisticated, so do the cyberattacks that aim to steal and even manipulate data. In response to this new rise in cybercrime, SAP released SAP Enterprise Threat Detection, a native SAP HANA application that quickly identifies suspicious patterns in log data and generates alerts to notify the appropriate personnel to take action.…

  6. Protect Your SAP Systems from Cyberattacks

    This article looks at how SAP Enterprise Threat Detection addresses organizations’ pressing needs for protecting modern SAP landscapes.

  7. SAP Service Insights

    Building a Business Data Fabric with Reliable Data

    Reading time: 3 mins

    As businesses increasingly depend on data, maintaining its quality is crucial to avoid disruptions, poor decisions, and regulatory penalties; thus, adopting automated, machine learning solutions is essential to ensure data reliability and compliance in a complex digital landscape.

  8. Securing the Intelligent Enterprise with SAP’s Enterprise Threat Detection

    The heightened global prevalence of cyber threats has amplified the urgency for organizations to move beyond the traditional preventive measures. Organizations now need to adopt more stringent protocols for real-time monitoring, threat detection, and swift response in order to effectively protect their businesses. This article discusses SAP’s Enterprise Threat Detection, a comprehensive offering that enables…

  9. Exploit Predictive Analytics for a Pricing Strategy

    Shreekant Shiralkar and Rohit Kumar Das show how to apply SAP Predictive Analysis Library (PAL) functions in SAP HANA to retail store data to calculate an optimum price. Key Concept The Predictive Analysis Library (aka PAL) is a set of predictive algorithmic functions embedded in SAP HANA. Each of the algorithms is written in native...…

  10. Leveraging Machine Learning (ML) in Spend Analysis solutions

    Machine Learning (ML) based algorithms are slowly percolating into a wide variety of supply chain solutions and spend analysis solutions are no exception. In this article, I share few ways Machine Learning (ML) algorithms are already being used or can be used in spend analysis context. Note that these suggestions are focused only on spend…