Guaranteeing the safety of e-signing with SAP and hardware security modules

478 results

  1. Vonage and SAP expand collaboration for AI-driven enterprise experiences

    Guaranteeing the safety of e-signing with SAP and hardware security modules

    Reading time: 2 mins

    SAP solutions enhance efficiency in various industries by utilizing secure electronic documents for operations, and Thales recommends employing Hardware Security Modules (HSMs) to ensure safe e-signing and regulatory compliance while accommodating high performance during peak business activities.

  2. Mitigate Foreign Trade Payment Compliance Risk Using the Cockpit for Documentary Payments

    Learn how the Cockpit for Documentary Payments can be used to facilitate international customers’ payment compliance, thereby reducing the risk of doing foreign trade. Follow steps to implement the Documentary Payments component in SAP sales and distribution (SD). Key Concept The Cockpit for Documentary Payments provides automated financial documents to facilitate payment guarantee procedures required...…

  3. Configure and Implement the Proper Internal Controls Up Front for an Easier Audit

    Having to go back and change your SAP system or your related business processes to deal with audit concerns takes time away from your daily operations and results in unnecessary distractions. By configuring your SAP system appropriately and designing your related business processes to effectively address your business risks, you can save significant effort. This...…

  4. ABAP Development Chat

    In this live chat, insiderBOOKS author Faisal Altaf answered questions on using ABAP in real-world scenarios. If you missed the chat or need a refresher, you may view the chat replay or read the edited transcript below.  Meet the panelist:  Faisal Altaf Faisal has nine years of experience in IT, seven-and-half years of which have been...…

  5. Eight Steps for Designing Change Management Processes

    ManagementDesigning change management processes is a project that relies on input from teams spanning the entire SAP ERP landscape. It is critical that the project leader create a detailed set of procedures and requirements before implementing change management processes. In this article, we illustrate an eight-step guide to creating effective processes. Designing change management processes...…

  6. Get Data From Any Table in Another SAP System: A Generic Way in ABAP

    Learn a new way to load data from any table in any SAP system to any other SAP system. See how to use a Remote Function Call (RFC) function module call, Runtime Type Service (RTTS), and JavaScript Object Notation (JSON) serialization/deserialization. Key Concept A Remote Function Call (RFC)-enabled function module is a function module that...…

  7. Tips for Integrating Global HR Processes and HCM Global Template Solutions with SAP ERP HCM and Manager Self-Service

    Learn the key concepts and leading practices for designing global HR processes and integrating them with the SAP ERP HCM Personnel Administration (PA) module. Use this article to understand key considerations in configuring the PA module to work for your global design by applying leading practices to your personnel actions, SAP ERP HCM Processes and...…

  8. Get Data From Any Table in Another SAP System

    Say you want to get the contents of a table from one of your SAP systems (called the source system) into a current system (called the client system). Most of the time if you want to access the table content of a source system, you need to: Check to see if the content is in...…

  9. Designing SAP Fiori and SAP HANA Applications with Security in Mind

    Panelist: Frederik Weidemann, Virtual Forge Date: Tuesday, September 25 Sponsor: Cybersecurity for SAP Customers Virtual Forge’s Frederik Weidemann, a speaker at the upcoming SAPinsider Cybersecurity for SAP Customers conference, answered user questions on building secure SAP Fiori and SAP HANA applications. SAPUI5 applications are responsive across browsers and devices and the UI controls automatically adapt...…

  10. Designing Effective Mitigating Control

    Because mitigations are normally detective controls, it’s very important that they are designed in a way to maximize their effectiveness. Learn the key concepts for designing, documenting, implementing, testing, and monitoring an effective mitigating control. In addition, examples show how you can use SAP BusinessObjects Access Control risk analysis and remediation to help document and...…