Leveraging SAP Cloud Connector to Protect Data and Achieve Business Goals

931 results

  1. Part 2: Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also learn how to assign the created profiles to specific users or groups of users. Finally, watch the accompanying demo video to learn how to use the security editor to create different security profiles. Key Concept The security editor...…

  2. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers...…

  3. Special Report: Implementing SAP HANA – An End-to-End Perspective

    In this exclusive special report, get an in-depth, step-by-step look at the aspects of implementing BI solutions on SAP HANA. Gain insight into how ETL integrates with SAP HANA and how SAP BusinessObjects BI 4.0 analyzes and visualizes the data stored in SAP HANA. Key Concept SAP HANA modeling is a process whereby a developer...…

  4. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…

  5. The Power of Prevention

    The onset of COVID-19 in 2020 ushered a new workforce paradigm in which normal security patching operations were left vulnerable to cyberattacks. Today’s remote, cloud-based environment requires a level of security awareness and prevention that brings together SAP, customers and external security researchers. Aditi Kulkarni, Product Security Senior Specialist for SAP Labs India, provides a…

  6. Managing Data with SAP Data Replication and Transformation Tools

    Data and solution integration is becoming one of the most important aspects in enterprise architecture. Learn about the functionalities provided by SAP data replication and transformation solutions and their proper use. Key Concept Modern business solutions often run in a complex enterprise landscape that requires extensive use of data replication and transformation functionality. Tools such...…

  7. Part 3: Implementing Security in BusinessObjects Universes with Security Tables

    Learn how to implement security in SAP BusinessObjects Universes using database security tables. Learn how to establish and create database security tables, store security information in those tables, import the tables into your Universe, and join the tables with your current Universe model by joining them with the corresponding tables in the Universe. Finally, find...…

  8. Optimize Data Management in All Phases of Your SAP Implementation

    Poor data management can lead to many problems, from incorrect data, to a lack of integration, to bad analysis. Learn ways an effective data management strategy can help you in your efforts to optimize your system’s performance while increasing your compliance and reducing cost. Key Concept Data management is a critical component of running a...…

  9. Get Data From Any Table in Another SAP System

    Say you want to get the contents of a table from one of your SAP systems (called the source system) into a current system (called the client system). Most of the time if you want to access the table content of a source system, you need to: Check to see if the content is in...…

  10. Get Data From Any Table in Another SAP System: A Generic Way in ABAP

    Learn a new way to load data from any table in any SAP system to any other SAP system. See how to use a Remote Function Call (RFC) function module call, Runtime Type Service (RTTS), and JavaScript Object Notation (JSON) serialization/deserialization. Key Concept A Remote Function Call (RFC)-enabled function module is a function module that...…