Achieve Day 2 Operational Excellence and Safeguard your SAP Landscape

500 results

  1. How to Secure and Monitor Your SAP Systems from Cyber Threats without Third-Party Software

    Aman Dhillon explains how to secure your SAP systems from cyber attacks using SAP Configuration Validation. Key Concept Configuration Validation (CV) is a standard diagnostics tool available in SAP Solution Manager 7.0 and up. It enables companies to perform vulnerability checks to detect and remove security weaknesses in SAP systems. This includes vulnerabilities in areas...…

  2. Prepare for an Audit of Your SAP Systems: What You Need to Ensure a Successful Result

    Learn the fundamentals about auditors and the audit process. See the primary categories of an SAP audit, and tips on some of the more problematic areas within one of these categories — the general computer controls audit. Key Concept General computer controls (GCC) reflect a set of IT management, infrastructure, and process controls you should...…

  3. Securely Run SAP Systems in the Cloud with Amazon’s EC2 Platform and Simple Storage Service

    Running SAP systems on a cloud platform offers significant benefits — rapid scalability, minimal incremental hardware cost, and the reduction of internal resource needs. The case for running SAP systems on a cloud platform is compelling for non-productive systems. However, there are inherent risks in allowing your data to reside with a hosted service provider...…

  4. Efficient Integration of SAP and Non-SAP Systems using SAP Integration Suite

    Companies today have a diverse IT landscape comprising of various third-party applications, connectors, and software. All of these components of a company’s IT infrastructure have to work well in sync with one another to ensure efficient business operations. Similarly, it is crucial for organizations to integrate SAP systems with non-SAP systems to enhance efficiency, productivity,…

  5. Securing SAP Systems

    Panelists: Frederik Weidemann and Stephen Lamy Sponsor: Virtual Forge Your SAP systems and the data within are an integral part of your business. You need to ensure your SAP applications are secure and stable, but there are a wide array of cybersecurity threats to worry about. Find out how to secure your SAP landscape from...…

  6. Distribute Critical Data Among Multiple SAP Systems by Using Change Pointers

    Using change pointers allows you to select exactly what data you want integrated systems to communicate to each other. See an example of the functionality with SAP ERP Central Component and SAP BusinessObjects Global Trade Services. Key Concept Application Linking and Enabling (ALE) enables communication between SAP applications. It allows you to define the master...…

  7. Zero Trust in SAP Systems

    What’s driving more SAP customers to adopt cloud security solutions? The number one driver for organizations was the “Need to protect access to sensitive and confidential data.,” according to SAPinsider’s Securing the SAP Landscape Against Cyber Threats Benchmark Report. Tracking and securing data as it moves across an organization’s SAP landscape is a common challenge…

  8. Getting 20 SAP Systems into the Cloud in Record Time

    Arvato Systems, the company updated its SAP systems and database to SAP HANA, achieving the fastest cloud migration to-date. Today, the family owned business is one of Germany’s largest midsize companies using SAP on Microsoft Azure. It was the first time the company used Azure NetApp Files to run performance-intensive and latency-sensitive workloads in the cloud.

  9. Protect Your SAP Systems from Cyberattacks

    This article looks at how SAP Enterprise Threat Detection addresses organizations’ pressing needs for protecting modern SAP landscapes.

  10. Data Protection Options for SAP Systems

    SAP Professional JournalIn recent years there have been a lot of advancements in data protection technologies and tools. When you are designing a data protection solution for an SAP environment to support business continuity, it is important to understand these new technologies and tools as well as their integration points. Key Concept A data protection...…