How SAP Users Can Tackle Errors through Utilization of ITSM Connectors

962 results

  1. Extend Supply Chain Visibility Using SAP Event Management

    SCMSee how you can achieve end-to-end supply chain visibility with the SAP Event Management tool. It provides a framework for track and trace, which can be easily adapted to a wide range of visibility requirements. Key Concept SAP Event Management is a means to achieve end-to-end supply chain visibility for an organization. It also makes…...…

  2. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…

  3. Part 2: Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also learn how to assign the created profiles to specific users or groups of users. Finally, watch the accompanying demo video to learn how to use the security editor to create different security profiles. Key Concept The security editor…...…

  4. Supply Chain Visibility Using SAP Transportation Management and SAP Event Management

    Learn how to achieve end-to-end transportation visibility using SAP’s supply chain execution platform. Key Concept SAP’s transportation visibility process is enabled by SAP Transportation Management (SAP TM) and SAP Event Management. SAP TM acts as a transaction data system providing business documents for execution, whereas SAP Event Management provides a transportation monitoring framework for these…...…

  5. Implementing Security in SAP BusinessObjects Universes with the Information Design Tool

    Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also, learn how to assign the created profiles to specific users or groups of users.  This content is for Basic Access, SAPinsider Monthly Subscription, SAPinsider Annual Subscription, and SAPinsider Premium Annual Subscription members only.Log In Join Now

  6. Integrate SCM Event Management with SAP BW for Enhanced Reporting

    SAP’s Supply Chain Event Management (SAP EM) allows companies to improve supply chain efficiency and promote standardization across SAP systems. Learn more about the functionality SAP EM offers and how it can be integrated with the SAP Business Information Warehouse (SAP BW) using extractors and function modules that eliminate the need for manual intervention. Integrating…...…

  7. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…

  8. The Power of Prevention

    The onset of COVID-19 in 2020 ushered a new workforce paradigm in which normal security patching operations were left vulnerable to cyberattacks. Today’s remote, cloud-based environment requires a level of security awareness and prevention that brings together SAP, customers and external security researchers. Aditi Kulkarni, Product Security Senior Specialist for SAP Labs India, provides a…

  9. Part 3: Implementing Security in BusinessObjects Universes with Security Tables

    Learn how to implement security in SAP BusinessObjects Universes using database security tables. Learn how to establish and create database security tables, store security information in those tables, import the tables into your Universe, and join the tables with your current Universe model by joining them with the corresponding tables in the Universe. Finally, find…...…

  10. Part 1: An Introduction to Security Implementations in the SAP BusinessObjects BI Platform

    Gain an overview of the enterprise security model in the SAP BusinessObjects BI platform. Learn the main differences between the three different types of security-access levels (e.g., object-level, application-level, and data-level) and discover the right case or business scenario in which to use each security-access level. Finally, learn how to create and use a security…...…