Securing SAP Systems in the Age of Artificial Intelligence
Filter By
Browse By
- SAP Analytics and AI
- SAP Application Development and Integration
- All SAP Application Development and Integration
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP API Management
- SAP BAPI
- SAP Basis
- SAP BRF
- SAP Business Application Studio
- SAP CMS
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP EAI
- SAP EDI
- SAP Extension Suite
- SAP Fiori
- SAP Fiori Elements
- SAP Integration Suite
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Netweaver
- SAP Release Management
- SAP UI5
- SAP Web Application Server
- SAP Web IDE
- SAP Business Process Management
- SAP Center of Excellence
- SAP CIO
- SAP Customer Experience
- SAP Data and Data Management
- All SAP Data and Data Management
- SAP BW
- SAP BW/4HANA
- SAP Crystal Reports
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP DMS
- SAP Document Control
- SAP EIM
- SAP ETL
- SAP ETL Tools
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Studio
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP Enterprise Architect
- SAP Enterprise Asset Management
- SAP ERP
- SAP Finance
- All SAP Finance
- SAP Accounting
- SAP AR AP
- SAP Asset Accounting
- SAP Billing Systems
- SAP BPC
- SAP BRIM
- SAP Cash Management
- SAP Central Finance
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP e-invoicing
- SAP FICO
- SAP Finance Automation
- SAP Financial Closing Cockpit
- SAP Financial Consolidation
- SAP Financial Planning
- SAP FX Risk
- SAP General Ledger
- SAP Global Tax Management
- SAP Hyperion
- SAP Order to Cash
- SAP Payment Processing
- SAP Profitability Analysis
- SAP Rebate Management
- SAP S/4HANA Finance
- SAP Universal Journal
- SAP Governance Risk and Compliance
- SAP Human Capital Management
- SAP Intelligent Technologies
- SAP Platform and Technology
- All SAP Platform and Technology
- SAP Business Technology Platform
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP Container Platform
- SAP Digital Asset Management
- SAP Digital Integration Hub
- SAP Digital Signature
- SAP HANA Enterprise Cloud
- SAP HEC
- SAP Hyperscalers
- SAP Infrastructure
- SAP Messaging
- SAP Smart Forms
- SAP Quality and Testing
- SAP Security
- SAP Spend Management
- SAP Supply Chain Management
- All SAP Supply Chain Management
- SAP APO
- SAP Asset Management
- SAP Business Network
- SAP Digital Manufacturing Cloud
- SAP Digital Twin
- SAP EWM
- SAP IBP
- SAP Inventory Management
- SAP Label Printing
- SAP Logistics
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP MES
- SAP MII
- SAP MM
- SAP MRO
- SAP MRP
- SAP Order Management
- SAP Plant Maintenance
- SAP PLM
- SAP Production Planning
- SAP S&OP
- SAP SD
- SAP SPM
- SAP Supply Chain Planning
- SAP Track and Trace
- SAP Transportation Management
- SAP System Administration
1259 results
-
Enhance Cost Center Variance Reporting for Manufacturing Organizations
Discover how having detailed activity types map to each work center level can provide you with detailed variance analysis at the cost centers. Key Concept Activity types specify the manufacturing activities produced in plant-related cost centers. Multiplying activity types used in the production process through the assigned production cost centers creates more transparency and provides...…
-
How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape
Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers...…
-
Part 2: Implementing Security in SAP BusinessObjects Universes with the Information Design Tool
Learn how to implement security in SAP BusinessObjects Universes using the Information Design Tool security editor. Also learn how to assign the created profiles to specific users or groups of users. Finally, watch the accompanying demo video to learn how to use the security editor to create different security profiles. Key Concept The security editor...…
-
-
How to Build a Strong Security and Compliance Foundation for Your SAP Landscape
While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…
-
The Power of Prevention
The onset of COVID-19 in 2020 ushered a new workforce paradigm in which normal security patching operations were left vulnerable to cyberattacks. Today’s remote, cloud-based environment requires a level of security awareness and prevention that brings together SAP, customers and external security researchers. Aditi Kulkarni, Product Security Senior Specialist for SAP Labs India, provides a…
-
Use the Indirect Activity Allocation Cycle to Calculate and Post Sender Activity Quantities
The indirect activity allocation cycle can be useful for allocating activity costs from one cost center to another. When it is difficult to determine how much activity to post from one cost center to another, you can use a method that involves the automatic calculation of activity quantities. Understanding how to set up the master...…
-
Part 3: Implementing Security in BusinessObjects Universes with Security Tables
Learn how to implement security in SAP BusinessObjects Universes using database security tables. Learn how to establish and create database security tables, store security information in those tables, import the tables into your Universe, and join the tables with your current Universe model by joining them with the corresponding tables in the Universe. Finally, find...…
-
-
Avoid PCA Reporting Problems When Using Different Companies for Sales and Delivery
Inaccurate profit center accounting (PCA) reports can result from using profit centers incorrectly for triangular sales orders. The author demonstrates how to avoid this situation by pointing out some common mistakes and providing tips on setting up profit centers correctly. Recently I was working for a company that wanted to use profit center accounting (PCA)...…
-
Part 1: An Introduction to Security Implementations in the SAP BusinessObjects BI Platform
Gain an overview of the enterprise security model in the SAP BusinessObjects BI platform. Learn the main differences between the three different types of security-access levels (e.g., object-level, application-level, and data-level) and discover the right case or business scenario in which to use each security-access level. Finally, learn how to create and use a security...…
-
How to Use Structural Authorizations for Effective HR Strategy and Security
Proper SAP ERP HCM security involves more than just assigning traditional security roles to user IDs. Learn the importance of creating an effective SAP HR security strategy and how structural authorizations and position-based security play a role in this strategy. Get recommendations for proper HR security strategy design and the steps for implementing structural authorizations...…
Become a Member
Unlimited access to thousands of resources for SAP-specific expertise that can only be found here.
Become a Partner
Access exclusive SAP insights, expert marketing strategies, and high-value services including research reports, webinars, and buyers' guides, all designed to boost your campaign ROI by up to 50% within the SAP ecosystem.
Upcoming Events
Related Vendors
Your request has been successfully sent