Related Resources - Security and Authorizations
by Regine Schimmer, Jens Koster, and Frane Milicevic, SAP
SAPinsider - 2013 (Volume 14), April (Issue 2)
SAP NetWeaver Single Sign-On has helped companies increase user productivity and cost savings by allowing users to log on just once and eliminate the need for multiple system login credentials and passwords. With the success of the first version of this product, SAP developers are working to enhance the tool with a variety of new features. This article takes a look at the types of scenarios SAP NetWeaver Single Sign-On enable and some of the enhanced functionality that users can look forward to in the 2.0 version of the solution.
by Kehinde Eseyin, Systems Support Manager, TOTAL Nigeria PLC
GRC Expert - Volume 5 (2012), Update 3
Follow three scenarios that simulate risk analysis for role maintenance and user role provisioning with Risk Terminator in SAP BusinessObjects Access Control 10.0.
by Janis Bicans, Senior Consultant SAP Mobile Solutions, at ecenta, and Sebastian Angerer, Consulting Manager, EMEA, at ecenta
GRC Expert - Volume 5 (2012), Update 2
With the rise of mobile devices in business comes the responsibility of device management, allowing the cohabitation of personal and corporate data while still maintaining enterprise-level security. Find out how to manage mobile devices with Sybase Afaria. Learn about its architecture. Follow steps to install, configure, and apply initial security policies to this application.
by Jayne Gibbon, Director of SAP GRC Support, SAP
GRC Expert - Volume 4 (2011), Update 7
Upon first running segregation of duties (SoD) reports in SAP BusinessObjects Access Control, management staff can become overloaded with data and assume that the results simply cannot be correct. It is then the responsibility of the owners of SAP BusinessObjects Access Control to prove that the reports are accurate. Step through the process that SAP BusinessObjects Access Control owners can go through to prove that the reports are correct. The steps are specific to SAP BusinessObjects Risk Analysis and Remediation (RAR) version 5.3, as this is currently the most used version. They are also applicable to SAP BusinessObjects Access Control 10.0.
by Larry Nguyen, SAP CRM Senior Consultant, ecenta APA Pte. Ltd.
CRM Expert - Volume 7 (2011), Update 7
See how to extend attachment properties in SAP CRM for various purposes. One of the most common uses of this function is to apply authorization rules to the attachments.
by Jonathan Cooper and Frane Milicevic, SAP
SAPinsider - 2011 (Volume 12), July (Issue 3)
Eliminating the need for passwords in business applications means getting rid of processes that can be costly and that have inherent security risks. With single sign-on (SSO) functionality, users only need to authenticate once, thus eliminating password chaos. This article discusses how the argument in favor of SSO has become even stronger with the new security functionality that is now available within SAP NetWeaver Single Sign-On.
by Anurag Barua, Director of Information Technology
GRC Expert - Volume 4 (2011), Update 4
Learn how to strengthen your organization’s management of SAP development and object key controls to ensure that your system security and application security are not compromised.
by Dr. Gaetano Altavilla, Senior SAP Solutions Architect, Instructor, Project Manager, and Team Leader
CRM Expert - Volume 7 (2011), Update 1
See how to define a business role in customizing, assign it to a position in an organizational model, and then analyze its content.
by Judith M. Myerson
CRM Expert - Volume 6 (2010), Update 9
Find out how to identify assets, assess risks, mitigate residual risks, and implement backup and recovery options for Sybase Mobile Sales for SAP CRM.
If Your AP Process Is Paper-Based, You’re Opening the Door to Internal Fraud: Ensure End-to-End Visibility and Audit Control with SAP Invoice Management
by Bil Khan, SAP
SAPinsider - 2010 (Volume 11), April (Issue 2)
Companies lose about US$130,000 to every fraudulent act stemming from accounts payable (AP) employees. This article reveals the trick to curtailing corporate fraud — a fully optimized automation program like SAP Invoice Management by Open Text.
Security is not just a "nice-to-have" option, it's a necessity. And, without rock solid security measures in place,...
Provides 100 little-known time-saving tips and tricks
This comprehensive guide shows you how to develop and implement an authorization concept that will withstand the...
Explains best practices for SAP system security Offers examples and so
Learn how to set up an effective document management
In this IDC White Paper, we discuss some of the key trends taking place in the enterprise mobility landscape today, such as consumerization of IT, the mobile application explosion, and cloud computing....
This SAP-SAPinsider conference session, recorded at PLM 2013 in Las Vegas, steps through real-world examples from SAP® customers who have instituted standard enterprise project and portfolio management...
Achieve your business goals and get more value out of your system landscape with SAP Solution Extensions
Whatever your business’s goal — whether it is delivering exceptional customer experiences, optimizing the supply chain, improving procurement processes, growing talent, maximizing operating capital,...
Now more than ever, the speed with which corporations can make financial decisions has a direct impact on bottom-line profits. However, several factors can hinder the ability to make these kinds of...
In this whitepaper, Forrester shares the insights of over 60 companies, vendors, and mobile experts. Learn how mobility is the manifestation of a shift to new systems of engagement, and why the first...
Today, companies face a unique challenge: how to embrace the mobility paradigm for competitive advantage while still advancing the robust capabilities of their trusted enterprise systems. CIOs are...
Preventing cyber-attacks on SAP systems: Why segregation of duties is not enough to fight cyber-crime
For many companies, securing their SAP® system was long regarded merely as a synonym for Segregation of Duties (SoD) controls. While this is an imperative in securing SAP platforms, there are additional...
Providing best response times, tightest security and highest availability for your virtual and cloud-based SAP applications
This SAP-SAPinsider conference session, recorded at Admin & Infrastructure 2013 in Las Vegas, examines critical areas to address for delivering responsive, secure and highly available SAP applications...
A new report presents the results of a market research survey of 500+ SAP® customers commissioned by Worksoft Inc., and performed by an independent third party to study the state of test automation...
How confident are you in the risk management systems your organization uses to ensure safe and reliable operations? Lack of a systematic, effective approach to controlling safety, health and environmental...
This course provides updated SAP® BI/BW reporting material to complement our existing BW Reporting product...
This course provides expert advice, guidelines, best practices and strategy for successfully utilizing SAP...
This course provides expert guidance to develop, define, and implement a rock solid security strategy for SAP®...
This course provides 12+ hours of updated strategies, best practices, and comprehensive education for employee and...
Straight answers on the future of your business intelligence investmen
By Kristine Erickson on April 29, 2013
In his session at GRC 2013, compliance and security Marc Jackson makes the case for auditing your SAP GRC systems – something not to be overlooked in your system audits. In a recent online Q&A More...
Keeping your SAP systems compliant : SAPinsider GRC 2013 interview with Turnkey’s Richard Hunt and Troy Konis
By Kristine Erickson on April 21, 2013
Despite their busy schedules at GRC 2013 in Las Vegas, Turnkey Consulting’s Richard Hunt and Troy Konison took a few minutes to talk with SAPinsider’s Dave Hannon about a key question for More...
By Matt Moore on April 16, 2013
The following is a preview of the session "Preventing Cyber Attacks: How to Address 11 Risks That Could Leave Your SAP System Vulnerable" by Mariano Nunez of Onapsis that will be presented at GRC 2013 More...
By Ken Murphy on December 12, 2012
by Ken Murphy @KMurphyWisPubs For a movie that came out when “cloud” was still just a meteorological term, “Heat” nails today’s enterprise cloud security concerns. The More...
By Matt Moore on September 19, 2012
I recently moderated a Q&A on SAP Access Control 10.0 workflow with Turnkey Consulting’s Simon Persin. There was a lot of discussion on changes to approvals with 10.0 and MSMP and, not surpris More...
By Allison on February 13, 2012 at 1:26PM
Q&A on user access reviews to prevent SoD violations with GRC expert James Roeske (4488 Views, 30 Replies)
By Allison on September 15, 2011 at 10:40AM
Avoid BW security pitfalls: Ask two data security experts your questions on protecting SAP NetWeaver (7431 Views, 34 Replies)
By Allison on August 1, 2011 at 12:33PM
No matching Videos were found.
No matching Profiles were found.