SAP Fiori Launchpad the latest GUI to be able to use the latest SAP products.
How is it used? What aspects are also relevant to end users?
SAP Fiori Launchpad the latest GUI to be able to use the latest SAP products.
How is it used? What aspects are also relevant to end users?
Topics: SAP FIORI Security, FIORI Security
Microsoft Sentinel and SAP: How can these systems be leveraged to have continuous threat monitoring in SAP systems? How do you protect data security in SAP with this tool?
A recent but promising solution for Continuous Threat Monitoring management for SAP systems.
Have you ever wondered how to spell, correctly, the acronyms of SAP products?
Did you know that if publications are made with incorrect acronyms, it is not allowed by SAP?
This is a new model to strive for. Definitely not easy as of today to implement. Unfortunately, it cannot be purchased!
But how could it be in SAP?
Topics: sap sso, zero trust security
Did you know that there are "special" SAP users whose credentials are known, public?
This is not an SAP oversight; it is something known and familiar. Especially in the initial setup processes of the system, utilities are activated that should be secured immediately thereafter. But what are they and what should you do?
Topics: password policy, sap super user, sap password, cyber security, userid
In this series of articles we discuss the "tip" of the day. That is, real cases of requests received in counseling.
Today we discuss "is it worth using user parameters to manage permissions?" What are the advantages and disadvantages?
Topics: parameter sap, SAP GRC, SAP IDM, sap gui
In the day-to-day these terms are often used as synonyms , but they're actually not
They can be confused and often it's not clear whether it's correct to talk about SAP profiles or roles. Let's try to underline the differences between these two terms, by starting from the past!
Topics: sap security blog, authorization model, authorization concept, HANA Roles, Profiles
For some SE16 may be an unknown acronym. For others it is the "bread and butter." It is a SAP transaction remarkably familiar to administrators. And often not only them, unfortunately.
But what is it used for? How many versions of it are there? How do you use it and what are the risks involved?
We discuss it in this article!
Topics: se16n, se16, SAP Security, supporto sap ams, sap query, SAP GDPR
This one's a bad habit. Most common causes are:
Why should you remove these users, even non-interactive ones, ASAP? Let's see some examples!
Topics: sap_all, auditing, rfc, rfc destination, rfc security, system users
Every Friday a new post, interview or content related to SAP Security.
Aglea s.r.l. P. IVA: IT 03868780960 - 2024 | Copy | Note legali