Posts

Thomas Reuters facilitates access to price and reference data, in particular for foreign exchange data. [shutterstock: 1034047960, oekka.k]

Thomas Reuters facilitates access to price and reference data, in particular for foreign exchange data. [shutterstock: 1034047960, oekka.k]

Thomas Reuters Connectivity To SAP Market Rates Management

SAP announced the expansion of its strategic partnership with Thomson Reuters to simplify converting cross-border transaction prices into a single currency, no matter where or when the transaction happens.

[Read more]

The deadline has come and passed with a lot of companies not managing to be ready for GDPR. [shutterstock: 223838977, Filipe Frazao]

The deadline has come and passed with a lot of companies not managing to be ready for GDPR. [shutterstock: 223838977, Filipe Frazao]

Most European Organisations Not Ready For GDPR

A new PAC/CXP Group study finds that only 19 per cent of European organisations are ready for the full roll-out of the General Data Protection Regulation (GDPR). The report “Moving beyond the GDPR” is based on briefings with more than 200 senior business and IT executives at medium-sized and large companies operating across manufacturing, services and the public sector in Europe.

[Read more]

You might like this latest book release from the SAP Community. [shutterstock: 532904239, jakkaje808]

You might like this latest book release from the SAP Community. [shutterstock: 532904239, jakkaje808]

Review: Warehouse Management in SAP S/4Hana

SAP continues to enhance its logistics offerings within SAP S/4Hana. Named embedded Extended Warehouse Management (EWM), the latest in warehouse management is available to all with an S/4 license. SAP Press has just released a book on the solution.

[Read more]

Development systems and extensive authorizations can increase the risk of an attack on SAP systems. [shutterstock: 399288955, hywards]

Development systems and extensive authorizations can increase the risk of an attack on SAP systems. [shutterstock: 399288955, hywards]

SAP Transport Management Part 2: Circumventing Authority Checks

The first article of this series talked about the global deactivation of authorization checks for single authorization objects per transport. A similar risk results from the possibility of deactivating authorization checks transaction-specifically. It is even more difficult to detect an attack if this method is used, as the impact can be limited to one transaction.

[Read more]

The opinions on the SAP authorization concept diverge widely. The concept works well in theory, in practice, vulnerabilities do exist. [shutterstock: 624185789, Markus Mainka]

The opinions on the SAP authorization concept diverge widely. The concept works well in theory, in practice, vulnerabilities do exist. [shutterstock: 624185789, Markus Mainka]

SAP Transport Management Part 1: Circumventing Authority Checks

The opinions on the SAP authorization concept diverge widely. Surely, a certain complexity and the related maintenance effort cannot be denied. Yet, the most important requirement, the gapless protection of all read and write accesses within a program, can be realized quite well – at least in theory. In practice, there are several options to circumvent authorization checks.

[Read more]

Mobile devices - smartphones and tablets in particular - are new routes for malware to enter an otherwise safe system. [shutterstock: 660546625, iDin_PhotoStock]

Mobile devices - smartphones and tablets in particular - are new routes for malware to enter an otherwise safe system. [shutterstock: 660546625, iDin_PhotoStock]

SAP Security in the Age of Digitalization

No matter if Industry 4.0, SAP Hana, Cloud or Blockchains: if you want to survive on the global market, you cannot afford to shut yourself off to recent IT trends.

[Read more]