Posts

You might like this latest book release from the SAP Community. [shutterstock: 532904239, jakkaje808]

You might like this latest book release from the SAP Community. [shutterstock: 532904239, jakkaje808]

Review: Warehouse Management in SAP S/4Hana

SAP continues to enhance its logistics offerings within SAP S/4Hana. Named embedded Extended Warehouse Management (EWM), the latest in warehouse management is available to all with an S/4 license. SAP Press has just released a book on the solution.

[Read more]

Development systems and extensive authorizations can increase the risk of an attack on SAP systems. [shutterstock: 399288955, hywards]

Development systems and extensive authorizations can increase the risk of an attack on SAP systems. [shutterstock: 399288955, hywards]

SAP Transport Management Part 2: Circumventing Authority Checks

The first article of this series talked about the global deactivation of authorization checks for single authorization objects per transport. A similar risk results from the possibility of deactivating authorization checks transaction-specifically. It is even more difficult to detect an attack if this method is used, as the impact can be limited to one transaction.

[Read more]

The opinions on the SAP authorization concept diverge widely. The concept works well in theory, in practice, vulnerabilities do exist. [shutterstock: 624185789, Markus Mainka]

The opinions on the SAP authorization concept diverge widely. The concept works well in theory, in practice, vulnerabilities do exist. [shutterstock: 624185789, Markus Mainka]

SAP Transport Management Part 1: Circumventing Authority Checks

The opinions on the SAP authorization concept diverge widely. Surely, a certain complexity and the related maintenance effort cannot be denied. Yet, the most important requirement, the gapless protection of all read and write accesses within a program, can be realized quite well – at least in theory. In practice, there are several options to circumvent authorization checks.

[Read more]

Mobile devices - smartphones and tablets in particular - are new routes for malware to enter an otherwise safe system. [shutterstock: 660546625, iDin_PhotoStock]

Mobile devices - smartphones and tablets in particular - are new routes for malware to enter an otherwise safe system. [shutterstock: 660546625, iDin_PhotoStock]

SAP Security in the Age of Digitalization

No matter if Industry 4.0, SAP Hana, Cloud or Blockchains: if you want to survive on the global market, you cannot afford to shut yourself off to recent IT trends.

[Read more]

Microsoft leverages cloud-based applications and Ariba network to improve collaboration and execution, lower costs. [shutterstock: 306779834, Den Rise]

Microsoft leverages cloud-based applications and Ariba network to improve collaboration and execution, lower costs. [shutterstock: 306779834, Den Rise]

Microsoft Reinvents Supply Chain with SAP Ariba and Intrigo Systems

Microsoft has one of the most complex supply chains in the world. And to keep it humming and ensure supply keeps up with demand for its hottest products, the company is reinventing its supply chain.

[Read more]

Data security needs to be seen as a permanent, proactive and preventive discipline. [Shutterstock: 588016910, Mihai Stanciu]

Data security needs to be seen as a permanent, proactive and preventive discipline. [Shutterstock: 588016910, Mihai Stanciu]

Special: Data Security

Recent headlines occupy that any organization who takes the issue of data security lightly risks its existence. However, during the times of SAP S/4Hana, the protection of business-critical data is anything but child's play. Andreas Opfer and Holger Hügel explain what companies should look out for today.

This article is the first of a series! If you would like to continue reading the series, please use the 'next button' in the middle of the screen on right side.

[Read more]