Expand +


Sort By:
Watch Out for Cyber Attackers Targeting Your SAP Applications

by Juan Perez-Etchegoyen, CTO, Onapsis | December 12, 2018

Business-critical ERP applications run the economy by managing the sensitive and all-important data and processes of large global organizations. Because of the processes these applications support, SAP customers store their “crown jewels” here. The massive attack surface of these applications... MORE »»

Securing SAP S/4HANA

by Birger Toedtmann | September 14, 2018

When you are planning a conversion from SAP Business Suite to SAP S/4HANA, many questions about changing security needs can arise. This is due in large part to the architectural and technological changes that come with SAP S/4HANA. Read this... MORE »»

Get Ready to Automate

by Brian Wilchusky, Global Partner Leader for SAP, Vertex Inc. | August 28, 2018

New tax rules and a historic US Supreme Court ruling, South Dakota v. Wayfair, are rapidly changing the tax regulation landscape. The complex compliance requirements of Wayfair, which allows states to collect sales taxes on certain out-of-state transactions, are leading many companies... MORE »»

SAPinsider Magazine | Issue 2 | 2018

August 24, 2018

The latest issue of SAPinsider has been published and you can download the full issue here.


Conquer User Access Reviews in SAP Systems Once and for All

by Jody Paterson | August 20, 2018

Reviewing SAP system user access can be a painful and time-consuming process. Performing these reviews manually without automation can be costly, slow, and result in inaccuracies. The article highlights five strategies that can take the sting out of completing user... MORE »»

Misuse Detection in SAP Systems

by Guido Schneider | July 30, 2018

As data quickly becomes the most valuable asset a company can own, the reliability and security of that information also becomes essential. And while many companies focus on thwarting outside threats to security, they should be casting an internal eye on potential data misuse from employees. Learn how... MORE »»

Tips for Integrating SAP Revenue Accounting and Reporting and SAP Hybris Billing

by Santosh Kumar, Consultant,SAP Max Attention, (SAP America Inc.) | May 30, 2018

Learn how to integrate SAP Revenue Accounting and Reporting 1.2 with Convergent Invoicing of SAP Hybris Billing and SAP Contract Accounts Receivable and Payable (FI-CA) in SAP ERP Central Component (SAP ECC). MORE »»

Quickly Resolve SAP HANA Authorization Errors and Issues

by Kehinde Eseyin, Security Architect | May 25, 2018

See how to activate tracing to resolve authorization errors in SAP HANA. You then can troubleshoot authorization errors related to repository role activation, SQL privileges, and analytical privileges.


Column Level Security in SAP HANA

by Abhijit Ingale, SAP Analytics Technical Architect, Tata Consultancy Services | May 22, 2018

Big data technologies offer a huge opportunity to organizations to consolidate data from a variety of data sources and derive meaningful insights from it that can help in achieving business growth. With this opportunity,... MORE »»

Detect Cross-System SoD Risks Between ECC, SAP S/4HANA, and Master Data Governance

by Nibha Kumari, SAP Security Expert, Cintas Corporation and Gary Prewett, Security Practice Lead, NIMBL | May 21, 2018

Seventeen percent of segregation of duties (SoD) risks involve master data maintenance. These risks will not be detected by an out-of-the box SAP system rule set if your organization implements Master Data Governance (MDG). If you want to get... MORE »»