GRC
HR
SCM
CRM
BI
Expand +

Articles

Sort By:
SAPinsider Magazine: The Inside Edge for SAP Customers Worldwide

April 10, 2019

Access the latest insights from SAPinsider Magazine, including articles that offer best practices, such as how to avoid cyber attackers targeting your SAP applications and how to transform your business in the era of intelligence; case studies of companies' digital... MORE »»


Tracing Cisco’s Blueprint for a Successful SAP Data Center

by Erik Lillestolen, Solution Product and Engineering Manager, SAP Data Center, Cisco | February 21, 2019

The traditional data center model is being expanded by a host of new technologies, such as the Internet of Things, data streaming, social media, and machine learning. To adapt to this new world, and to take full advantage of the... MORE »»


Comply with Mandatory E-Invoicing with Confidence

by Aalbert de Niet and Olivia Vorstheim | February 13, 2019

Over the years, companies have been replacing paper invoices with electronic versions to improve agility and to gain better insights into their business. In recent years, however, tax authorities and governmental organizations in an increasing number of countries have begun... MORE »»


Universal Identity and Access Management for Employees and Consumers

by Christian Cohrs and Marko Sommer | January 14, 2019

As digital technologies have expanded their reach, the task of ensuring secure authentication and identity management within business processes has become more complex. Employees are no longer the only users involved — external users, such as consumers accessing a web... MORE »»


Watch Out for Cyber Attackers Targeting Your SAP Applications

by Juan Perez-Etchegoyen, CTO, Onapsis | December 12, 2018

Business-critical ERP applications run the economy by managing the sensitive and all-important data and processes of large global organizations. Because of the processes these applications support, SAP customers store their “crown jewels” here. The massive attack surface of these applications... MORE »»


Securing SAP S/4HANA

by Birger Toedtmann | September 14, 2018

When you are planning a conversion from SAP Business Suite to SAP S/4HANA, many questions about changing security needs can arise. This is due in large part to the architectural and technological changes that come with SAP S/4HANA. Read this... MORE »»


Get Ready to Automate

by Brian Wilchusky, Global Partner Leader for SAP, Vertex Inc. | August 28, 2018

New tax rules and a historic US Supreme Court ruling, South Dakota v. Wayfair, are rapidly changing the tax regulation landscape. The complex compliance requirements of Wayfair, which allows states to collect sales taxes on certain out-of-state transactions, are leading many companies... MORE »»


SAPinsider Magazine | Issue 2 | 2018

August 24, 2018

The latest issue of SAPinsider has been published and you can download the full issue here.

MORE »»


Conquer User Access Reviews in SAP Systems Once and for All

by Jody Paterson | August 20, 2018

Reviewing SAP system user access can be a painful and time-consuming process. Performing these reviews manually without automation can be costly, slow, and result in inaccuracies. The article highlights five strategies that can take the sting out of completing user... MORE »»


Misuse Detection in SAP Systems

by Guido Schneider | July 30, 2018

As data quickly becomes the most valuable asset a company can own, the reliability and security of that information also becomes essential. And while many companies focus on thwarting outside threats to security, they should be casting an internal eye on potential data misuse from employees. Learn how... MORE »»


SAPinsider
FAQ