GRC
HR
SCM
CRM
BI
Expand +

Blogs

Sort By:
Solving Day-to-Day Delivery Issues While Processing Stock Transport Orders

by Vineet Pandey, Business Process Analyst, Schlumberger | May 16, 2018

Common delivery issues occur when working with stock transport orders. Review several business scenarios that illustrate how to identify and then resolve the delivery problems. MORE »»


Report on the Fly Using Flexible Hierarchies in SAP S/4HANA 1709

by Gaurav Agarwal, Principal Consultant, SAP S/4HANA Finance, Infosys Limited | May 14, 2018

Learn how to extend and structure your cost center and profit center master data so that you can use a new feature in SAP S/4HANA 1709. The SAP Fiori Manage Flexible Hierarchies application enables easier maintenance... MORE »»


Why You Should Care About SAP Cybersecurity: Evolution of the Threat Landscape

by Juan Perez-Etchegoyen, CTO, Onapsis | April 30, 2018

This blog explains actions organizations can take to secure their SAP applications and protect their SAP systems from a breach. MORE »»


How to Respond to an Attack on Your SAP Applications

by Juan Perez-Etchegoyen, CTO, Onapsis | April 23, 2018

Preparation is one of the most important phases of building an incident response plan. In this blog Juan Perez-Etchegoyen of Onapsis describes some key components of this phase.
MORE »»


Tips on How to Maximize Security and Productivity with SAP Single Sign-On

by Kristian Lehment, Senior Product Manager, SAP SE | April 18, 2018

Learn the basics of the key technologies involved with SAP Single Sign-On and read about scenarios involved in safeguarding access management in the whole system environment. MORE »»


Securing SAP Fiori Applications: 3 Quick Wins

by Juan Perez-Etchegoyen, CTO, Onapsis | April 16, 2018

Because SAP Fiori applications are meant to connect people and organizations, you might be exposing these applications to the internet, with the security and business risks that it implies. Learn three quick fixes in SAP Fiori applications that will help... MORE »»


Attacks to an SAP System: Bypassing Detection and How to Prevent It

by Juan Perez-Etchegoyen, CTO, Onapsis | April 9, 2018

Juan Perez-Etchegoyen of Onapsis describes a vulnerability in SAP HANA 1.0 and explains how you fix it.
MORE »»


Businesses Need to Do Three Things in 2018: SAPPHIRE NOW Makes It Happen

by Susan Galer | March 29, 2018

These are the top three customer priorities, along with how SAPPHIRE NOW will address them in 2018.

MORE »»


Digital Transformation Insights with Hitachi Vantara

March 29, 2018

Hitachi Vantara Chief Technology Officer Paul Lewis attaches meaning to survey findings with examination of the data-centric approach.

MORE »»


Has Your System Been Breached?

by Andrea Haynes, Senior Editor | March 27, 2018

Be sure you are as aware as cyber attackers are of the methods for breaking into your SAP system. Juan Perez-Etchegoyen of Onapsis outlines a number of potential threats and provides advice about how to counter them and protect your... MORE »»


SAPinsider
FAQ