Governance, Risk, Compliance (GRC), and Cybersecurity
471 Blog Posts
94 Contributors
-
年代AP Analytics Cloud is a software as a service product SAP customers use for business intelligence, augmented analytics, predictive analytics, and enterprise planning. Depending on their data source, SAP customers have the option of choosing a live...Read More »1Comment3Likes
-
As cyber threats grow more dangerous and frequent, the once clear boundaries between SAP security, cyber security and compliance have started to blur. Traditionally, SAP security comprised the tools and processes that controlled what users can...Read More »2Comments17Likes
-
Part # 1/5 – The challenge for mitigation controls. Introduction In my previous post I introduced the blog post series we preapre together with Andrzej. I want to discuss the topic further to challange aproach where by default mitigation...Read More »0Comments0Likes
-
Come and visit us at the UKISUG 2022 Remote Usability Tests on December 6-8! There are still free slots for test sessions among 10 different topics! Check out our Topic 9: SAP Watch List Screening – Helping Prevent Terrorism with SAP...Read More »0Comments0Likes
-
As a refresh, at SAP we tend to talk about 4 key ERP processes for the Intelligent Enterprise: Source-to-Pay Recruit-to-Retire Design-to-Operate Lead-to-Cash This blog looks at the last of these, Lead-to-Cash, and is in fact the last in the...Read More »0Comments3Likes
-
年代APinsider 2022, Vienna The 2022 conference in Vienna has been another great SAPinsider success. The experiences and challenges that people from companies all around the world share and discuss with each other is essential to support the...Read More »0Comments6Likes
-
Regardless of whether the ERP system is an onPremise (e.g. SAP S/4HANA onPremise / SAP ECC) or Software-as-a-Service (SaaS) solution, all layers (physical data storage, database, operating system, middleware and application) must be considered by...Read More »0Comments4Likes
-
The implementation of additional mitigating controls is a frequent response from the company management in order to limit the risk of excessive (redundant or unnecessary) authorizations in ERP (SAP) systems. Is it a good way to eliminate the...Read More »0Comments3Likes
-
Introduction In this blog, we will learn how to configure masking in Analytical Queries to protect the sensitive information displayed in it. Analytical Queries are used for reporting and analysis. S/4HANA Embedded Analytics Analytics is one of the...Read More »0Comments2Likes
-
Introduction Recording Tool is used to store the Technical Address Entries for UI fields. It is used to activate recording for one or more users for specific timeframes. During this time, the system will record the technical addresses of the UI...Read More »0Comments0Likes