SAP security tools are top-shelf and ready to prevent attacks. Learn about authorizations, authentication, auditing, GDPR security, and more! Secure your systems now.
Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and
… More about the book
Master SAP ILM, from retention management to lifecycle management for custom code. Follow step-by-step instructions and walk through all major functionality including policy creation, legal case management, data archiving, and more. Whether you’re on SAP S/4HANA, SAP S/4HANA Cloud, or
… More about the book
If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you! Discover information on security-relevant issues, from identity and access management to network and backend security. Get the technical know-how
… More about the book
Volker Lehnert, Iwona Luther, Björn Christoph, Carsten Pluder, Nicole Fernandes
430 pages, hardcover
Can your data privacy protocols prevent data breaches? With this guide, you’ll develop and implement a privacy policy that protects your data and complies with GDPR. Learn to block and delete data, implement purpose-based processing, and determine who can access
… More about the book
Authorizations aren't easy, but this book is here to help. Learn how to develop a meaningful authorization concept that meets statutory requirements and is tailored to your business processes. Explore the SAP tools and functions that play a role in
… More about the book
Have you ever had an unauthorized user access something in your system that you could have sworn was off limits? Here you go: SAP PRESS equips you with "100 Things" that unlock the secrets of managing your security and authorizations
… More about the book
Data breaches, account hijacking, exploits—you know the threats to your data. With this E-Bite, see how SAP secures your cloud system. Discover the tools you can use to protect your data: single sign-on, the code vulnerability analyzer, SAP Solution Manager,
… More about the book
Unlock the secrets of SAP SuccessFactors Admin Center (formerly OneAdmin)! Learn to navigate the homepage and its portlets. Then, follow step-by-step instructions for maintaining your SAP SuccessFactors data—including importing and exporting data—and securing your system using Role-Based Permissions (RBP). From
… More about the book
"Don't talk to strangers"—if only data security policies were this easy. Learn to keep your SAP BusinessObjects Business Intelligence data truly safe from unauthorized actions with this comprehensive guide. Begin with security basics and work your way to advanced concepts;
… More about the book
Provision users and set up permissions in SAP Integrated Business Planning! Begin by learning about identity and access management in the SAP IBP landscape. Then, follow step-by-step walkthroughs for each key task: creating and provisioning SAP IBP users, assigning permissions,
… More about the book