SAP security administration News
January 12, 2011
SAP’s acquisition of Secude means that users will no longer have to go to third-party vendors for secure login and enterprise sign-on capabilities.
December 15, 2010
SAP says it has addressed a flaw within BusinessObjects that hackers could have used to gain control of the application.
December 23, 2009
Curious what other SAP customers are looking for advice on? Check out the most popular expert answers of 2009.
September 16, 2009
This special report on SAP TechEd 2009 compiles information from SAP's annual event for hands-on SAP training and SAP technical information. Get ready for SAP TechEd 2009 Phoenix by checking out SearchSAP.com's in-depth resources on each conference ...
SAP security administration Get Started
Bring yourself up to speed with our introductory content
Security is an increasingly important consideration for SAP customers and professionals. This SearchSAP.com Special Report provides the latest news, analysis and tips on SAP-related security issues. Continue Reading
Learn the response to the tenth question in SearchSAP.com's exclusive security quiz. Read the answer and more detailed information. Continue Reading
Learn the response to the eleventh question in SearchSAP.com's exclusive security quiz. Read the answer and more detailed information. Continue Reading
Evaluate SAP security administration Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Bill Tolson outlines the steps you should take to create an effective records retention policy for your organization's email. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
A good choice if you are a .Net, Java SaaS provider looking for a Security as a Service solution. Their services take you through application...Continue Reading
Powered by IT Central Station
v2 Review: Premature product - not a proper product to be used for PCI approved web scanning Having done numerous penetration tests using various...Continue Reading
Centerbeam's security options for good data security 1. closed API's 2.Integration tied to customer environment and ActiPowered by IT Central Station
Valuable Features: The access of your whole group of data and the functionality of the command line, it is direct and very easy to use, in...Continue Reading
Manage SAP security administration
Learn to apply best practices and optimize your operations.
As an integral part of end-to-end process integration, this book provides both experienced and new SAP XI developers with a detailed overview of the functions and usage options of the SAP Exchange Infrastructure. Continue Reading
This book covers questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations and ethics. The book also explores topics such ... Continue Reading
Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software,... Continue Reading
Problem Solve SAP security administration Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A SearchSAP.com reader wants to know how to grant a user access to cost centers, as well as access to one cost element across all cost centers. Continue Reading
Learn how to stop SAP users from displaying HR table contents in an SAP table without restricting access to an SE16N transaction. Continue Reading
A SearchSAP.com reader who stores user email addresses within the SAP SU01 transaction code and wants to know where to locate the data. Continue Reading