By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
SAP security administration News
January 12, 2011
SAP’s acquisition of Secude means that users will no longer have to go to third-party vendors for secure login and enterprise sign-on capabilities.
December 15, 2010
SAP says it has addressed a flaw within BusinessObjects that hackers could have used to gain control of the application.
December 23, 2009
Curious what other SAP customers are looking for advice on? Check out the most popular expert answers of 2009.
September 16, 2009
This special report on SAP TechEd 2009 compiles information from SAP's annual event for hands-on SAP training and SAP technical information. Get ready for SAP TechEd 2009 Phoenix by checking out SearchSAP.com's in-depth resources on each conference ...
SAP security administration Get Started
Bring yourself up to speed with our introductory content
Security is an increasingly important consideration for SAP customers and professionals. This SearchSAP.com Special Report provides the latest news, analysis and tips on SAP-related security issues. Continue Reading
Learn the response to the seventh question in SearchSAP.com's exclusive security quiz. Read the answer and more detailed information. Continue Reading
Learn the response to the ninth question in SearchSAP.com's exclusive security quiz. Read the answer and more detailed information on authorizations. Continue Reading
Evaluate SAP security administration Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Bill Tolson outlines the steps you should take to create an effective records retention policy for your organization's email. Continue Reading
Manage SAP security administration
Learn to apply best practices and optimize your operations.
No system, not even SAP ERP, is immune to security risks -- more than 400 SAP vulnerabilities have been identified. Here are tips for battling threats to SAP cybersecurity. Continue Reading
As an integral part of end-to-end process integration, this book provides both experienced and new SAP XI developers with a detailed overview of the functions and usage options of the SAP Exchange Infrastructure. Continue Reading
This book covers questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations and ethics. The book also explores topics such ... Continue Reading
Problem Solve SAP security administration Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
SAP licenses can be a huge expense, but there are ways for enterprises to reduce licensing costs and ensure a better ROI on SAP investments. Continue Reading
A SearchSAP.com reader wants to know how to grant a user access to cost centers, as well as access to one cost element across all cost centers. Continue Reading
Learn how to stop SAP users from displaying HR table contents in an SAP table without restricting access to an SE16N transaction. Continue Reading