SAP security administration

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • SAP enables utility transformation

    The Smart Grid promises to revolutionize the utilities marketplace. SAP is working with big names in the industry to prepare the infrastructure. 

  • On The Spot: Mario Linkies on SAP security

    This month Mario Linkies answers all of your SAP security questions. 

  • Chapter 4: 'Technical Exercises'

    As an integral part of end-to-end process integration, this book provides both experienced and new SAP XI developers with a detailed overview of the functions and usage options of the SAP Exchange Infrastructure. 

  • SAP security: Special Report

    Security is an increasingly important consideration for SAP customers and professionals. This Special Report provides the latest news, analysis and tips on SAP-related security issues. 

  • Chapter 107: 'Common Models for Architecting an Enterprise Security Capability'

    This book covers questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations and ethics. The book also explores topics such a... 

  • Security Metrics, chapter 6: 'Visualization'

    Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, ... 

  • Chapter 5: 'Developing a Higher Security Mind'

    In this book security expert Kevin Day teaches you how to approach information security the way the top gurus do—as an art, rather than a collection of technologies. By applying this discipline, your solutions will be more secure and less burde... 

  • Chapter of the month -- July 2006

    Looking for information on how to keep your system safe, compliant and unappealing to hackers? Then this book, fresh off the press, might be of interest to you. This chapter explains IT security concepts for SAP Enterprise Portal in the Global Securi... 

  • Securing Web Services with Java

    This chapter of the book Building Web Services with Java examines security basics, Web services-specific security, trust, security policies, enterprise security, authorization, security services and J2EE security. 

  • 11. What does the term "technical names on" refer to in SAP Basis or SAP security?

    Learn the response to the eleventh question in's exclusive security quiz. Read the answer and more detailed information. 

  • See more Essential Knowledge on SAP security administration
  • SAP security tutorial: Top 10 SAP security implementation steps

    Implementing SAP software securely isn't only the job of SAP specialists; the entire IT department has a role to play. Learn the top ten steps to a secure SAP implementation. 

  • Easier maintenance of output types, procedures, conditions, etc.

    To shorten the time it takes to maintain output types, procedures, conditions, etc., add NACE to your shortcuts. 

  • Security buying in five easy steps

    Choosing a security product or service is not rocket science. But you can save money, reduce stress and have VARS competing for you if you follow these simple steps. 

  • Managed security services: What's right for you?

    Outsourcing security is not for every SMB. Thorough evaluation of your systems and IT needs help determine if managed security service providers are the right fit for your IT organization. 

  • Nmap Technical Guide

    By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring and running it in the enterprise is no easy task. With that in mind,, in collabora... 

  • Privacy and your offshore operations

    Most companies are used to considering the implications of Sarbanes-Oxley and Gramm-Leach-Bliley on their domestic operations, but thinking about security and privacy offshore is just as important. Contributor Joel Dubin explains how to ensure techni... 

  • SAP NetWeaver 2004s kernel updates explained -- Part II

    In the final part of a two-part series, SDN contributer Storm Archer III walks through processes for advanced kernel updates for scenarios like Java and Unix. 

  • SAP NetWeaver 2004s kernel updates explained -- Part I

    Learn what SAP kernels do for your SAP systems, where to get them and what factors to consider when applying one in this tip by SDN contributing member Storm Archer III. 

  • Email retention policy: A step-by-step approach

    Bill Tolson outlines the steps you should take to create an effective records retention policy for your organization's email. 

  • Data destruction

    How often do we hear about sensitive data falling into the wrong hands? And that data is usually on laptops, imagine the embarrassment if that data was found on something that was thrown away? Contributor Brien Posey explains the need for proper data... 

  • See more Tips on SAP security administration
About SAP security administration

Learn how to make your SAP infrastructure more secure with information about data protection, authentication and performing SAP authorizations, password policies, identity and access management, SAP flaws, data breaches, audits.