Tips
Tips
SAP security
-
Fight SAP cybersecurity risks with patches, research
No system, not even SAP ERP, is immune to security risks -- more than 400 SAP vulnerabilities have been identified. Here are tips for battling threats to SAP cybersecurity. Continue Reading
-
Easier maintenance of output types, procedures, conditions, etc.
To shorten the time it takes to maintain output types, procedures, conditions, etc., add NACE to your shortcuts. Continue Reading
-
Security buying in five easy steps
Choosing a security product or service is not rocket science. But you can save money, reduce stress and have VARS competing for you if you follow these simple steps. Continue Reading
-
Nmap Technical Guide
By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring and running it in the enterprise is no easy task. With that in mind, SearchSecurity.com, in ... Continue Reading
-
Managed security services: What's right for you?
Outsourcing security is not for every SMB. Thorough evaluation of your systems and IT needs help determine if managed security service providers are the right fit for your IT organization. Continue Reading
-
Privacy and your offshore operations
Most companies are used to considering the implications of Sarbanes-Oxley and Gramm-Leach-Bliley on their domestic operations, but thinking about security and privacy offshore is just as important. Contributor Joel Dubin explains how to ensure ... Continue Reading
-
SAP NetWeaver 2004s kernel updates explained -- Part II
In the final part of a two-part series, SDN contributer Storm Archer III walks through processes for advanced kernel updates for scenarios like Java and Unix. Continue Reading
-
SAP NetWeaver 2004s kernel updates explained -- Part I
Learn what SAP kernels do for your SAP systems, where to get them and what factors to consider when applying one in this tip by SDN contributing member Storm Archer III. Continue Reading
-
Data destruction
How often do we hear about sensitive data falling into the wrong hands? And that data is usually on laptops, imagine the embarrassment if that data was found on something that was thrown away? Contributor Brien Posey explains the need for proper ... Continue Reading
-
Email retention policy: A step-by-step approach
Bill Tolson outlines the steps you should take to create an effective records retention policy for your organization's email. Continue Reading
-
How to create transaction variants in SAP to hide information
Transaction Variants hide unwanted screens and fields in standard SAP programs. Learn two techniques to create them here. Continue Reading
-
Archives and data protection: The important differences
While the two are both equally important, it's vital that one doesn't confuse archiving with data protection. Marc Staimer explains their differences. Continue Reading
-
SAP security audit log setup
In this tip our upgrade/migration expert, Bert Vanstechelman, provides unorthodox uses for the Security Audit Log. Learn how to install this tool and use it to report resources necessary for the companies next upgrade and weigh transaction efforts. Continue Reading
-
Display locked and unlocked SAP transactions
This tip offers a quick and easy way to display locked/unlocked transactions. Continue Reading
-
SAP Security Learning Guide
Need to bulletproof your SAP system? This handy Learning Guide pulls SAP security information to provide the most comprehensive resource around. Get the scoop on everything from authentication and RFID security to compliance and auditing here! Continue Reading