SAP security tools are top-shelf and ready to prevent attacks. Learn about authorizations, authentication, auditing, GDPR security, and more! Secure your systems now.
Discover SAP’s unified technology platform with this introductory guide! Get started with the building blocks of SAP Business Technology Platform: architecture design, runtime environments, and the development approach. Take a tour of the integrated tools and services for application development,
… More about the book
Security professionals, you know encryption is essential to protect your data. In this book, learn about the cryptography fundamentals—and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce data and
… More about the book
Develop a complete authorization concept for SAP S/4HANA and SAP Fiori with this guide! Start by understanding how authorizations work in an ABAP system and exploring the main transactions you’ll use for configuration. Then learn to create roles with Transaction
… More about the book
Performing or preparing for an SAP S/4HANA audit? This is the comprehensive guide you need! Understand what goes into an audit, from the objectives and timing to the reporting process. Prepare an audit roadmap for the system as a whole,
… More about the book
Learn about access management for your cloud and hybrid landscapes with SAP Cloud Identity Access Governance! First, understand the security challenges that SAP Cloud IAG helps solve. Then see how SAP Cloud IAG’s services work, from access analysis and privileged
… More about the book
Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to
… More about the book
Manage on-premise user access with this comprehensive guide to SAP Access Control. Begin with step-by-step installation and configuration instructions. Then implement key SAP Access Control modules, including access risk analysis, emergency access management, and access request management. Learn to manage
… More about the book
If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you! Discover information on security-relevant issues, from identity and access management to network and backend security. Get the technical know-how
… More about the book
Iwona Luther, Nicole Fernandes, Frank Buschle, Carsten Pluder
609 pages, hardcover
Master SAP ILM, from retention management to lifecycle management for custom code. Follow step-by-step instructions and walk through all major functionality including policy creation, legal case management, data archiving, and more. Whether you’re on SAP S/4HANA, SAP S/4HANA Cloud, or
… More about the book
Have you ever had an unauthorized user access something in your system that you could have sworn was off limits? Here you go: SAP PRESS equips you with "100 Things" that unlock the secrets of managing your security and authorizations
… More about the book
Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling
1141 pages, paperback
Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then expand your understanding of
… More about the book
Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and
… More about the book
Protect your SAP system from bad actors! Start by getting a thorough grounding in the why and what of cybersecurity before diving into the how. Create your security roadmap using tools like SAP’s secure operations map and the NIST Cybersecurity
… More about the book
Unlock the secrets of SAP SuccessFactors Admin Center (formerly OneAdmin)! Learn to navigate the homepage and its portlets. Then, follow step-by-step instructions for maintaining your SAP SuccessFactors data—including importing and exporting data—and securing your system using Role-Based Permissions (RBP). From
… More about the book
Mercedes Barrachina, Glen Hoaglund, Gaurang Joshi, Ryan Throop
80 pages
Stay ahead of cybersecurity vulnerabilities with SAP Enterprise Threat Detection. Learn to set up and use standard and nonstandard logs to analyze risks in your SAP environment. Review attack detection patterns and create your own custom patterns based on log
… More about the book
Are you building secure cloud applications? Reduce SAP system vulnerabilities by implementing security best practices in your applications. Learn to set up user authentication and authorization control in your apps. Address cloud application security weaknesses like broken access control, sensitive
… More about the book
Data protection is a key element of system security! With this E-Bite, learn to configure SAP S/4HANA to mask data in tables, transactions, and applications. Maintain flags, parameters, reasons codes, and more to set up UI data protection masking and
… More about the book
Logs are useful for more than just record-keeping. Learn how to analyze, use, and manage logs to improve your SAP S/4HANA security with this E-Bite! Start by accessing your logs, whether you’re running SAP S/4HANA on-premise or in the cloud.
… More about the book
Data breaches, account hijacking, exploits—you know the threats to your data. With this E-Bite, see how SAP secures your cloud system. Discover the tools you can use to protect your data: single sign-on, the code vulnerability analyzer, SAP Solution Manager,
… More about the book
Provision users and set up permissions in SAP Integrated Business Planning! Begin by learning about identity and access management in the SAP IBP landscape. Then, follow step-by-step walkthroughs for each key task: creating and provisioning SAP IBP users, assigning permissions,
… More about the book
Get the guidance you need to protect your SAP Fiori apps! Start by reviewing SAP Fiori 3 architecture to see how it impacts security. Then follow step-by-step instructions to configure frontend and backend authorizations. Learn how to implement security methods
… More about the book
Cloud systems can be vulnerable to attack—so make sure yours isn’t! See how to create users in SAP Analytics Cloud and enable a custom SAML identity provider to implement single sign-on for them. Assign users to teams and teams to
… More about the book