Lukardi Blog
- Security
For the first time in history, the U.S. Department of Homeland Security has published a report on security threats to SAP systems (US-CERT Alert for cybersecurity of SAP business applications). The report explains how a security vulnerability led to the takeover of SAP systems.
- Security
It would seem that - certainly - every system administrator, as well as - at the very least - users representing top management are well aware of what access rights each of them has to the system.
- Security
In the KuppingerCole Leadership Compass report, the SAST GRC Suite secured the top position (leader) in the analysis of security management solutions. What contributed to this assessment of the solution?
- Security
A report by analyst firm KuppingerCole leaves no doubt. Enterprise security is primarily affected by the evolving IT infrastructure and the ever-increasing level of threats (new opportunities for data interception are regularly emerging). SAP security should therefore become a priority for any organization using this system.
- Security
Let's dispel doubts at the outset - there is no safe IT system. There can be a malfunction in any system, and trying to solve it may involve a malfunction on another level. There are also different requirements for the functionality of the system, and they do not always coincide. The architect designing the system
- License Optimization
It is worth acknowledging that migration to S/4 HANA gives customers not only a new landscape and new functionalities, but also a new price list for SAP services and products.