Lukardi Blog

Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
The years 2022 and 2023 were revolutionary for invoice exchange also in Poland. This is all due to a new regulation that introduced the National e-Invoice System (KSeF). What is KSeF? It's a central government system designed to facilitate the electronic exchange of invoices between business entities.
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
ECM (Enterprise Content Management) systems, or information resource management systems, are becoming more and more common in enterprises, and their users are increasing in proportion to the growing amount of content that enterprises handle. The mass digitization of documents, has not only made it possible to speed up hitherto analog processes, but has provided entirely new opportunities.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
At the conference on SAP Security - Tips for Security, I shared with you the knowledge I've gained from both SoD and authorizations reorganization projects and daily tasks in Managed Services. For those of you who could not attend the conference, we have prepared a brief summary.