Lukardi Blog

The only job of IES is to extract data from documents and send it back to SAP, which basically means cutting down on data entry work and automating the process. Unlike the previous OCR systems dedicated to VIM (ICC – Invoice Capture Center).
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
Due to the lack of universality of good solutions for this area, workflow processes evolve very slowly. Moreover, they most often result from internal attempts to improve the process. Nevertheless, awareness of the needs in the area of better document control is definitely growing. It is dictated not only by changing business requirements,
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
The years 2022 and 2023 were revolutionary for invoice exchange also in Poland. This is all due to a new regulation that introduced the National e-Invoice System (KSeF). What is KSeF? It's a central government system designed to facilitate the electronic exchange of invoices between business entities.