contact@lukardi.com
+ 48 508 400 203
SAP Cyber Security
Document Management System
IT Recruitment
About Us
Career
Blog
SAP
SAP Security
Authorizations Conflict
Investor Relations
Reports (in Polish Language)
Management Board and Supervisory Board
Information for Investors and the Media
Contact
SAP Cyber Security
Document Management System
IT Recruitment
About Us
About Us
Career
Blog
SAP Security
SAP
Authorizations Conflict
Investor Relations
Management Board and Supervisory Board
Information for Investors and the Media
Contact
contact@lukardi.com
+ 48 508 400 203
Blog
Kategorie Blog EN
All
News
SAP Security
Periodic Verifications in the Area of SAP Authorization
Today we would like to draw your attention to a very important issue in the area ofSAP authorization security.. In addition to one-off projects of role reorganization and SOD, issues such as maintaining the concept of rights and administrative and procedural order in roles developed in the project are equally important. How to prevent "crossovers" […]
Reading time:
4
min.
31 March 2023
SAP - USU License Audit Helps You Save Time and Money
SAP Software is a frequently used technology all over the world, it is used by various enterprises and corporations, small or large companies. However, the purchase and implementation of SAP software is associated with huge expenses for software licenses. Blocking or deleting accounts does not always help to reduce costs and fix problems during the […]
Reading time:
2
min.
31 March 2023
How do You Secure a SAP System?
Meeting with C-Level for many years, discussing SAP security, I get the following message in return: “we spent several expenses on SAP implementation and you want to say that it is not a secure system?” No matter how you look at it, the question is on point. After all, a powerful vendor, a lot of […]
Reading time:
6
min.
16 February 2023
Project of Authorization Reorganization
In a previous article, we wrote about authorization audit using SAST tools. Such an audit, if it brings alarming results in the area of SAP security (read: the audit report clearly shows that as an organization, we need changes in the field of better management of users and authorizations in the organization) often leads to […]
Reading time:
2
min.
15 February 2023
Do you know what rights your employees have?
Business does not like chaos and hates uncertainty Roles, permissions and authorizations in SAP are a topic that we have already discussed several times. We wrote about the threats that result from the lack of the concept of permissions, poorly conducted processes of granting them and the associated risks for the organization. Today, in this […]
Reading time:
4
min.
15 February 2023
SAST Super User Management
What does the Sast Super User Management module offer? The Super User Management module in SAST offers a feature that allows users to work without permission SAP_ALL or other critical authorizations in the production system. User FireFighter is a temporary user, which provides extended permissions, and at the same time allows you to control it […]
Reading time:
2
min.
15 February 2023
How do I Define Authorization Concepts?
How do I Define Authorization Concepts? SAP HANA is a concept of quick access to in-memory data. It allows for the analysis of large, often unaggregated, amounts of data much faster than in other databases. Data handling in SAP HANA differs significantly from the one we know from SAP NetWeaver. It has its own system […]
Reading time:
3
min.
14 February 2023
Migration to S/4HANA - Security and Authorization Challenges
It is estimated that by 2020, around 30% of companies globally will start using S4/HANA in production (in 2018, only 2% of all companies used S4). We will discuss two areas that should be addressed if we want to raise (or maintain a high) level of security of the target system—authorizations and the technical level. […]
Reading time:
4
min.
13 January 2023
SAP License Costs - How to Optimize Them?
SAP License Costs - How to Optimize Them? Lowering the cost of information technology is a constantly appearing element of budgeting the IT resources of many organizations. In the case of a SAP environment, licensing costs often make a particularly large contribution to overall IT costs. Often, organizations also regularly review their licenses to find […]
Reading time:
2
min.
31 July 2022
Do Security Notes Live up to Their Name?
Do Security Notes Live up to Their Name? Each month, SAP publishes new Security Notes Many SAP administrators install these patches quickly. The only question is - do you believe in the security they provide? In today's article, we will answer the question of whether the security vulnerabilities will still be exploited in such a […]
Reading time:
3
min.
31 July 2022
A Security Gap Causes a Cyberattack
A Security Gap Causes a Cyberattack For the first time in history, the US Department of Homeland Security has published report on security threats to SAP systems (US-CERT Alert for cybersecurity of SAP business applications). The report describes what a security gap had an impact on taking control over SAP systems. 36 organizations were attacked […]
Reading time:
2
min.
31 July 2022
What is the Cause of the Data Leak?
What is the Cause of the Data Leak? Until a few years ago, data security topics were discussed by narrow groups of specialists in the field of cybersecurity. Before the era of ubiquitous logins and passwords - the awareness of data security threats was not a concern of many people. Those times are gone forever. […]
Reading time:
2
min.
31 July 2022
Menu
SAP Cyber Security
Document Management System
IT Recruitment
About Us
Blog
Contact
Privacy Policy
Contact
contact@lukardi.com
+ 48 508 400 203
Address Information
ul. Tęczowa 3 , 60-275 Poznań
NIP: 5213683072
REGON: 360098885
Visit our Social Media:
Contact
contact@lukardi.com
+ 48 508 400 203
Address Information
ul. Tęczowa 3 , 60-275 Poznań
NIP: 5213683072
REGON: 360098885
Visit our Social Media:
Lukardi 2022. All Rights Reserved.
Made with
by
Uxtivity
heart
arrow-down-s-line
close-circle-line
menu-line
time-line
linkedin-box-line
phone-line
calendar-line
mail-open-line