contact@lukardi.com
+ 48 508 400 203
SAP Cyber Security
Document Management System
IT Recruitment
About Us
Career
Blog
SAP
SAP Security
Authorizations Conflict
Investor Relations
Reports (in Polish Language)
Management Board and Supervisory Board
Information for Investors and the Media
Contact
SAP Cyber Security
Document Management System
IT Recruitment
About Us
About Us
Career
Blog
SAP Security
SAP
Authorizations Conflict
Investor Relations
Management Board and Supervisory Board
Information for Investors and the Media
Contact
contact@lukardi.com
+ 48 508 400 203
Blog
Kategorie Blog EN
All
News
SAP Security
Project of Authorization Reorganization
In a previous article, we wrote about authorization audit using SAST tools. Such an audit, if it brings alarming results in the area of SAP security (read: the audit report clearly shows that as an organization, we need changes in the field of better management of users and authorizations in the organization) often leads to […]
Reading time:
2
min.
15 February 2023
Do you know what rights your employees have?
Business does not like chaos and hates uncertainty Roles, permissions and authorizations in SAP are a topic that we have already discussed several times. We wrote about the threats that result from the lack of the concept of permissions, poorly conducted processes of granting them and the associated risks for the organization. Today, in this […]
Reading time:
4
min.
15 February 2023
SAST Super User Management
What does the Sast Super User Management module offer? The Super User Management module in SAST offers a feature that allows users to work without permission SAP_ALL or other critical authorizations in the production system. User FireFighter is a temporary user, which provides extended permissions, and at the same time allows you to control it […]
Reading time:
2
min.
15 February 2023
How do I Define Authorization Concepts?
How do I Define Authorization Concepts? SAP HANA is a concept of quick access to in-memory data. It allows for the analysis of large, often unaggregated, amounts of data much faster than in other databases. Data handling in SAP HANA differs significantly from the one we know from SAP NetWeaver. It has its own system […]
Reading time:
3
min.
14 February 2023
Migration to S/4HANA - Security and Authorization Challenges
It is estimated that by 2020, around 30% of companies globally will start using S4/HANA in production (in 2018, only 2% of all companies used S4). We will discuss two areas that should be addressed if we want to raise (or maintain a high) level of security of the target system—authorizations and the technical level. […]
Reading time:
4
min.
13 January 2023
SAP License Costs - How to Optimize Them?
SAP License Costs - How to Optimize Them? Lowering the cost of information technology is a constantly appearing element of budgeting the IT resources of many organizations. In the case of a SAP environment, licensing costs often make a particularly large contribution to overall IT costs. Often, organizations also regularly review their licenses to find […]
Reading time:
2
min.
31 July 2022
Do Security Notes Live up to Their Name?
Do Security Notes Live up to Their Name? Each month, SAP publishes new Security Notes Many SAP administrators install these patches quickly. The only question is - do you believe in the security they provide? In today's article, we will answer the question of whether the security vulnerabilities will still be exploited in such a […]
Reading time:
3
min.
31 July 2022
A Security Gap Causes a Cyberattack
A Security Gap Causes a Cyberattack For the first time in history, the US Department of Homeland Security has published report on security threats to SAP systems (US-CERT Alert for cybersecurity of SAP business applications). The report describes what a security gap had an impact on taking control over SAP systems. 36 organizations were attacked […]
Reading time:
2
min.
31 July 2022
What is the Cause of the Data Leak?
What is the Cause of the Data Leak? Until a few years ago, data security topics were discussed by narrow groups of specialists in the field of cybersecurity. Before the era of ubiquitous logins and passwords - the awareness of data security threats was not a concern of many people. Those times are gone forever. […]
Reading time:
2
min.
31 July 2022
SAP Security
SAP Security Security requirements are constantly increasing, and securing critical data in an organization is one of the basic issues that ensure the continuity of basic business processes. System environments are becoming more and more complex (communication with external systems, data exchange and continuous development of existing systems). During a possible attack on the SAP system (no […]
Reading time:
4
min.
31 July 2022
How to Create a Password to Keep the SAP System Secure?
How to Create a Password to Keep the SAP System Secure? The subject is old, as old as a worn jacket after 200 meetings on security. Known topic, known as the most popular password on the web (123456 (?)). A topic as stretched as ... a thin layer of butter on a large slice of […]
Reading time:
4
min.
10 July 2022
Monitoring the Behavior of SAP Users
Monitoring the Behavior of SAP Users Increasing requirements (e.g. from GDPR regulations) force organizations to implement solutions that will increase the level of security of systems processing personal data. SAP is no different. Today's article will show you how to increase data security in 3 steps. Data security is not only about authorizations To break […]
Reading time:
4
min.
10 July 2022
1
2
3
>
Menu
SAP Cyber Security
Document Management System
IT Recruitment
About Us
Blog
Contact
Privacy Policy
Contact
contact@lukardi.com
+ 48 508 400 203
Address Information
ul. Tęczowa 3 , 60-275 Poznań
NIP: 5213683072
REGON: 360098885
Visit our Social Media:
Contact
contact@lukardi.com
+ 48 508 400 203
Address Information
ul. Tęczowa 3 , 60-275 Poznań
NIP: 5213683072
REGON: 360098885
Visit our Social Media:
Lukardi 2022. All Rights Reserved.
Made with
by
Uxtivity
heart
arrow-down-s-line
close-circle-line
menu-line
time-line
linkedin-box-line
phone-line
calendar-line
mail-open-line