Lukardi Blog

How to effectively control risks and accelerate engineering projects? In major projects, every day of delay is a real financial loss and contractual risk. Learn how ECM-class solutions - such as OpenText Content Management (Extended ECM) for Engineering - help reduce errors, accelerate collaboration
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Access management in SAP is not just about technical role assignment. It's all about security, regulatory compliance and mitigating risks - especially financial risks. In this article, we discuss how the authorization system in SAP works, what it consists of, why it “swells” over time ...
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
At the conference on SAP Security - Tips for Security, I shared with you the knowledge I've gained from both SoD and authorizations reorganization projects and daily tasks in Managed Services. For those of you who could not attend the conference, we have prepared a brief summary.
SAP is secure in itself. However, it is up to the customer's actions to take care of data security issues. In this particular context, it is impossible to ignore the inventory benefits of dedicated SAP Security tools.
Backups are an exact copy of our organization's most important data. Such backups should be kept off the affected system - so that a potential failure or attack does not deprive us of access to all our data.
The concept of Entitlements, in addition to the entitlement reorganization project appears like a horror to audited managers and entitlement administrators. However, this is only the case if such documentation has not been kept in the organization or has not been updated for many years, and often since the implementation of SAP in the company. One could
You may already know that as of SAP 7.40 SP8, you can use SAP security policies (SECPOL) to define user-specific security parameters, as opposed to system profile values.
SAP HANA is the concept of fast access to in-memory data. It allows for the analysis of large, often unaggregated amounts of data, much faster than other databases. The way data is handled in SAP HANA is quite different from what we're used to with SAP NetWeaver. It has
Due to the lack of universality of good solutions for this area, workflow processes evolve very slowly. Moreover, they most often result from internal attempts to improve the process. Nevertheless, awareness of the needs in the area of better document control is definitely growing. It is dictated not only by changing business requirements,
The years 2022 and 2023 were revolutionary for invoice exchange also in Poland. This is all due to a new regulation that introduced the National e-Invoice System (KSeF). What is KSeF? It's a central government system designed to facilitate the electronic exchange of invoices between business entities.
ECM (Enterprise Content Management) systems, or information resource management systems, are becoming more and more common in enterprises, and their users are increasing in proportion to the growing amount of content that enterprises handle. The mass digitization of documents, has not only made it possible to speed up hitherto analog processes, but has provided entirely new opportunities.
In today’s digital age, collecting vast amounts of data has become common for organizations across various sectors. One frequently discussed issue is how to effectively manage this data to ensure smooth operations. This is where data archiving in the SAP system plays a key role.
OpenText™ Core Capture is a SaaS application for capturing information that uses continuous machine learning to automate smart file classification and data extraction. Core Capture combines standard capturing features like optical character recognition (OCR) with powerful artificial intelligence technology to enable intelligent document processing.
What is OpenText? What functionalities and capabilities does it have? What will you gain by implementing OpenText? Read on and find out now!
Access management in SAP is not just about technical role assignment. It's all about security, regulatory compliance and mitigating risks - especially financial risks. In this article, we discuss how the authorization system in SAP works, what it consists of, why it “swells” over time ...
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
The following post contains a synopsis of the work carried out for one of SAST's clients, the main core of which was the optimization of authorization and user access was also implemented remodeling of the authorization concept.
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
In the context of data migration, precise planning and execution are crucial to the success of a project. However, even the best-organized processes can encounter unexpected problems. This is why crisis management planning becomes an indispensable part of any data migration.
Data migration is a process that is often seen as the culmination of the journey to modern information systems. Companies that invest in data quality are better equipped to make strategic decisions and adapt faster to changing market conditions.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
Mirakl, a pioneer in the marketplace category, launched in 2012 and continues to help established retailers and B2B companies scale their businesses, maximizing growth and profitability. Through innovation, regulatory compliance and customized features, Mirakl helps companies deliver a seamless and scalable customer experience that reflects their
How to effectively control risks and accelerate engineering projects? In major projects, every day of delay is a real financial loss and contractual risk. Learn how ECM-class solutions - such as OpenText Content Management (Extended ECM) for Engineering - help reduce errors, accelerate collaboration
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Access management in SAP is not just about technical role assignment. It's all about security, regulatory compliance and mitigating risks - especially financial risks. In this article, we discuss how the authorization system in SAP works, what it consists of, why it “swells” over time ...
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
It is estimated that by 2020, about 30% companies globally will start using S4/HANA in production (in 2018, only 2% of all companies were using S4). I will discuss two areas that should be addressed if we are to raise (or maintain a high) level of security of the target system - authorizations and
This article will also refer to passwords, but already more indirectly and in a broader spectrum. We will consider how by improving the security of the system related to logins we can help administrators.After all, admins deserve a bit of a breather doing their heavy and responsible tasks, right?
A topic already as stretched as... a thin layer of butter on a large slice of bread... However, it returns like a boomerang and not because it is popular and well-liked,
Every month SAP releases new Security Notes. Many SAP administrators are quick to install these patches. The only question that arises is - do they believe in the security they provide? In today's article, we will answer the question - will security vulnerabilities continue to be exploited in such a situation?
Increasing requirements are forcing organizations to implement such solutions that will increase the security level of systems that process personal data. SAP is no exception. Today's article will show you how to increase data security in 3 steps.
Until a few years ago, data security topics were discussed by a narrow group of cyber security professionals. Before the era of ubiquitous logins and passwords - awareness of data security risks was not a concern for many people. Those days are irrevocably gone. Why cyber security
How to effectively control risks and accelerate engineering projects? In major projects, every day of delay is a real financial loss and contractual risk. Learn how ECM-class solutions - such as OpenText Content Management (Extended ECM) for Engineering - help reduce errors, accelerate collaboration
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
In today's dynamic business environment, where the amount of data generated by companies is growing at a dizzying pace, effective information management is becoming a key challenge. Companies must not only process and analyze data efficiently, but also ensure its secure storage and compliance with increasingly stringent requirements
As of February 1, 2026, the National e-Invoicing System (KSeF) will become mandatory for businesses in Poland. This means a real revolution in the area of invoicing and tax settlements. All structured invoices will have to be issued, received and stored exclusively in the KSeF system, which will eliminate traditional invoices
Access management in SAP is not just about technical role assignment. It's all about security, regulatory compliance and mitigating risks - especially financial risks. In this article, we discuss how the authorization system in SAP works, what it consists of, why it “swells” over time ...
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
The following post contains a synopsis of the work carried out for one of SAST's clients, the main core of which was the optimization of authorization and user access was also implemented remodeling of the authorization concept.
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
In the context of data migration, precise planning and execution are crucial to the success of a project. However, even the best-organized processes can encounter unexpected problems. This is why crisis management planning becomes an indispensable part of any data migration.
Data migration is a process that is often seen as the culmination of the journey to modern information systems. Companies that invest in data quality are better equipped to make strategic decisions and adapt faster to changing market conditions.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
Mirakl, a pioneer in the marketplace category, launched in 2012 and continues to help established retailers and B2B companies scale their businesses, maximizing growth and profitability. Through innovation, regulatory compliance and customized features, Mirakl helps companies deliver a seamless and scalable customer experience that reflects their