Lukardi Blog

Data migration is a process that is often seen as the culmination of the journey to modern information systems. Companies that invest in data quality are better equipped to make strategic decisions and adapt faster to changing market conditions.
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
From January 2025, Polish entrepreneurs will have to face a new legal obligation - the introduction of the Single Control File for corporate income tax, or JPK CIT. In this article, we will take a look at what the CIT JPK is, what the consequences will be for entrepreneurs.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
In today's dynamic business environment, one of the key tools that has revolutionized the way businesses report their financial and accounting data is the Single Audit File (PL Jednolity Plik Kontroln JPK).
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
At the conference on SAP Security - Tips for Security, I shared with you the knowledge I've gained from both SoD and authorizations reorganization projects and daily tasks in Managed Services. For those of you who could not attend the conference, we have prepared a brief summary.
SAP is secure in itself. However, it is up to the customer's actions to take care of data security issues. In this particular context, it is impossible to ignore the inventory benefits of dedicated SAP Security tools.
Backups are an exact copy of our organization's most important data. Such backups should be kept off the affected system - so that a potential failure or attack does not deprive us of access to all our data.
The concept of Entitlements, in addition to the entitlement reorganization project appears like a horror to audited managers and entitlement administrators. However, this is only the case if such documentation has not been kept in the organization or has not been updated for many years, and often since the implementation of SAP in the company. One could
You may already know that as of SAP 7.40 SP8, you can use SAP security policies (SECPOL) to define user-specific security parameters, as opposed to system profile values.
SAP HANA is the concept of fast access to in-memory data. It allows for the analysis of large, often unaggregated amounts of data, much faster than other databases. The way data is handled in SAP HANA is quite different from what we're used to with SAP NetWeaver. It has
How to effectively control risks and accelerate engineering projects? In major projects, every day of delay is a real financial loss and contractual risk. Learn how ECM-class solutions - such as OpenText Content Management (Extended ECM) for Engineering - help reduce errors, accelerate collaboration
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
In today's dynamic business environment, where the amount of data generated by companies is growing at a dizzying pace, effective information management is becoming a key challenge. Companies must not only process and analyze data efficiently, but also ensure its secure storage and compliance with increasingly stringent requirements
As of February 1, 2026, the National e-Invoicing System (KSeF) will become mandatory for businesses in Poland. This means a real revolution in the area of invoicing and tax settlements. All structured invoices will have to be issued, received and stored exclusively in the KSeF system, which will eliminate traditional invoices
Access management in SAP is not just about technical role assignment. It's all about security, regulatory compliance and mitigating risks - especially financial risks. In this article, we discuss how the authorization system in SAP works, what it consists of, why it “swells” over time ...
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
The following post contains a synopsis of the work carried out for one of SAST's clients, the main core of which was the optimization of authorization and user access was also implemented remodeling of the authorization concept.
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
In the context of data migration, precise planning and execution are crucial to the success of a project. However, even the best-organized processes can encounter unexpected problems. This is why crisis management planning becomes an indispensable part of any data migration.
Data migration is a process that is often seen as the culmination of the journey to modern information systems. Companies that invest in data quality are better equipped to make strategic decisions and adapt faster to changing market conditions.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
Mirakl, a pioneer in the marketplace category, launched in 2012 and continues to help established retailers and B2B companies scale their businesses, maximizing growth and profitability. Through innovation, regulatory compliance and customized features, Mirakl helps companies deliver a seamless and scalable customer experience that reflects their
How to effectively control risks and accelerate engineering projects? In major projects, every day of delay is a real financial loss and contractual risk. Learn how ECM-class solutions - such as OpenText Content Management (Extended ECM) for Engineering - help reduce errors, accelerate collaboration
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Access management in SAP is not just about technical role assignment. It's all about security, regulatory compliance and mitigating risks - especially financial risks. In this article, we discuss how the authorization system in SAP works, what it consists of, why it “swells” over time ...
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
Business doesn't like chaos and hates uncertainty Roles, permissions and authorizations in SAP is a river topic that we have covered several times. We've written about the dangers that arise from a lack of conceptualization of authorizations, poorly managed authorization procs and the associated risks to the organization. Today, in
It is worth noting that in the case of reorganization of authorizations, it is also possible to apply the so-called "creeping project", that is, we fix and seal the system step by step. This is a good option when we have few human resources, time and money for a big reorganization project.
SAL will ensure the security of the system only if it is properly configured (SM19/RSAU_CONFIG) AND looked after (SM20/RSAU_READ_LOG), and if access to it is strictly limited and controlled. Both the Basis department and security key users (auditors) have something to say at the configuration.
What are SAP notes? Generalizing, we can say that they are small updates to the software - they contain corrections to the code, include a description of the problem, etc. Their second role is support, which does not contain corrections/updates but documents a specific problem, often in broad terms.
How do you prepare for it with SAST and what benefits does it bring to the organization? Any thought on increasing security in an organization that takes the form of a plan or at least a discussion is worthy of consideration.
SAST's Super User Management module offers a feature that allows users to work without SAP_ALL or other critical authorizations on the production system.
How to effectively control risks and accelerate engineering projects? In major projects, every day of delay is a real financial loss and contractual risk. Learn how ECM-class solutions - such as OpenText Content Management (Extended ECM) for Engineering - help reduce errors, accelerate collaboration
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
In today's dynamic business environment, where the amount of data generated by companies is growing at a dizzying pace, effective information management is becoming a key challenge. Companies must not only process and analyze data efficiently, but also ensure its secure storage and compliance with increasingly stringent requirements
As of February 1, 2026, the National e-Invoicing System (KSeF) will become mandatory for businesses in Poland. This means a real revolution in the area of invoicing and tax settlements. All structured invoices will have to be issued, received and stored exclusively in the KSeF system, which will eliminate traditional invoices
Access management in SAP is not just about technical role assignment. It's all about security, regulatory compliance and mitigating risks - especially financial risks. In this article, we discuss how the authorization system in SAP works, what it consists of, why it “swells” over time ...
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
The following post contains a synopsis of the work carried out for one of SAST's clients, the main core of which was the optimization of authorization and user access was also implemented remodeling of the authorization concept.
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
In the context of data migration, precise planning and execution are crucial to the success of a project. However, even the best-organized processes can encounter unexpected problems. This is why crisis management planning becomes an indispensable part of any data migration.
Data migration is a process that is often seen as the culmination of the journey to modern information systems. Companies that invest in data quality are better equipped to make strategic decisions and adapt faster to changing market conditions.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
Mirakl, a pioneer in the marketplace category, launched in 2012 and continues to help established retailers and B2B companies scale their businesses, maximizing growth and profitability. Through innovation, regulatory compliance and customized features, Mirakl helps companies deliver a seamless and scalable customer experience that reflects their