Lukardi Blog

Until a few years ago, data security topics were discussed by a narrow group of cyber security professionals. Before the era of ubiquitous logins and passwords - awareness of data security risks was not a concern for many people. Those days are irrevocably gone. Why cyber security
Security requirements are continuously increasing, and securing critical data in an organization is one of the fundamental issues that guarantee the continuity of core business processes. System environments are becoming increasingly complex (communication with external systems, data exchange and continuous development of existing systems).
For the first time in history, the U.S. Department of Homeland Security has published a report on security threats to SAP systems (US-CERT Alert for cybersecurity of SAP business applications). The report explains how a security vulnerability led to the takeover of SAP systems.
It would seem that - certainly - every system administrator, as well as - at the very least - users representing top management are well aware of what access rights each of them has to the system.
In the KuppingerCole Leadership Compass report, the SAST GRC Suite secured the top position (leader) in the analysis of security management solutions. What contributed to this assessment of the solution?
A report by analyst firm KuppingerCole leaves no doubt. Enterprise security is primarily affected by the evolving IT infrastructure and the ever-increasing level of threats (new opportunities for data interception are regularly emerging). SAP security should therefore become a priority for any organization using this system.
It is estimated that by 2020, about 30% companies globally will start using S4/HANA in production (in 2018, only 2% of all companies were using S4). I will discuss two areas that should be addressed if we are to raise (or maintain a high) level of security of the target system - authorizations and
This article will also refer to passwords, but already more indirectly and in a broader spectrum. We will consider how by improving the security of the system related to logins we can help administrators.After all, admins deserve a bit of a breather doing their heavy and responsible tasks, right?
A topic already as stretched as... a thin layer of butter on a large slice of bread... However, it returns like a boomerang and not because it is popular and well-liked,
Every month SAP releases new Security Notes. Many SAP administrators are quick to install these patches. The only question that arises is - do they believe in the security they provide? In today's article, we will answer the question - will security vulnerabilities continue to be exploited in such a situation?
Increasing requirements are forcing organizations to implement such solutions that will increase the security level of systems that process personal data. SAP is no exception. Today's article will show you how to increase data security in 3 steps.
Until a few years ago, data security topics were discussed by a narrow group of cyber security professionals. Before the era of ubiquitous logins and passwords - awareness of data security risks was not a concern for many people. Those days are irrevocably gone. Why cyber security
How to effectively control risks and accelerate engineering projects? In major projects, every day of delay is a real financial loss and contractual risk. Learn how ECM-class solutions - such as OpenText Content Management (Extended ECM) for Engineering - help reduce errors, accelerate collaboration
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
In today's dynamic business environment, where the amount of data generated by companies is growing at a dizzying pace, effective information management is becoming a key challenge. Companies must not only process and analyze data efficiently, but also ensure its secure storage and compliance with increasingly stringent requirements
As of February 1, 2026, the National e-Invoicing System (KSeF) will become mandatory for businesses in Poland. This means a real revolution in the area of invoicing and tax settlements. All structured invoices will have to be issued, received and stored exclusively in the KSeF system, which will eliminate traditional invoices
It is worth acknowledging that migration to S/4 HANA gives customers not only a new landscape and new functionalities, but also a new price list for SAP services and products.
Reducing IT costs is an ever-emerging component of many organizations' IT resource budgeting. In the case of an SAP environment, licensing costs are often a particularly large contributor to overall IT costs. It's also common for organizations to regularly perform a review of their existing licenses to find savings. In today's tip, we discuss
Migrating to SAP S/4HANA is a step that more and more companies are taking to bring their organization in line with the demands of the modern business world. However, before you embark on this process, there is a key step that can result in significant savings - optimizing your SAP licenses.
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
In the context of data migration, precise planning and execution are crucial to the success of a project. However, even the best-organized processes can encounter unexpected problems. This is why crisis management planning becomes an indispensable part of any data migration.
Data migration is a process that is often seen as the culmination of the journey to modern information systems. Companies that invest in data quality are better equipped to make strategic decisions and adapt faster to changing market conditions.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
Mirakl, a pioneer in the marketplace category, launched in 2012 and continues to help established retailers and B2B companies scale their businesses, maximizing growth and profitability. Through innovation, regulatory compliance and customized features, Mirakl helps companies deliver a seamless and scalable customer experience that reflects their
How to effectively control risks and accelerate engineering projects? In major projects, every day of delay is a real financial loss and contractual risk. Learn how ECM-class solutions - such as OpenText Content Management (Extended ECM) for Engineering - help reduce errors, accelerate collaboration
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Access management in SAP is not just about technical role assignment. It's all about security, regulatory compliance and mitigating risks - especially financial risks. In this article, we discuss how the authorization system in SAP works, what it consists of, why it “swells” over time ...
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
At the conference on SAP Security - Tips for Security, I shared with you the knowledge I've gained from both SoD and authorizations reorganization projects and daily tasks in Managed Services. For those of you who could not attend the conference, we have prepared a brief summary.
SAP is secure in itself. However, it is up to the customer's actions to take care of data security issues. In this particular context, it is impossible to ignore the inventory benefits of dedicated SAP Security tools.
Backups are an exact copy of our organization's most important data. Such backups should be kept off the affected system - so that a potential failure or attack does not deprive us of access to all our data.
The concept of Entitlements, in addition to the entitlement reorganization project appears like a horror to audited managers and entitlement administrators. However, this is only the case if such documentation has not been kept in the organization or has not been updated for many years, and often since the implementation of SAP in the company. One could
You may already know that as of SAP 7.40 SP8, you can use SAP security policies (SECPOL) to define user-specific security parameters, as opposed to system profile values.
SAP HANA is the concept of fast access to in-memory data. It allows for the analysis of large, often unaggregated amounts of data, much faster than other databases. The way data is handled in SAP HANA is quite different from what we're used to with SAP NetWeaver. It has
How to effectively control risks and accelerate engineering projects? In major projects, every day of delay is a real financial loss and contractual risk. Learn how ECM-class solutions - such as OpenText Content Management (Extended ECM) for Engineering - help reduce errors, accelerate collaboration
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Artificial intelligence at Lukardi is a direction we are consistently developing - both in the area of products and internal team competencies. We believe that AI only makes sense when it realistically supports people, processes and business.
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
In today's dynamic business environment, where the amount of data generated by companies is growing at a dizzying pace, effective information management is becoming a key challenge. Companies must not only process and analyze data efficiently, but also ensure its secure storage and compliance with increasingly stringent requirements
As of February 1, 2026, the National e-Invoicing System (KSeF) will become mandatory for businesses in Poland. This means a real revolution in the area of invoicing and tax settlements. All structured invoices will have to be issued, received and stored exclusively in the KSeF system, which will eliminate traditional invoices
Access management in SAP is not just about technical role assignment. It's all about security, regulatory compliance and mitigating risks - especially financial risks. In this article, we discuss how the authorization system in SAP works, what it consists of, why it “swells” over time ...
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
The following post contains a synopsis of the work carried out for one of SAST's clients, the main core of which was the optimization of authorization and user access was also implemented remodeling of the authorization concept.
As SAP S/4HANA evolves, not only the logic of business processes is evolving, but also the way users work with the SAP Fiori interface. One of the key changes is the shift from the classic Groups & Catalogs model to the more intuitive and flexible Spaces & Pages approach.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
In the context of data migration, precise planning and execution are crucial to the success of a project. However, even the best-organized processes can encounter unexpected problems. This is why crisis management planning becomes an indispensable part of any data migration.
Data migration is a process that is often seen as the culmination of the journey to modern information systems. Companies that invest in data quality are better equipped to make strategic decisions and adapt faster to changing market conditions.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
Mirakl, a pioneer in the marketplace category, launched in 2012 and continues to help established retailers and B2B companies scale their businesses, maximizing growth and profitability. Through innovation, regulatory compliance and customized features, Mirakl helps companies deliver a seamless and scalable customer experience that reflects their