Lukardi Blog

Zarządzanie dostępami w SAP to nie tylko techniczne przypisywanie ról. To przede wszystkim kwestia bezpieczeństwa, zgodności z regulacjami i ograniczanie ryzyk – zwłaszcza finansowych. W artykule omawiamy, jak działa system autoryzacji w SAP, z czego się składa, dlaczego z czasem "puchnie" i jak to
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
In today's dynamic business environment, where the amount of data generated by companies is growing at a dizzying pace, effective information management is becoming a key challenge. Companies must not only process and analyze data efficiently, but also ensure its secure storage and compliance with increasingly stringent requirements
As of February 1, 2026, the National e-Invoicing System (KSeF) will become mandatory for businesses in Poland. This means a real revolution in the area of invoicing and tax settlements. All structured invoices will have to be issued, received and stored exclusively in the KSeF system, which will eliminate traditional invoices
SAP DRC and SAP VIM are key tools that facilitate integration with KSeF and optimization of invoicing processes. Implementing KSeF is a process that requires planning and testing. Find out how SAP DRC and SAP VIM can help your company with this transformation.
The mandatory transition to National e-Invoicing System (KSeF) is a challenge, but also an opportunity to optimize invoicing processes. With SAP DRC and SAP VIM, companies can automate the handling of sales and purchase invoices, ensuring compliance and eliminating errors.
At the conference on SAP Security - Tips for Security, I shared with you the knowledge I've gained from both SoD and authorizations reorganization projects and daily tasks in Managed Services. For those of you who could not attend the conference, we have prepared a brief summary.
SAP is secure in itself. However, it is up to the customer's actions to take care of data security issues. In this particular context, it is impossible to ignore the inventory benefits of dedicated SAP Security tools.
Backups are an exact copy of our organization's most important data. Such backups should be kept off the affected system - so that a potential failure or attack does not deprive us of access to all our data.
The concept of Entitlements, in addition to the entitlement reorganization project appears like a horror to audited managers and entitlement administrators. However, this is only the case if such documentation has not been kept in the organization or has not been updated for many years, and often since the implementation of SAP in the company. One could
You may already know that as of SAP 7.40 SP8, you can use SAP security policies (SECPOL) to define user-specific security parameters, as opposed to system profile values.
SAP HANA is the concept of fast access to in-memory data. It allows for the analysis of large, often unaggregated amounts of data, much faster than other databases. The way data is handled in SAP HANA is quite different from what we're used to with SAP NetWeaver. It has
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
In today's dynamic business environment, where the amount of data generated by companies is growing at a dizzying pace, effective information management is becoming a key challenge. Companies must not only process and analyze data efficiently, but also ensure its secure storage and compliance with increasingly stringent requirements
As of February 1, 2026, the National e-Invoicing System (KSeF) will become mandatory for businesses in Poland. This means a real revolution in the area of invoicing and tax settlements. All structured invoices will have to be issued, received and stored exclusively in the KSeF system, which will eliminate traditional invoices
SAP DRC and SAP VIM are key tools that facilitate integration with KSeF and optimization of invoicing processes. Implementing KSeF is a process that requires planning and testing. Find out how SAP DRC and SAP VIM can help your company with this transformation.
The mandatory transition to National e-Invoicing System (KSeF) is a challenge, but also an opportunity to optimize invoicing processes. With SAP DRC and SAP VIM, companies can automate the handling of sales and purchase invoices, ensuring compliance and eliminating errors.
From January 2025, Polish entrepreneurs will have to face a new legal obligation - the introduction of the Single Control File for corporate income tax, or JPK CIT. In this article, we will take a look at what the CIT JPK is, what the consequences will be for entrepreneurs.
Zarządzanie dostępami w SAP to nie tylko techniczne przypisywanie ról. To przede wszystkim kwestia bezpieczeństwa, zgodności z regulacjami i ograniczanie ryzyk – zwłaszcza finansowych. W artykule omawiamy, jak działa system autoryzacji w SAP, z czego się składa, dlaczego z czasem "puchnie" i jak to
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
The following post contains a synopsis of the work carried out for one of SAST's clients, the main core of which was the optimization of authorization and user access was also implemented remodeling of the authorization concept.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
In the context of data migration, precise planning and execution are crucial to the success of a project. However, even the best-organized processes can encounter unexpected problems. This is why crisis management planning becomes an indispensable part of any data migration.
Data migration is a process that is often seen as the culmination of the journey to modern information systems. Companies that invest in data quality are better equipped to make strategic decisions and adapt faster to changing market conditions.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
Mirakl, a pioneer in the marketplace category, launched in 2012 and continues to help established retailers and B2B companies scale their businesses, maximizing growth and profitability. Through innovation, regulatory compliance and customized features, Mirakl helps companies deliver a seamless and scalable customer experience that reflects their
Zarządzanie dostępami w SAP to nie tylko techniczne przypisywanie ról. To przede wszystkim kwestia bezpieczeństwa, zgodności z regulacjami i ograniczanie ryzyk – zwłaszcza finansowych. W artykule omawiamy, jak działa system autoryzacji w SAP, z czego się składa, dlaczego z czasem "puchnie" i jak to
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
In today's dynamic business environment, where the amount of data generated by companies is growing at a dizzying pace, effective information management is becoming a key challenge. Companies must not only process and analyze data efficiently, but also ensure its secure storage and compliance with increasingly stringent requirements
As of February 1, 2026, the National e-Invoicing System (KSeF) will become mandatory for businesses in Poland. This means a real revolution in the area of invoicing and tax settlements. All structured invoices will have to be issued, received and stored exclusively in the KSeF system, which will eliminate traditional invoices
SAP DRC and SAP VIM are key tools that facilitate integration with KSeF and optimization of invoicing processes. Implementing KSeF is a process that requires planning and testing. Find out how SAP DRC and SAP VIM can help your company with this transformation.
The mandatory transition to National e-Invoicing System (KSeF) is a challenge, but also an opportunity to optimize invoicing processes. With SAP DRC and SAP VIM, companies can automate the handling of sales and purchase invoices, ensuring compliance and eliminating errors.
At the conference on SAP Security - Tips for Security, I shared with you the knowledge I've gained from both SoD and authorizations reorganization projects and daily tasks in Managed Services. For those of you who could not attend the conference, we have prepared a brief summary.
SAP is secure in itself. However, it is up to the customer's actions to take care of data security issues. In this particular context, it is impossible to ignore the inventory benefits of dedicated SAP Security tools.
Backups are an exact copy of our organization's most important data. Such backups should be kept off the affected system - so that a potential failure or attack does not deprive us of access to all our data.
The concept of Entitlements, in addition to the entitlement reorganization project appears like a horror to audited managers and entitlement administrators. However, this is only the case if such documentation has not been kept in the organization or has not been updated for many years, and often since the implementation of SAP in the company. One could
You may already know that as of SAP 7.40 SP8, you can use SAP security policies (SECPOL) to define user-specific security parameters, as opposed to system profile values.
SAP HANA is the concept of fast access to in-memory data. It allows for the analysis of large, often unaggregated amounts of data, much faster than other databases. The way data is handled in SAP HANA is quite different from what we're used to with SAP NetWeaver. It has
Companies using SAP often face the challenge of effectively managing documents and archival data. Two popular solutions that help in this area are SAP Archiving and Document Access by OpenText and Core Archiving.
In today's dynamic business environment, where the amount of data generated by companies is growing at a dizzying pace, effective information management is becoming a key challenge. Companies must not only process and analyze data efficiently, but also ensure its secure storage and compliance with increasingly stringent requirements
As of February 1, 2026, the National e-Invoicing System (KSeF) will become mandatory for businesses in Poland. This means a real revolution in the area of invoicing and tax settlements. All structured invoices will have to be issued, received and stored exclusively in the KSeF system, which will eliminate traditional invoices
SAP DRC and SAP VIM are key tools that facilitate integration with KSeF and optimization of invoicing processes. Implementing KSeF is a process that requires planning and testing. Find out how SAP DRC and SAP VIM can help your company with this transformation.
The mandatory transition to National e-Invoicing System (KSeF) is a challenge, but also an opportunity to optimize invoicing processes. With SAP DRC and SAP VIM, companies can automate the handling of sales and purchase invoices, ensuring compliance and eliminating errors.
From January 2025, Polish entrepreneurs will have to face a new legal obligation - the introduction of the Single Control File for corporate income tax, or JPK CIT. In this article, we will take a look at what the CIT JPK is, what the consequences will be for entrepreneurs.
Zarządzanie dostępami w SAP to nie tylko techniczne przypisywanie ról. To przede wszystkim kwestia bezpieczeństwa, zgodności z regulacjami i ograniczanie ryzyk – zwłaszcza finansowych. W artykule omawiamy, jak działa system autoryzacji w SAP, z czego się składa, dlaczego z czasem "puchnie" i jak to
Gartner reports that from 2026 (the clock is ticking), 90% of new installations offered by SAP will be on the Rise with SAP model (hereafter ‘RWS’). The Rise with SAP model is a cloud service which, as far as it goes, is nothing more than ‘regular S/4’ (only that in the cloud),
SAP software is a widely used technology around the world, utilized by various businesses, huge corporations, and even small companies. SAP has clients in over 180 countries. It's pretty pricey software because it comes with a range of costs, including fees for named user licenses.
Answering the question posed in this way, the answer is simple - no. But incomplete, because simply no system will ever be secure. On the other hand, it is not that we cannot strive for security - quite the opposite. It all boils down to risk management, its acceptance, but above all
SAP software is a widely used technology around the world, utilized by various businesses and corporations, whether small or large. However, purchasing and implementing SAP software comes with huge expenses for licenses. Blocking accounts or deleting them doesn't always help reduce costs.
The following post contains a synopsis of the work carried out for one of SAST's clients, the main core of which was the optimization of authorization and user access was also implemented remodeling of the authorization concept.
Today, we would like to highlight a very important issue in the area of SAP authorization security. Besides one-off role reorganization projects and SOD, maintaining the access concept developed during the project and the administrative-process order in roles is equally crucial. How can we prevent our post-project assumptions from getting off track?
Today, companies are growing faster than ever thanks to IT. Servers, networks, operating systems, databases, etc. While it's possible, it's hard to imagine an enterprise without the support of devices and software. And just as in the past paper documents were physically protected from destruction, prying eyes, so today we make
Managing a business nowadays is almost impossible without using advanced information technologies. One of the most popular tools in this category is the SAP ERP system. It significantly simplifies running a company and helps management make decisions, which in turn gives managers the ability to work efficiently.
In the context of data migration, precise planning and execution are crucial to the success of a project. However, even the best-organized processes can encounter unexpected problems. This is why crisis management planning becomes an indispensable part of any data migration.
Data migration is a process that is often seen as the culmination of the journey to modern information systems. Companies that invest in data quality are better equipped to make strategic decisions and adapt faster to changing market conditions.
Through careful analysis and extrapolation of report file sizes, we were able to keep the amount of reported data at a reasonable level. This process included a detailed analysis of the types of data recorded and their growth patterns over time.
To accurately estimate migration times, we conducted intensive and repeated migrations of document samples. This hands-on approach allowed us to gather real data on transfer speeds and potential bottlenecks, providing a solid basis for our estimates. This process was crucial to understanding the real-world conditions under which the
In a recent project, we conducted a comprehensive analysis of document versions in the source system, examining their number, volume and number of versions per document. Our investigation revealed numerous documents with hundreds of versions, including cases with more than 800 versions per document. Often each version stored was several hundred in size
Mirakl, a pioneer in the marketplace category, launched in 2012 and continues to help established retailers and B2B companies scale their businesses, maximizing growth and profitability. Through innovation, regulatory compliance and customized features, Mirakl helps companies deliver a seamless and scalable customer experience that reflects their