Blogs

Stay up-to-date on the latest SAP news, SAPinsider events, and timely conversations around how customers are using SAP technology to get ahead. Learn what these updates mean for the SAPinsider Community and how they can be applied in the business world.

658 results

  1. SAPPHIRE NOW 2018, Day 2: SAP Co-Founder Hasso Plattner Charts a Course for the Intelligent Enterprise

    Published: 06/June/2018

    Reading time: 3 mins

    Hasso Plattner, SAP Co-Founder and Chairman of the Supervisory Board, kicked off the second day of SAPPHIRE NOW with a keynote presentation on the meaning of the Intelligent Enterprise. “The Intelligent Enterprise is not a marketing story thriving on buzzwords,” Plattner cautioned. “It’s a logical consequence of what is possible today using modern technology and…

  2. SAP CEO Bill McDermott Kicks Off SAPPHIRE NOW 2018 by Announcing SAP C/4HANA

    Published: 05/June/2018

    Reading time: 3 mins

    SAP CEO Bill McDermott kicked off his SAPPHIRE NOW 2018 keynote discussing a simple, yet significant concept: The biggest problems the world faces also represent the biggest opportunities. Whether it’s feeding a growing population, managing a changing environment, or eliminating bias in the workforce, McDermott stated that these problems are best solved by businesses that…

  3. SAPPHIRE NOW in 2018 Coverage

    Published: 01/June/2018

    Reading time: 1 mins

    Make sure you have the latest version of Adobe Flash Player enabled in your browser to watch the video stream. SAPPHIRE NOW and the ASUG Annual Conference begins on Tuesday, June 5 and runs until Thursday, June 7. If you can’t attend the event in Orlando, catch all the executive keynotes and selected sessions here…

  4. Supply Chain image

    Supply Chain: Solving Stock Transport Order (STO) Problems

    Published: 16/May/2018

    Reading time: 12 mins

    A common challenge experienced by users in the supply chain functions of a business who create stock transport orders (STO) in SAP ERP Central Component (SAP ECC) is that once they have done so, they are not able to create an outbound delivery for the STO. These problems are common to all types of STO…

  5. Technical Guide: Using Flexible Hierarchies in SAP S/4HANA 1709

    Published: 14/May/2018

    Reading time: 7 mins

    Maintaining hierarchies for cost centers and profit centers is always a challenging task for large enterprises that have thousands of such centers. Every change in the attribute definition can involve a huge amount of maintenance for hierarchies, and there is the chance of missing updates. Adding new attributes to cost center and profit center master…

  6. Why You Should Care About SAP Cybersecurity: Evolution of the Threat Landscape

    Published: 30/April/2018

    Reading time: 1 mins

    We hear about cybersecurity in the news, and we read about it and see it in our daily work, but why should we care about cybersecurity with regard to SAP applications? SAP applications host the most sensitive and critical information for the biggest organizations in the world; therefore, these applications have become a key target…

  7. How to Respond to an Attack on Your SAP Applications

    Published: 23/April/2018

    Reading time: 1 mins

    You don’t want to be caught off guard in a breach to your SAP applications, but how do you best prepare to respond to a breach? The answer relies on defining a clear incident response process that aligns the organizational resources that are required to address a potential breach to your most critical SAP applications.…

  8. Tips on How to Maximize Security and Productivity with SAP Single Sign-On

    Published: 18/April/2018

    Reading time: 1 mins

    In his session at the Cybersecurity for SAP Customers 2018 conference titled “Secure Authentication and Access Management with SAP Single Sign-On,” Kristian Lehment, senior product manager at SAP SE, provides an overview of the role of SAP Single Sign-On in secure authentication. He discusses the basics of the key technologies involved: Kerberos, X.509 certificates, and…

  9. Securing SAP Fiori Applications: 3 Quick Wins

    Published: 16/April/2018

    Reading time: 2 mins

      Securing the SAP Internet Communication Manager (ICM) Services SAP Fiori applications are implemented on top of the SAP NetWeaver ABAP Application Server, leveraging Open Data Protocol (OData) technology and the ICM among other things (Figure 1). Regardless of whether you use the SAP front-end server or SAP NetWeaver Gateway as the front-end component, you…

  10. Attacks to an SAP System: Bypassing Detection and How to Prevent It

    Published: 09/April/2018

    Reading time: 1 mins

    Detecting attacks to SAP applications has become more and more important as we see companies making the headlines after being breached. Equifax is one example of how important it is to apply security patches and maintain the security of your applications. Security patches not only prevent your SAP application from being exploited but also ensure…