End-to-End Security for Your SAP Environment
From designing and configuring your SAP application security to implementing SAP BI and HANA security, our Webinar Series gives you tips, tricks and best practices from our top SAP experts.
Join us on Thursdays @ 2:00 pm Eastern beginning April 21st. This series gives you real life examples on how to properly secure and manage your SAP landscape.
Register for one or all three!
Securing Your SAP Application
Speaker: Michele Makuch
Thursday, April 21 @ 11:00 Pacific | 1:00 Central | 2:00 pm Eastern
Designing and maintaining a best in class SAP security environment is a challenging endeavor given the complexity of parameters and general IT controls that need to be properly configured and monitored.
Join Michelle Makuch, SAP security expert, to understand the key steps to design and maintain an optimized SAP security environment helping you avoid the need for a redesign later.
Key Learning Points
- Improve your SAP role design strategy
- Learn key general IT controls to implement and monitor
- See how to establish an adequate SoD management framework
- Understand how to institute a comprehensive SAP security program, including cyber-security risks
Implementing SAP BI Security Best Practices
Speaker: Bob Zenker
Thursday, April 28 @ 11:00 Pacific | 1:00 Central | 2:00 pm Eastern
BI has become pervasive for decision-making at all levels. With that pervasiveness come risks due to a centralized architecture that houses potentially sensitive data in one place that can be used by many people.
Join Bob Zenker, BI expert, to learn how to properly implement SAP BI security based on practical experiences and real-world use case studies. This session will provide detailed tips and tricks for participants on implementing security for adhoc users and discuss challenges of security data and BI content.
Key Learning Points
- Learn best practices on implementing 3rd party security applications like SAP, Windows AD and LDAP
- Gain an overview on data security in Universes, Crystal Reports and SSO to databases
- Review deploying mobile access to BI content utilizing SSL or VPN
- Examine mobile application security setup on devices within the BI4.1 architecture
Securing Your SAP HANA Environment
Speaker: Jonathan Haun
Thursday, May 5 @ 11:00 Pacific | 1:00 Central | 2:00 pm Eastern
Although all systems have to deal with authentication, authorization and user provisioning, SAP HANA deviates from typical database platforms in the amount of security configuration that is done inside the database.
Join Jonathan Haun, co-author of “Implementing SAP HANA”, for expert recommendations on configuring SAP HANA and setting up the proper security models for your SAP HANA system.
Key Learning Points
- Get best practice strategies to properly provision users, manage repository roles, and implement a manageable security model in SAP HANA
- Gain an overview of the 4 different types of privileges in SAP HANA
- Explore how third-party authentication can integrate with SAP HANA
- Find out how to provide selective access to data using analytic privileges in SAP HANA
Add comment