BlogStrengthening SAP Security in the Age of DORA: A Guide for Financial Entities12. March 2024SAP SecurityAlessandro Banzer
BlogThe difference between S_PROGRAM and S_PROGNAM and the use of parameter transactions23. January 2023SAP Authorizations, SAP Security, XAMSSteffen Lüken
BlogBulk Processing of Roles with Transaction PFCGMASSVAL8. November 2022SAP Authorizations, SAP Security, XAMSErwin Lachenmaier
BlogCreation and use of a transaction SU24N proposal data variant (Part 2)31. August 2022SAP Authorizations, SAP S/4HANA, SAP SecurityAlexander Sambill
BlogThe new transaction SU24N (Part 1)26. August 2022SAP Authorizations, SAP SecurityAlexander Sambill
BlogSAP Security Hardening – Implement Security by Design and Zero Trust12. July 2022Cybersecurity, SAP SecurityAlessandro Banzer
BlogSAP Certification: Tips to consider and Tricks to avoid21. June 2022News, SAP SecurityJulius Bussche
BlogSecure Authentication and SSO for SAP30. March 2022Cloud Security, SAP Security, SAP Single Sign-OnCarsten Olt
BlogSAP Security Orchestration with Xitingās Security Solutions21. October 2021Cloud Security, GRC, SAP SecurityAlessandro Banzer
BlogTransaction SUPO: Promote authorization fields to organizational levels24. July 2020SAP SecurityAlessandro Banzer
BlogSU24 Tips & Tricks – How to authorize menu navigation from application menus30. June 2017SAP SecurityJulius Bussche
BlogSU24 Tips & Tricks – How to authorize forward navigation from list reporting8. June 2017SAP SecurityJulius Bussche
BlogSU24 Tips & Tricks – How more authorization for an object is better than less3. May 2017SAP SecurityJulius Bussche