SAP Standard for Security

Size: px
Start display at page:

Download "SAP Standard for Security"

Transcription

1 SAP Standard for E2E Solution Operations Document Version: SAP Solution Manager 7.1

2 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Textual cross-references to other documents. Example EXAMPLE Example Example <Example> Emphasized words or expressions. Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE. Output on the screen. This includes file and directory names and their paths, messages, names of variables and parameters, source text, and names of installation, upgrade and database tools. Exact user entry. These are words or characters that you enter in the system exactly as they appear in the documentation. Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system. E X A MPLE Keys on the keyboard, for example, F2 or ENTER SAP SE or an SAP affiliate company. All rights reserved. Typographic Conventions

3 Document History Version Date Change First version created Document History 2014 SAP SE or an SAP affiliate company. All rights reserved. 3

4 Table of Contents 1 SAP Standards for E2E Solution Operations... Error! Bookmark not defined. 2 Overview of the Standard for Security People and Roles Lifecycle of Security Plan Build Run Optimize Driving Continuous Improvement Quality Assurance Tasks Quality Targets and KPIs Training More information SAP SE or an SAP affiliate company. All rights reserved. Table of Contents

5 1 SAP Standards for E2E Solution Operations IT organizations face new challenges every day as they attempt to remain effective and future safe while also keeping costs for day-to-day operations as low as possible. They are also being challenged more than ever to demonstrate their value to businesses. Therefore, it is important to optimize the day-to-day tasks that have less obvious business value and to use KPI and benchmark-based reporting to make IT processes more visible, demonstrating the real value that IT can provide. In order to minimize the costs of IT, it is necessary to standardize and automate IT processes end-to-end (E2E) without reducing the SLAs required by the business, such as stability, availability, performance, process and data transparency, data consistency, IT process compliance, and so on. Based on the experience gained by SAP Active Global Support (AGS) while serving more than 36,000 customers, SAP has defined process standards and best practices to help customers set up and run E2E solution operations for their SAP-centric solutions. The Build phase of SAP best practices supports a Build SAP Like a Factory approach, consisting of the following processes: Custom code management Change, test, and release management Incident, problem, and request management Solution documentation Remote supportability During the Run phase of a solution, adapting your IT infrastructure to a Run SAP Like a Factory operation impacts both application operations and business process operations. Therefore, operations processes, such as technical monitoring, end-to-end root-cause analysis, technical administration, and data volume management need to be optimized to achieve state-of-the-art application operations. In business process operations, the same applies to business process and interface monitoring (including performance optimization), data consistency management, and job scheduling management. Quality management processes and tasks need to be established throughout the lifecycle to guarantee continuous improvement of the end-to-end operations processes while simultaneously ensuring the flexibility needed to react to changing requirements. SAP Standards for E2E Solution Operations 2014 SAP SE or an SAP affiliate company. All rights reserved. 5

6 Figure 1: Organizational model for solution operations This figure shows an organizational model for solution operations that aligns SAP best practice topics and E2E standards with SAP's control center approach. The Operations Control Center executes and controls the Run SAP Like a Factory processes, while the Innovation Control Center ensures optimal custom code management and a smooth transition to production with integration validation procedures. SAP connects to these control centers from the Mission Control Center to ensure that professional support is available to the customer. The following Application Lifecycle Management (ALM) functions are not provided directly in one of the control centers because they must be handled across different areas: Change, test, and release management Incident, problem, and request management Solution documentation Remote supportability The quality management methodologies are an essential part of SAP's Advanced Customer Center of Expertise (CoE) concept and ensure that the KPI-driven processes are continuously improved across all processes and teams. In addition, the quality manager roles ensure consistent and value-centric reporting to the business and management. This unified reporting platform is known as the Single Source of Truth. 1.1 Control Center Approach The Operations Control Center (OCC) is the physical manifestation of the Run SAP Like a Factory philosophy. The OCC allows for automated, proactive operations, which simultaneously reduces operational costs while increasing the quality of IT services, leading to improved business satisfaction. The OCC also drives continuous improvement of business processes and IT support. To achieve these goals, it relies on a close interaction with both the Innovation Control Center (ICC) and the SAP Mission Control Center (MCC) SAP SE or an SAP affiliate company. All rights reserved. SAP Standards for E2E Solution Operations

7 Figure 2: Interaction Between ICC, OCC, and MCC The OCC is a central IT support entity at the customer site, which monitors the productive SAP environment as well as important non-sap applications. During operation, the OCC requires a workforce of 2 full-time equivalent (FTE) per shift to ensure that incidents are detected and resolved as quickly as possible. The OCC is equipped with large screens that display the status of business processes, IT landscape components, as well as exceptions and alerts. If problems occur, you use a video link to get live support from SAP and partners. The customer usually sets up the room with assistance from SAP Active Global Support (AGS). The customer is responsible for managing the OCC and the team of technical and functional IT operators who act on the alerts. The OCC is most effective when closely integrated with other IT processes, such as IT Service Management (ITSM) and Change Management. Central monitors and dashboards based on application and business process operations display the current status of business and IT-related processes. This data can also be used to drive continuous improvement. An effective system monitoring and alerting infrastructure is fundamental to the success of an OCC. SAP Standards for E2E Solution Operations 2014 SAP SE or an SAP affiliate company. All rights reserved. 7

8 Figure 3: OCC Concept The OCC is most effective when closely integrated with other IT processes, such as IT Service Management (ITSM) and Change Management. Central monitors and dashboards based on application and business process operations display the current status of business and IT-related processes. This data can also be used to drive continuous improvement. An effective system monitoring and alerting infrastructure is fundamental to the success of an OCC. For Job Scheduling Management, the OCC supervises all background monitoring processes, SAP controls and legacy background operations. It reacts to job monitoring alerts according to predefined error-resolution activities, and triggers follow-up activities for error handling if the relevant task are not completed within a certain timeframe SAP SE or an SAP affiliate company. All rights reserved. SAP Standards for E2E Solution Operations

9 2 Overview of the Standard for Security The aims to protect the company s critical business processes and assets, as well as to ensure compliance with external regulations and standards, such as data protection laws and the Sarbanes Oxley Act (SOX). It secures the availability and integrity of critical business processes both company internal processes as well as collaborative processes with customers or other contractors and protects the confidentiality and integrity of sensitive information. These objectives are accomplished by addressing ten different security topics, known as secure operations tracks, as shown in the Secure Operations Map. Figure 4: Secure Operations Map The Secure Operations Map provides an overview of the secure operations tracks, relating each track to one of the following five principal areas: Compliance Secure Collaboration Identity and Access Management Infrastructure Security Software Lifecycle Security This classification follows the SAP Security Solution Map, which structures the SAP product and service offering with regard to security. For more information about the SAP Security Solution Map, see the SAP Developer Network at Compliance Audit: Ensure and verify the compliance of your company's IT infrastructure and operation with internal and external guidelines and regulations Overview of the Standard for Security 2014 SAP SE or an SAP affiliate company. All rights reserved. 9

10 Outsourcing: Ensure secure operation for outsourced IT services Emergency Concept: Prepare for and react to emergency situations Secure Collaboration Secure Process and People Collaboration: Maintain security of processes and collaboration using the security capabilities of automated business processes and document exchanges Identity and Access Management User and Authorization Management: Manage IT users, authorizations, and authentication Administration Concept: Securely administer all aspects of solution operations Infrastructure Security Network, System, Database, and Workstation Security: Establish and maintain the security of all infrastructure components Software Lifecycle Security Secure Application Lifecycle: Securely develop and maintain the code base of standard and custom business applications Secure Configuration: Establish and maintain a secure configuration of standard and custom business applications Secure Support: Resolve software incidents securely For more information about each operations track, see the SAP Security Optimization page on SAP Service Marketplace at Note The secure operations tracks only describe security measures for SAP business solutions. Other security measures that constitute a comprehensive and complete security concept, such as physical measures that control access to facilities or sites, are not covered by this document. SAP recommends performing the specific design, setup, and operation activities within all of the secure operations tracks to ensure comprehensive security for your SAP systems SAP SE or an SAP affiliate company. All rights reserved. Overview of the Standard for Security

11 Figure 5: General Activities Mapped to Single Tracks For low or medium security requirements, you can follow the best practice recommendations provided for each secure operations track. However, for elevated security requirements, you need to perform a comprehensive risk analysis in order to determine the appropriate security measures. This risk analysis is based on a profound knowledge of the company s critical business processes and must be performed during the Plan (Design) phase. Successfully designing, implementing, and operating a comprehensive IT security concept requires support and commitment from top-level management. In addition, you need personnel with the relevant knowledge of security and an understanding of the company's critical business processes. As part of their commitment to security, management must implement the following measures: Create a company-wide security policy that outlines general security principles and guidelines. This document should manifest the company s commitment to security. Define dedicated security roles and establish a clear reporting line with the overall responsibility at board level. Provide those responsible for security with a dedicated security budget. 2.1 People and Roles This section provides a basic introduction to common security roles and provides an overview of typical activities associated with each role. This overview is not a complete guide to roles and is not intended for use as a blueprint. Role concepts are unique to each company because they vary depending on both the size of the organization and how it is structured. However, the organization model of each company must still comply with the Segregation of Duties (SoD) requirements imposed by legal regulations, such as the Sarbanes-Oxley Act (SOX). Group Role Activities and Responsibilities Technical System Administrator Maintains technical systems, defines backup and recovery Overview of the Standard for Security 2014 SAP SE or an SAP affiliate company. All rights reserved. 11

12 Group Role Activities and Responsibilities concept, performs emergency response process Security Team (technical and operational) Security Team (legal and technical assessment) Network Administrator Application Management Database Administrator Test Management Internal Help Desk Personnel Security Administrator Authorization Administrator User Administrator Security Management Data Protection Office Internal Auditor Security Analyst Network segmentation, firewall configuration, communication channel encryption Policy definition on application level, definition of security requirements Configuration of database, implementing encryption Test concepts for in-house or third-party developments Management of support connections, handling or forwarding of incidents, incident reproduction on test systems Defines alerting and emergency response concept Creates and manages roles Creates and manages users, performs risk analysis of user authorization assignment, ensures user-appropriate provisioning and deprovisioning of roles Policy definition, approval and publication, requirements definition, selection and assessment of security measures Identification and verification of privacy requirements with regard to employees and customers Verification of legal (external) or internal requirements In-depth security assessments External Auditor Independent assessment of the internal security compliance Business Process Owner (planning of processes) Identify and document process-specific risks, process monitoring, conflict resolution, role design (SoD) Business Management (responsibility) Business Expert (manages implemented processes) IT-Management Risk Analyst Budgeting, requirements definition, decision on tools, selection and assessment of security measures (in accordance with Security Team) Comprehensive risk analysis, impact and probability estimations, cost/benefit estimations SAP SE or an SAP affiliate company. All rights reserved. Overview of the Standard for Security

13 3 Lifecycle of Security This document describes the best practices for the security-relevant activities that you need to perform during the operations and optimization phase. The prerequisite activities of the design and setup phase are only briefly outlined here. For more detailed information, see the SAP Security Optimization page on SAP Service Marketplace at The SAP Security Optimization page is structured according to the Secure Operations Map and its secure operations tracks. On the SAP Security Optimization page, the relevant chapters for the operations tacks consist of an operations track document describing the relevant prerequisites and best practices for all phases within the track. To address a certain track, the responsible security stakeholders can focus on the relevant section in each of these documents. Each section describes important activities related organizational roles, standard and optional SAP tools, as well as relevant training activities. Activities follow the same pattern in the Design, Setup, and Operations & Optimization phases, regardless of the actual track. This pattern complies with the common understanding of a security process as outlined by international standards, such as ISO/IEC 27001:2005, and refinements by national standardization bodies, for example, the German Federal Office for Information Security (BSI). Figure 6 Security Process for All Secure Operations Tracks 3.1 Plan The criticality of each business process affects how you need to design your security process. For standard security requirements, you can simply follow a best practice approach; however, for critical business processes, Lifecycle of Security 2014 SAP SE or an SAP affiliate company. All rights reserved. 13

14 you need to perform a comprehensive risk analysis and additional supporting processes. For more information about how to design a risk analysis in the design operation phase, as well as the specific responsibilities and future actions, see the Design Operations chapter of the relevant operations track document on SAP Service Marketplace at Build Implementing the security concepts usually involves several steps and various installation and configuration activities. For a list of all typical activities as well as details about testing and review, see the Setup Operations chapter of the relevant operations track document on SAP Service Marketplace at Run Dedicated review processes conducted by administrative roles verify the successful enforcement of the company s security policy and ensure that the correct implementation of security measures is not harmed by changes to systems and applications. For detailed information about who should be involved in the review processes, how to measure the defined security KPIs, and references to the company's security policy, see the Operations & Optimization chapter of the relevant operations track document on SAP Service Marketplace at Optimize This section introduces a series of general criteria that allow organizations to measure the quality or maturity of information security management systems (ISMS) as well as individual secure operations tracks as they are used in the. You can then use this information to optimize security in your organization. Note These criteria only provide initial guidance; you need to continuously monitor and evaluate them during operation to determine their effectiveness and drive improvement. Depending on individual needs and requirements, you should define a different set of objectives for each of the 10 secure operations tracks to compare with the actual situation. The different criteria are categorized as follows: Process criteria: Concern the quality and type of security-related workflows within the company Organizational criteria: Indicate the commitment and support of security by top-level management Tool criteria: Describe the quality and extent of tool support Measurement and improvement criteria: Describe feedback and improvement cycles Process Criteria Predefined security workflows SAP SE or an SAP affiliate company. All rights reserved. Lifecycle of Security

15 Without predefined workflows, security-related activities are performed on an ad-hoc basis, that is, without a clear concept and procedure description. In such cases, the same type of security incident may result in entirely different mitigations. Predefined processes for specific incidents result in effective, reliable, and controllable mitigation activities that are always performed in the same manner, regardless of who actually executes the workflow. Proactive security-related activities Less mature organizations only perform security-related activities if there is an immediate need, for example, if there is a security breach, an external audit, or they need to import a new support package. In such companies, security-related activities are primarily reactive or event driven. More mature companies operate proactively. They continuously prepare for and plan security activities, without an immediate need but with a planned and controlled schedule, for example, in terms of review processes and internal audits that help verify the compliance of the company's security implementation with internal and external requirements. Documentation of activities More advanced security implementations ensure comprehensive documentation of security activities. Ideally, the documentation is available from a central information repository that also provides access to all relevant security concepts and, for example, a full description of the IT infrastructure. Coverage of RunSAP security topics High coverage of RunSAP security topics generally leads to a high level of security. More mature companies define security workflows, that is, maintenance and review processes, for most of the secure operations tracks. Less mature companies only define the most central tracks, such as user provisioning. Organizational Criteria Company-wide security policy A company-wide security policy ensures that top-level management is committed to the objectives, value, scope, and direction of all security activities performed within the company. This policy should be made available to all employees, for example, from the company's internal portal. Dedicated budget and personnel There should be a dedicated budget for security. Security-related activities should also be performed by trained security experts who are assigned to specific areas. In less mature organizations, security activities are performed by other administrative personnel, such as system administrators, which can eventually cause SoD conflicts. Regular training and awareness campaigns There should be regular training activities and campaigns to increase awareness of security issues among all personnel. Tool Criteria Workflow tools Tools should be implemented to enforce and document security workflows during operations. In less mature organizations, workflows might exist on paper, but compliance and execution are not enforced. The Change Request Management and Change Control Management components of SAP Solution Manager can provide significant support in this context. Monitoring and review tools Security-related information should be monitored and reviewed as close to real-time as possible using intrusion detection systems. Configuration and authorization settings should also be verified on a periodic basis, for example, using the SAP Security Optimization Service. Lifecycle of Security 2014 SAP SE or an SAP affiliate company. All rights reserved. 15

16 Automatically triggered workflows Incidents detected by monitoring and review tools must automatically trigger the corresponding workflows for incident resolution. Measurement and Improvement Criteria Continuous measurement and periodic evaluation of KPIs Continuously measuring and evaluating KPI results steadily optimizes implemented processes, without the need to repeat the RunSAP Design and Setup phases. Systematic and extensive approach to the Operations & Optimization phase Bigger optimization measures after go-live usually involve substantial changes to the company's security concept. For such large-scale optimizations, you should repeat all RunSAP phases for the given secure operations track. These changes improve the company's standard security level by introducing qualitative measures, for example, tool support of security processes. The maturity of an organization in this regard depends on the extent and systematic approach with which such automations are performed during the RunSAP Operations & Optimization phase SAP SE or an SAP affiliate company. All rights reserved. Lifecycle of Security

17 4 Driving Continuous Improvement It is important that your organization learns from the day-to-day operations of security-related activities so that security measures become increasingly effective and efficient. This section describes some key steps you can take to drive continuous improvement and increased value for your security processes. 4.1 Quality Assurance Tasks From a quality management perspective the key tasks are as follows: Track implementation status of SAP Security Notes (implementation vs. release date) Track results of security audit and ensure follow-up Track compliance to security controls Evaluate results of security-related SLA agreements Ensure action items are identified for SLA deviations Deploy security awareness campaigns Request an SAP Security Optimization Service Portfolio For an indication of appropriate KPI setup and measurement, consider the answers to the following questions to ensure that security for users and systems are under control and are communicated within all related parties: How do you decide to implement SAP Security Notes? How and how often do you review user authorizations? How and how often do you review infrastructure security? How and how often do you review your security policy? How often do you hold security meeting and who (what roles) must participate? 4.2 Quality Targets and KPIs To ensure continuous improvement of the security management process and drive the value recognition of IT, the most important quality targets are as follows: Increase trust and reliability of SAP solutions by keeping them secure, confidential, and available Ensure legal compliance through transparency and authenticity Protect investment and reduce TCO To assess the quality of the security management process, clearly-defined parameters and measurable objectives are required. The key parameters should be collated and evaluated in regular reports. The historical data that is created in this way can be used to identify trends and then derive the necessary measures to take. The following table describes the main challenges for each of these quality targets and which KPIs can be used to measure the success of your implementation: Driving Continuous Improvement 2014 SAP SE or an SAP affiliate company. All rights reserved. 17

18 Quality Targets Challenges KPIs Increase trust and reliability of SAP solutions by keeping them secure, confidential, and available Taking action proactively before severe security problems occur Coverage of identified security threats with implemented preventive measures Identifying and prioritizing risks Reviewing security maintenance processes as described in this standard Rate of response for high-risk incidents Number of incidents related to remediation of security issues Reviewing secure programming policy adherence Number of vulnerabilities not proactively identified Ensuring appropriate SAP landscape security monitoring Setting up individual security thresholds Ensure Legal Compliance Through Transparency and Authenticity Transparency Ensuring that security for users and systems is under control and communicated within all related parties according to updated policy Number of security reviews Number of security alignment meetings Percentage of IT staff who participated in trainings in one year Maintenance and review of authorizations to make sure that they meet legal and company-specific requirements Review of managed access Communication within different departments Gap between implemented SAP Security Note from released SAP Security Note Number of incidents caused by missing SAP Security Note Number of reviews of assigned roles vs. actual requirements Ratio of changes in standards/policies leading to IT reviews Protect Investment and Reduce TCO Reducing the risk of costly downtime due to wrong user interaction Number of security-related downtimes Ratio of profile changes for users in one year Number of incidents caused by incorrect or missing roles SAP SE or an SAP affiliate company. All rights reserved. Driving Continuous Improvement

19 5 Training GRC300 SAP Business Objects Access Control - Implementation and Configuration Course Content Introduction to SAP Access Control Architecture, Security, and Authorizations Authorization Risks and the SoD Risk Management Process Shared Configuration Settings SAP Access Control Repository Business Rule Framework (BRF) MSMP Workflow Analyze and Manage Risk Emergency Access Management Design and Manage Roles Provision and Manage Users Periodic Access Review Process Reports and Custom Fields SAP Access Control Implementation TZGC53 EPT SAP BusinessObjects Access Control 5.3 Course Content Overview of SAP Access Control 5.3 Risk Analysis and Remediation Superuser Privilege Management Compliant User Provisioning Enterprise Role Management Integration and Security Integration with Non-SAP systems Customer Scenarios FIN900 System Audit with SAP Course Content Impact of the Sarbanes-Oxley Act and other auditing standards (for example, ISA) that are relevant for the auditors on the audit process Compact overview of the authorization concept Role-based setup of the AIS and commercial audits with the AIS Basic system settings and logs Organizational units and organizational structure within an SAP system Training 2014 SAP SE or an SAP affiliate company. All rights reserved. 19

20 Practical analysis of the risks and controls using test cases General Customizing and controls in Accounting while taking into account the impact on the audit process Auditing business processes, for example, Procurement, Production, and Sales Order Processing Auditing the end of period financial statements, Auditing of specific evaluation methods, Transfer of the financial accounting data, balances, and document information to the auditor's computer in standard format for further analysis (for example, in ACL, IDEA, Excel) FIN910 Management of Internal Controls Course Content MIC positioning Maintaining the organizational structure Maintaining the central process catalog Scheduling assessments and testing Performing assessments and testing Management controls Roles and responsibilities in MIC Sign off and reporting MIC Dashboard ADM950 Secure SAP System Management Course Content Introduction to Internal Security Auditing Customize and Usage of AIS Users and Authorizations Audit System Audit Repository and Table Audit Security in Change Management Security Assessment Curriculum: SAP NetWeaver Process Integration Exchange Infrastructure Course Content Architecture and components of the SAP NetWeaver Process Integration Configuration and runtime behavior of synchronous and asynchronous scenarios Connecting back-end systems using proxies and adapters Overview of mapping Overview of cross-component Business Process Management Outlook to SAP NetWeaver Process Integration in the context of Enterprise SOA Curriculum: Cross Component Role User and Security Administration Course Content Fundamentals of SAP NetWeaver Application Server (SAPTEC) SAP SE or an SAP affiliate company. All rights reserved. Training

21 Administration AS ABAP I (ADM100) Security in SAP System Environments (ADM960) Secure SAP System Management (ADM950) Authorization Concept AS ABAP (ADM940) TZNWIM User Management by SAP NetWeaver Identity Management Course Content SAP NetWeaver Identity Management 7.1 SAP NetWeaver Identity Management 7.2 GRC310 SAP BusinessObjects Access Control Compliant User Provisioning & Enterprise Role Management Course Content Overview of SAP GRC AC Basic Concepts of Role Design Strategies for Role Maintenance in SAP GRC AC Pre-workflow System Configuration Workflow Configuration Integration in the System landscape and Master data Reporting Business case integrating SAP GRC AC Risk analysis, role maintenance and user provisioning features Training 2014 SAP SE or an SAP affiliate company. All rights reserved. 21

22 6 More Information Documentation Security and Optimization Service SAP Security Notes Configuration Validation (Details) Security Audit Log SIS264 Securing Remote Access within SAP NetWeaver AS ABAP Link Val_Home Security Information Security Guide Security Aspects for System Management Auditing and Logging The Security Audit Log Protecting SAP Applications Against Common Attacks Secure Configuration SAP NetWeaver Application Server ABAP Governance, Risk, and Compliance Access Control Governance, Risk, and Compliance Process Control SAP NetWeaver Identity Management SAP Help Portal: User and Role Administration (of NetWeaver AS ABAP) SAP Anti Virus Interface SAP Help Portal: Enabling Business-to-Business Processes: Security Aspects ort/support-programs-services/supportservices/sis264_011b_securing_rfc.pdf /Protecting-SAP-Apps.pdf E/SAP-Sec-Rec.pdf Application Help SAP Library Work Centers Work Centers for Access Control in the GRC Application Application Help SAP Library &_EVENT=DISPLAY&_SCENARIO=&_HIER_KEY= &_HIER_KEY= &_HIER_KEY= &_HIER_KEY= &_HIER_KEY = & Application Help Function-Oriented View Security System Security Virus Scan Interface Security Information Security Guide Security Guides for the NetWeaver SAP SE or an SAP affiliate company. All rights reserved. More Information

23 Documentation Link Security Scenarios Enabling Business-to-Business Processes: Security Aspects SAP Help Portal: Web Services Security Development Information Developer Guide Fundamentals Using Java Getting Involved Working with the Developer Studio Web Service Toolset Web Service Security More Information 2014 SAP SE or an SAP affiliate company. All rights reserved. 23

24 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Please see for additional trademark information and notices. Material Number:

SAP Standard for Remote Supportability

SAP Standard for Remote Supportability SAP Standard for E2E Solution Operations Document Version: 1.0 2014-12-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These

More information

Business Process and Interface Monitoring

Business Process and Interface Monitoring SAP Standard for E2E Solution Operations Document Version: 1.0 2015-02-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These

More information

SAP Standard for Job Scheduling Management

SAP Standard for Job Scheduling Management SAP Standard for E2E Solution Operations Document Version: 1.0 2014-12-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These

More information

SAP Standard for Data Volume Management

SAP Standard for Data Volume Management SAP Standard for E2E Solution Operations Document Version: 1.0 2014-12-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These

More information

SAP Standard for Custom Code Management

SAP Standard for Custom Code Management SAP Standard for E2E Solution Operations Document Version: 1.0 2014-12-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These

More information

Minimize Access Risk and Prevent Fraud With SAP Access Control

Minimize Access Risk and Prevent Fraud With SAP Access Control SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance

More information

Introducing SAP s Landscape and Data Center Innovation Platform. Phil Jackson SAP Solution Engineer

Introducing SAP s Landscape and Data Center Innovation Platform. Phil Jackson SAP Solution Engineer Introducing SAP s Landscape and Data Center Innovation Platform Phil Jackson SAP Solution Engineer CIO challenges Business Agility & Innovation Business Continuity Cost Containment Hybrid On-premise, Virtual

More information

SAP Project Portfolio Monitoring Rapid- Deployment Solution: Software Requirements

SAP Project Portfolio Monitoring Rapid- Deployment Solution: Software Requirements SAP Portfolio and Project Management 5.0 July 2013 English SAP Project Portfolio Monitoring Rapid- Deployment Solution: SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2013 SAP AG or an SAP

More information

SAP Standard for Change Control Management

SAP Standard for Change Control Management SAP Standard for E2E Solution Operations Document Version: 1.0 2014-12-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These

More information

SAP Standard for IT Service Management

SAP Standard for IT Service Management SAP Standard for E2E Solution Operations Document Version: 1.0 2014-12-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These

More information

SAP Payroll Processing control center rapiddeployment

SAP Payroll Processing control center rapiddeployment Software and Delivery Requirements Document Version: 1.0 July 2015 SAP Payroll Processing control center rapiddeployment solution Typographic Conventions Type Style Example Description Words or characters

More information

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015 SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation

More information

Software and Delivery Requirements

Software and Delivery Requirements SAP HANA Big Data Intelligence rapiddeployment solution November 2014 English SAP HANA Big Data Intelligence rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190

More information

Ariba Procure-to-Pay Integration rapiddeployment

Ariba Procure-to-Pay Integration rapiddeployment September 2015 English Ariba Procure-to-Pay Integration rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 May 11,

More information

SAP HANA Big Data Intelligence rapiddeployment

SAP HANA Big Data Intelligence rapiddeployment SAP HANA 1.0 November 2015 English SAP HANA Big Data Intelligence rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions 0 1

More information

Rapid database migration of SAP Business Suite to SAP HANA (V4.10): Software and Delivery Requirements. SAP HANA November 2014 English

Rapid database migration of SAP Business Suite to SAP HANA (V4.10): Software and Delivery Requirements. SAP HANA November 2014 English November 2014 English Rapid database migration of SAP Business Suite to (V4.10): Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE or an SAP affiliate

More information

SAP Business Intelligence Adoption V6.41: Software and Delivery Requirements. SAP Business Intelligence Adoption February 2015 English

SAP Business Intelligence Adoption V6.41: Software and Delivery Requirements. SAP Business Intelligence Adoption February 2015 English Business Intelligence Adoption February 2015 English Business Intelligence Adoption V6.41: Software and Delivery Requirements AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 11/11/14

More information

Project Prism - Kyle Hochenberger Johnson & Johnson SAP IT Service Management David Birkenbach SAP Session 1603

Project Prism - Kyle Hochenberger Johnson & Johnson SAP IT Service Management David Birkenbach SAP Session 1603 Project Prism - Kyle Hochenberger Johnson & Johnson SAP IT Service David Birkenbach SAP Session 1603 Johnson & Johnson Founded in 1886. Worldwide headquarters in New Brunswick, New Jersey, USA. Engaged

More information

SAP Solution Manager: The IT Solution from SAP for IT Service Management and More

SAP Solution Manager: The IT Solution from SAP for IT Service Management and More SAP Solution Manager SAP Solution Manager: The IT Solution from SAP for IT Service Management and More Table of Contents 2 SAP Solution Manager A Fully Scalable IT Platform 3 Supporting 15 Certified ITIL

More information

SAP Business One Hardware Requirements Guide

SAP Business One Hardware Requirements Guide Hardware Requirements Guide Document Version: 1.04 2014-08-25 Release 8.8 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field

More information

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes

More information

SAP MII for Manufacturing rapid-deployment solution: Software Requirements

SAP MII for Manufacturing rapid-deployment solution: Software Requirements MII 15.0 October 2015 English SAP MII for Manufacturing rapid-deployment solution: SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2015 SAP SE or an SAP affiliate company. All rights reserved.

More information

Infosys: Treating Governance and Compliance Strategically with SAP Access Control

Infosys: Treating Governance and Compliance Strategically with SAP Access Control Infosys: Treating Governance and Compliance Strategically with SAP Access Control Stringent management of user access controls and the segregation of duties are becoming a strategic concern for businesses

More information

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT Compliance & SAP Security Secure SAP applications based on state-of-the-art user & system concepts Driving value with IT BO Access Control Authorization Workflow Central User Management Encryption Data

More information

Software Requirements

Software Requirements EHP6 for SAP ERP 6.0 October 2014 English SAP Commercial Project Management rapiddeployment solution SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE or an SAP affiliate company.

More information

SAP Fiori Infrastructure rapid-deployment solution: Software and Delivery Requirements

SAP Fiori Infrastructure rapid-deployment solution: Software and Delivery Requirements Fiori October 2014 English Version 1.0 Fiori Infrastructure rapid-deployment solution: Software and Delivery Requirements AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 26 th

More information

Protect Your Connected Business Systems by Identifying and Analyzing Threats

Protect Your Connected Business Systems by Identifying and Analyzing Threats SAP Brief SAP Technology SAP Enterprise Threat Detection Objectives Protect Your Connected Business Systems by Identifying and Analyzing Threats Prevent security breaches Prevent security breaches Are

More information

SAP 3D Visual Enterprise Rapid-Deployment Solution

SAP 3D Visual Enterprise Rapid-Deployment Solution SAP 3D Visual Enterprise 8.0 July 2014 English SAP 3D Visual Enterprise Rapid-Deployment Solution SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP AG or an SAP affiliate company.

More information

SFSF EC to 3 rd party payroll Integration Software and Delivery Requirements

SFSF EC to 3 rd party payroll Integration Software and Delivery Requirements SAP HCI(PI) August 2015 English SFSF EC to 3 rd party payroll Integration Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 November 2014

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System

More information

Driving Transformation with Less Budget The Value of SAP Enterprise Support

Driving Transformation with Less Budget The Value of SAP Enterprise Support SAP Active Global Support Driving Transformation with Less Budget The Value of SAP Enterprise Support For IT organizations everywhere, just keeping the lights on is no longer enough. IT needs to deliver

More information

SAP Managed Services SAP MANAGED SERVICES. Maximizing Performance and Value, Minimizing Risk and Cost

SAP Managed Services SAP MANAGED SERVICES. Maximizing Performance and Value, Minimizing Risk and Cost SAP Managed Services SAP MANAGED SERVICES Maximizing Performance and Value, Minimizing Risk and Cost WE RE FOCUSED ON YOUR GOALS Increase productivity with fewer resources. Optimize IT systems while cutting

More information

FI Localization for Ukraine. Asset Accounting (FI-AA) SAP Library 05.09.2013. CUSTOMER Document Version: 6774 September 2013

FI Localization for Ukraine. Asset Accounting (FI-AA) SAP Library 05.09.2013. CUSTOMER Document Version: 6774 September 2013 FI Localization for Ukraine Asset Accounting (FI-AA) CUSTOMER Document Version: 6774 September 2013 Asset Accounting (FI-AA) 1 Copyright Copyright 2013 SAP AG. All rights reserved. SAP Library document

More information

SAP Security Recommendations December 2011. Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.

SAP Security Recommendations December 2011. Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1. SAP Security Recommendations December 2011 Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.0 Secure Software Development at SAP Table of Contents 4

More information

Optimize Application Performance and Enhance the Customer Experience

Optimize Application Performance and Enhance the Customer Experience SAP Brief Extensions SAP Extended Diagnostics by CA Objectives Optimize Application Performance and Enhance the Customer Experience Understanding the impact of application performance Understanding the

More information

How To Make Your Software More Secure

How To Make Your Software More Secure SAP Security Concepts and Implementation Source Code Scan Tools Used at SAP Detecting and Eliminating Security Flaws Early On Table of Contents 4 SAP Makes Code Scan Tools for ABAP Programming Language

More information

SAP Product and Cloud Security Strategy

SAP Product and Cloud Security Strategy SAP Products and Solutions SAP Product and Cloud Security Strategy Table of Contents 2 SAP s Commitment to Security 3 Secure Product Development at SAP 5 SAP s Approach to Secure Cloud Offerings SAP s

More information

SM250 IT Service Management Configuration

SM250 IT Service Management Configuration SM250 IT Service Management Configuration. COURSE OUTLINE Course Version: 16 Course Duration: 4 Day(s) SAP Copyrights and Trademarks 2016 SAP SE or an SAP affiliate company. All rights reserved. No part

More information

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management Solution in Detail NetWeaver Business-Driven, Compliant Identity Table of Contents 3 Quick Facts 4 Business Challenges Identity for the User Lifecycle 5 The Solution Supporting a Heterogeneous IT Landscape

More information

SAP Business One, version for SAP HANA Platform Support Matrix

SAP Business One, version for SAP HANA Platform Support Matrix Platform Support Matrix Document Version: 1.09 2015-12-03 Platform Support Matrix Release 8.82 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen.

More information

2015-09-24. SAP Operational Process Intelligence Security Guide

2015-09-24. SAP Operational Process Intelligence Security Guide 2015-09-24 SAP Operational Process Intelligence Security Guide Content 1 Introduction.... 3 2 Before You Start....5 3 Architectural Overview.... 7 4 Authorizations and Roles.... 8 4.1 Assigning Roles to

More information

Enterprise Information Management Services Managing Your Company Data Along Its Lifecycle

Enterprise Information Management Services Managing Your Company Data Along Its Lifecycle SAP Solution in Detail SAP Services Enterprise Information Management Enterprise Information Management Services Managing Your Company Data Along Its Lifecycle Table of Contents 3 Quick Facts 4 Key Services

More information

IT Service Management by SAP Africa (ITSM) Dirk Smit ALM Engagement Manager

IT Service Management by SAP Africa (ITSM) Dirk Smit ALM Engagement Manager IT Service Management by SAP Africa (ITSM) Dirk Smit ALM Engagement Manager Optimize IT Operations Process Support Business Goals CIO CEO/CFO Reliable Business Support Changes to improve IT services are

More information

Partner Certification to Operate SAP Solutions and SAP Software Environments

Partner Certification to Operate SAP Solutions and SAP Software Environments SAP Information Sheet SAP Partner Innovation Lifecycle Services SAP Certification for Outsourcing Operations Partners Quick Facts Partner Certification to Operate SAP Solutions and SAP Software Environments

More information

Software and Delivery Requirements

Software and Delivery Requirements SuccessFactors Recruiting April 2015 English SuccessFactors Recruiting rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2015 SAP

More information

Cut Costs and Improve Agility by Simplifying and Automating Common System Administration Tasks

Cut Costs and Improve Agility by Simplifying and Automating Common System Administration Tasks SAP Brief Objectives Cut Costs and Improve Agility by Simplifying and Automating Common System Administration Tasks Simplify management of SAP software landscapes Simplify management of SAP software landscapes

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

Setting up Visual Enterprise Integration (WM6)

Setting up Visual Enterprise Integration (WM6) SAP Mobile Platform 3.0 June 2015 English Setting up Visual Enterprise Integration (WM6) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2015 SAP SE or

More information

Power Smart Business Operations with Real-Time Process Intelligence

Power Smart Business Operations with Real-Time Process Intelligence SAP Brief SAP Business Suite SAP Operational Process Intelligence Powered by SAP HANA Objectives Power Smart Business Operations with Real-Time Process Intelligence Gain visibility into processes and data

More information

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode) HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release

More information

SAP Cloud for Customer integration with SAP ERP: Software and Delivery Requirements

SAP Cloud for Customer integration with SAP ERP: Software and Delivery Requirements SAP Cloud for 1502 March 2015 English SAP Cloud for integration with SAP ERP: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions 0 1 2 Date Copyright

More information

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal

More information

SAP Audit Management A Preview

SAP Audit Management A Preview SAP Audit Management A Preview SAP AG November 2013 Customer 1 Agenda Business Challenges The Idea The Solution Roadmap Demo 2013 SAP AG. All rights reserved. Customer 2 Disclaimer The information in this

More information

SAP / SERVIEW Roadshow SAP Solution Manager macht ITIL möglich! David Birkenbach / ITSM Solution Management

SAP / SERVIEW Roadshow SAP Solution Manager macht ITIL möglich! David Birkenbach / ITSM Solution Management SAP / SERVIEW Roadshow SAP Solution Manager macht ITIL möglich! David Birkenbach / ITSM Solution Disclaimer This presentation outlines our general product direction and should not be relied on in making

More information

SAP ERP E-Commerce and SAP CRM Web Channel Enablement versions available on the market

SAP ERP E-Commerce and SAP CRM Web Channel Enablement versions available on the market SAP ERP E-Commerce and SAP CRM Web Channel Enablement versions available on the market TABLE OF CONTENTS NAMING... 3 VERSIONS... 3 NETWEAVER TECHNICAL DIFFERENCES... 4 MAINTENANCE PERIODS... 5 UPGRADE

More information

WHITE PAPER. iet ITSM Enables Enhanced Service Management

WHITE PAPER. iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted

More information

How to Schedule Report Execution and Mailing

How to Schedule Report Execution and Mailing How To Guide SAP Business One Document Version: 1.0 2012-09-02 Applicable Releases: SAP Business One 8.81 PL10 and higher, SAP Business One 8.82 Typographic Conventions Type Style Example Description Words

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

rapid data load for SAP hybris Marketing: Software and Delivery Requirements

rapid data load for SAP hybris Marketing: Software and Delivery Requirements rapid data load for hybris Marketing April 2015 English rapid data load for hybris Marketing: Software and Delivery Requirements SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions 0 1 2

More information

Making Every Project Business a Best-Run Business

Making Every Project Business a Best-Run Business SAP Functions in Detail SAP Business Suite SAP Commercial Project Management Making Every Project Business a Best-Run Business Table of Contents 3 Quick Facts 4 Facilitating Optimal Project Delivery for

More information

Master Data Governance Find Out How SAP Business Suite powered by SAP HANA Delivers Business Value in Real Time

Master Data Governance Find Out How SAP Business Suite powered by SAP HANA Delivers Business Value in Real Time Master Data Governance Find Out How SAP Business Suite powered by SAP HANA Delivers Business Value in Real Time Disclaimer This document is not subject to your license agreement or any other service or

More information

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive

More information

How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22. How To Guide - Configure SSL in ABAP System

How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22. How To Guide - Configure SSL in ABAP System How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22 Document History Document Version Description 1.0 First official release of this guide Document History 2013 SAP AG or an SAP affiliate company.

More information

performance indicators (KPIs) are calculated based on process data, and displayed in easy-to-use management views.

performance indicators (KPIs) are calculated based on process data, and displayed in easy-to-use management views. DATA SHEET iet ITSM IT Service Management through ITIL To keep a business running as smoothly as possible, IT must operate by defined processes and must align itself with business needs. There are guidelines,

More information

HP Service Manager software

HP Service Manager software HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service

More information

SAP PartnerEdge Program Guide for Language Services Partners

SAP PartnerEdge Program Guide for Language Services Partners SAP PartnerEdge Program Guide for Language Services Partners Table of Contents 5 The SAP PartnerEdge Program: Providing Superior Value Supporting Your Opportunities 13 Ongoing Program Requirements Requirements

More information

How To Standardize Itil V3.3.5

How To Standardize Itil V3.3.5 Business white paper Standardize your ITSM An HP approach based on best practices Table of contents 3 Introduction 3 Benefits and challenges 5 The HP approach to standardizing ITSM 6 Establish an IT operations

More information

SAP Mobile Documents. December, 2015

SAP Mobile Documents. December, 2015 SAP Mobile Documents December, 2015 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your

More information

SAP Sales and Operations Planning

SAP Sales and Operations Planning Document Version: 1.0 2014-05-21 Additional Documentation Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons

More information

Outperform Financial Objectives and Enable Regulatory Compliance

Outperform Financial Objectives and Enable Regulatory Compliance SAP Brief Analytics s from SAP SAP s for Enterprise Performance Management Objectives Outperform Financial Objectives and Enable Regulatory Compliance Drive better decisions and streamline the close-to-disclose

More information

Cybersecurity and Secure Authentication with SAP Single Sign-On

Cybersecurity and Secure Authentication with SAP Single Sign-On Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle

More information

Securing Enterprise Mobility for Greater Competitive Advantage

Securing Enterprise Mobility for Greater Competitive Advantage SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise

More information

CUSTOMER Presentation of SAP Predictive Analytics

CUSTOMER Presentation of SAP Predictive Analytics SAP Predictive Analytics 2.0 2015-02-09 CUSTOMER Presentation of SAP Predictive Analytics Content 1 SAP Predictive Analytics Overview....3 2 Deployment Configurations....4 3 SAP Predictive Analytics Desktop

More information

GSK Vaccines: Easing Compliance with SAP Process Control

GSK Vaccines: Easing Compliance with SAP Process Control 2014 SAP AG or an SAP affiliate company. All rights reserved. GSK Vaccines: Easing Compliance with SAP Process Control GlaxoSmithKline Vaccines Industry Life sciences pharmaceuticals Products and Services

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

SAP NetWeaver Identity Management Identity Services Configuration Guide

SAP NetWeaver Identity Management Identity Services Configuration Guide SAP NetWeaver Identity Management Identity Services Configuration Guide Version 7.2 Rev 7 2014 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or

More information

Manage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation

Manage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation SAP Brief SAP Afaria, Cloud Edition Objectives Manage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation Low-cost investment yields high returns Low-cost investment yields

More information

SAP ERP FINANCIALS ENABLING FINANCIAL EXCELLENCE. SAP Solution Overview SAP Business Suite

SAP ERP FINANCIALS ENABLING FINANCIAL EXCELLENCE. SAP Solution Overview SAP Business Suite SAP Solution Overview SAP Business Suite SAP ERP FINANCIALS ENABLING FINANCIAL EXCELLENCE ESSENTIAL ENTERPRISE BUSINESS STRATEGY PROVIDING A SOLID FOUNDATION FOR ENTERPRISE FINANCIAL MANAGEMENT 2 Even

More information

Driving Excellence in Implementation and Beyond The Underlying Quality Principles

Driving Excellence in Implementation and Beyond The Underlying Quality Principles SAP Thought Leadership Paper SAP Active Quality Management Driving Excellence in Implementation and Beyond The Underlying Quality Principles 2014 SAP AG or an SAP affiliate company. All rights reserved.

More information

The Security Development Lifecycle at SAP How SAP Builds Security into Software Products

The Security Development Lifecycle at SAP How SAP Builds Security into Software Products SAP Security Concepts and Implementation The Security Development Lifecycle at SAP How SAP Builds Security into Software Products Table of Contents 4 Integrating Security Right from the Start 4 Establishing

More information

Patient Relationship Management

Patient Relationship Management Solution in Detail Healthcare Executive Summary Contact Us Patient Relationship Management 2013 2014 SAP AG or an SAP affiliate company. Attract and Delight the Empowered Patient Engaged Consumers Information

More information

R49 Using SAP Payment Engine for payment transactions. Process Diagram

R49 Using SAP Payment Engine for payment transactions. Process Diagram R49 Using SAP Payment Engine for payment transactions Process Diagram Purpose, Benefits, and Key Process Steps Purpose The purpose of this scenario is to show you how to check the result of payment orders

More information

Business Management Made Simpler

Business Management Made Simpler SAP Brief SAP s for Small Businesses and Midsize Companies SAP Business One Objectives Business Management Made Simpler Successfully manage and grow your small business Successfully manage and grow your

More information

Ensure Effective Controls and Ongoing Compliance

Ensure Effective Controls and Ongoing Compliance SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Process Control Ensure Effective Controls and Ongoing Compliance Table of Contents 3 Quick Facts 4 Focus Resources on High-Impact

More information

Transform Your Bank in Measurable Steps

Transform Your Bank in Measurable Steps Banking Transformation Framework Transform Your Bank in Measurable Steps Table of Contents 2 Establish a Platform for Transformation 3 Transform Your Business 3 Use the Reference Architecture As a Foundation

More information

How To Configure MDM to Work with Oracle ASM-Based Products

How To Configure MDM to Work with Oracle ASM-Based Products SAP NetWeaver How-To Guide How To Configure MDM to Work with Oracle ASM-Based Products Applicable Releases: MDM 7.1 SP10 and later Version 1.0 June 2013 Copyright 2013 SAP AG. All rights reserved. No part

More information

Increase Business Velocity with Connected, Insightful, Cloud-Based Software

Increase Business Velocity with Connected, Insightful, Cloud-Based Software SAP Brief SAP s for Small Businesses and Midsize Companies SAP Business ByDesign Objectives Increase Business Velocity with Connected, Insightful, Cloud-Based Software Integrated, cloud software that s

More information

Data Integration using Integration Gateway. SAP Mobile Platform 3.0 SP02

Data Integration using Integration Gateway. SAP Mobile Platform 3.0 SP02 Data Integration using Integration Gateway SAP Mobile Platform 3.0 SP02 DOCUMENT ID: DC02000-01-0302-01 LAST REVISED: February 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All rights reserved.

More information

SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned

SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned Executive Summary Organizations evaluating technology solutions to enhance their governance, risk and compliance

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

SAP ERP OPERATIONS SOLUTION OVERVIEW

SAP ERP OPERATIONS SOLUTION OVERVIEW SAP ERP OPERATIONS SOLUTION OVERVIEW YOUR SUCCESS Solving business problems is the general criterion for measuring success... SAP provides us with the powerful tools we need to solve our business problems.

More information

SAP Business Intelligence Adoption V7.41:Software and Delivery Requirements. SAP Business Intelligence Adoption August 2015 English

SAP Business Intelligence Adoption V7.41:Software and Delivery Requirements. SAP Business Intelligence Adoption August 2015 English Business Intelligence Adoption August 2015 English Business Intelligence Adoption V7.41:Software and Delivery Requirements SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 6/26/2015

More information

SAP Document Center. May 2016. Public

SAP Document Center. May 2016. Public SAP Document Center May 2016 Public The Big Picture for a Digital Platform Applications Applications IoT IoT Platform (Micro-) Services Extensions Icon Digital Boardroom Analytical Applications S/4HANA

More information

Remote Connectivity Infrastructure

Remote Connectivity Infrastructure Remote Connectivity Infrastructure SAP Active Global Support & Maintenance Go-to-Market November 2014 Public Remote Connectivity Infrastructure Table of Contents Introduction General Architecture SAProuter

More information