There are many reasons why SAP deserves a special treatment in terms of security. Some of them are: An extensive network of expert consultants. SAP has always relied in a wide environment of partners, specialized in the different functional modules and technical areas. This approach allowed SAP to become the absolute ERP leader worldwide, but […]
Noticias
Ethical Hacking – Penetration Tests
According to the EC-Council definition, “Penetration Testing is a legal, structured procedure to evaluate the security posture of an organization. This practice simulates an attack against the security infrastructure of the enterprise, such as its network, applications, and users, to identify the exploitable vulnerabilities. It determines the efficacy of the company’s security policies, controls and […]
What is Ethical Hacking?
Movies have popularized the character of the “hacker”, so everybody is already familiar with the term. According to Wikipedia, a hacker is “a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means”. It is quite a good definition, but rather incomplete; first, […]
Jenkins – ChaRM Integration
Many SAP clients are faced with the dilemma of aligning the deployment of changes in their Frontend layer (SCP, Cloud Applications, etc) with the changes in their Backend systems (ERP, S/4, BW, etc). The main problem arises from integrating native deployment tools in the Cloud world such as Jenkins with the tools specific to the […]
SAP ALM SUMMIT 2020 Recap
The SAP ALM SUMMIT 2020 for the EMEA region took place on October 6 – 9 and as always, it offered lots of interesting innovations that we can implement in our new projects. None of the expected ingredients were missing and as a novelty the SAP CLOUD ALM was presented, which SAP seems to have […]
Migration S4 HANA: Analysis and Preparation
SAP ERP systems are complex systems, prone to redundancy, obsolescence and entropy. Relatively old systems present common problems: large databases, obsolete functionality, poor quality code etc. All this becomes worse, largely due to the lack of solutions capable of carrying out objective and precise diagnoses of the system. It remains paradoxical that, currently, with the […]