Home > BusinessObjects, Events, HANA > 2016 Security Webinar Series

2016 Security Webinar Series


End-to-End Security for Your SAP Environment

From designing and configuring your SAP application security to implementing SAP BI and HANA security, our Webinar Series gives you tips, tricks and best practices from our top SAP experts.

Join us on Thursdays @ 2:00 pm Eastern beginning April 21st. This series gives you real life examples on how to properly secure and manage your SAP landscape.

Register for one or all three!


Securing Your SAP Application 
Speaker: Michele Makuch
Thursday, April 21 @ 11:00 Pacific | 1:00 Central | 2:00 pm Eastern

Designing and maintaining a best in class SAP security environment is a challenging endeavor given the complexity of parameters and general IT controls that need to be properly configured and monitored.

Join Michelle Makuch, SAP security expert, to understand the key steps to design and maintain an optimized SAP security environment helping you avoid the need for a redesign later.

Key Learning Points 

  • Improve your SAP role design strategy
  • Learn key general IT controls to implement and monitor
  • See how to establish an adequate SoD management framework
  • Understand how to institute a comprehensive SAP security program, including cyber-security risks

Register_Button_Small_1


 

Implementing SAP BI Security Best Practices
Speaker: Bob Zenker
Thursday, April 28 @ 11:00 Pacific | 1:00 Central | 2:00 pm Eastern

BI has become pervasive for decision-making at all levels. With that pervasiveness come risks due to a centralized architecture that houses potentially sensitive data in one place that can be used by many people.

Join Bob Zenker, BI expert, to learn how to properly implement SAP BI security based on practical experiences and real-world use case studies. This session will provide detailed tips and tricks for participants on implementing security for adhoc users and discuss challenges of security data and BI content.

Key Learning Points

  • Learn best practices on implementing 3rd party security applications like SAP, Windows AD and LDAP
  • Gain an overview on data security in Universes, Crystal Reports and SSO to databases
  • Review deploying mobile access to BI content utilizing SSL or VPN
  • Examine mobile application security setup on devices within the BI4.1 architecture

Register_Button_Small_1


 

Securing Your SAP HANA Environment
Speaker: Jonathan Haun
Thursday, May 5 @ 11:00 Pacific | 1:00 Central | 2:00 pm Eastern

Although all systems have to deal with authentication, authorization and user provisioning, SAP HANA deviates from typical database platforms in the amount of security configuration that is done inside the database.

Join Jonathan Haun, co-author of “Implementing SAP HANA”, for expert recommendations on configuring SAP HANA and setting up the proper security models for your SAP HANA system.

Key Learning Points

  • Get best practice strategies to properly provision users, manage repository roles, and implement a manageable security model in SAP HANA
  • Gain an overview of the 4 different types of privileges in SAP HANA
  • Explore how third-party authentication can integrate with SAP HANA
  • Find out how to provide selective access to data using analytic privileges in SAP HANA

Register_Button_Small_1

 

Categories: BusinessObjects, Events, HANA
  1. May 25, 2016 at 2:55 am

    It’s difficult to find well-informed people about this topic, however, you seem like you know what you’re talking about! Thanks

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: