SAP Basis Figure 2: The Open Innovation Model - SAP Admin

Direkt zum Seiteninhalt
Figure 2: The Open Innovation Model
Job Administration
An important area of SAP Security is the analysis of the customer's own SAP programs, which are classically written in the proprietary SAP language ABAP. Here, too, as in all programming languages, security vulnerabilities can be programmed - whether consciously or unconsciously. However, the patterns of security vulnerabilities in ABAP code differ from those in Java stacks or Windows programs. The goal of these conventional programs is usually to either crash the program (buffer overflow) or to artificially execute the program's own code (code injection). Both is not possible in ABAP, since a crash of a process causes nothing else than the creation of an entry in the log database (Dump ST22) and a subsequent termination of the report with return to the menu starting point. So a direct manipulation as in other high level languages or servers is not possible. However, there are other manipulation possibilities.

With all these tasks we can support you to compensate e.g. bottlenecks or failures as well as fast growth in your teams. We have resources that have been active in this environment for many years and have gained extensive experience. We are happy to assist you with these challenges.

On www.sap-corner.de you will also find useful information about SAP basis.
SWETYPV Event type linkage
Faster problem solutions: With an SAP service provider, you usually get faster solutions to problems that arise. Through years of experience, experts can draw on a pool of solutions and know what is most efficient and best in each situation.

The digitization of businesses and the emergence of new technologies mean that admins have to adapt to constantly changing conditions. Currently, the following trends (which are becoming more and more evident in the market) can be mentioned:

Use "Shortcut for SAP Systems" to accomplish many tasks in the SAP basis more easily and quickly.

By correctly assessing your own applications for suitability for operation with an external service provider or in the cloud, the enterprise risk of the chosen service form is minimised.

So much information... how can you keep it so that you can find it again when you need it? Scribble Papers is a "note box" that makes this very easy.


Note: Logging user activity must be aware of the users concerned! Configure the SAL only for technical users or in consultation with users / works council / etc.
Zurück zum Seiteninhalt