Rudr

Rudr is a senior GRC consultant. He has been consulting for more than 14 years in SAP systems and for more than eight years in the field of Virsa and SAP GRC solutions.

ARTICLES

Manage Multiple Access Requests Efficiently with SAP Access Control 10.0

One of the key advantages of SAP Access Control 10.0 is the multiuser access request feature. With this feature, multiple user access requests can be combined into a single request to save time and effort. This feature was available in SAP Access Control 5.3’s compliant user provisioning functionality, but it had limited capabilities. Learn about how SAP has enhanced multiuser request submission in SAP Access Control 10.0. You can use SAP Access Control 10.0 for multiuser request submissions during go-live or to provide the same roles to numerous SAP users.
Read More

BOOKS

Mitigate Risk with SAP Access Control

Mitigate Risk with SAP Access Control (Electronic Editions)

$79.95
This exclusive compendium of articles on SAP Access Control, recently published in SAP Professional Journal, has been curated to help you advance your GRC skills and stay on the leading edge of SAP technology. View
Mitigate Risk with SAP Access Control

Mitigate Risk with SAP Access Control (Electronic + Print Bundle)

$99.95
This exclusive compendium of articles on SAP Access Control, recently published in SAP Professional Journal, has been curated to help you advance your GRC skills and stay on the leading edge of SAP technology. View
Mitigate Risk with SAP Access Control

Mitigate Risk with SAP Access Control (Print)

$89.95
This exclusive compendium of articles on SAP Access Control, recently published in SAP Professional Journal, has been curated to help you advance your GRC skills and stay on the leading edge of SAP technology. View

Popular Chapters

View More
  • Chapter 7: Phase Four: Transition

    In the final phase, transition, we go through what you can expect at go-live, followed by lengthy discussions regarding service level agreements, operations process training, and transition to cloud operations. We talk about intricacies of system stabilization and monitoring. Finally, we explore the options for business continuity and security

    Read More
  • Chapter 6: Phase Three: Build

    In the third phase, build, we walk through developing proofs of concept for your project. The chapter discusses how to take advantage of a provision-shared infrastructure, as well as strategies for building and testing that infrastructure. There is an examination on how to build and mitigate databases and applications, as well as planning the phase cutover. It also looks at automated provisioning and automated services.

    Read More
  • Chapter 5: Phase Two: Model

    The second phase of moving SAP to the cloud, model, contains an overview of the second half of onboarding to the cloud. It examples infrastructure requirements and design and walks the reader through the process of developing a workload analysis. The chapter discusses application and business process discovery as well as operational run books and migration strategy.

    Read More
View More

Do you #LearnLikeAnInsider?

See what it means to redefine reading and start to #LearnLikeAnInsider today.

insiderBOOKS Video

From The Blog

  • Encryption

    The previous chapters [of SAP in the Cloud: Security Essentials] discussed how cloud providers can prevent an attacker from accessing your data. But what happens if an attacker does gain access? Does this mean it’s game over, data’s stolen, start running damage control? Not necessarily. This is where encryption can help you. In this chapter excerpt, we’ll cover what encryption is and how you can use it to protect your cloud-based SAP system.

    Read More