SAP BI functionality — from analytics, data modeling, and report creation, to maximizing the effectiveness of your company’s business intelligence tools, including SAP BW, SAP BusinessObjects, and SAP HANA.


SAP CRM functionality — including lead and sales management, security, CRM system performance, reporting, and analytics.


SAP financials functionality — including integrating with other modules and applications, SAP GRC, automating month-end closes, controlling, compliance, reporting, upgrading, and more.

Human Resources

SAP ERP HCM functionality — including personnel administration, payroll, travel management, and recruitment.


SAP SCM and SAP ERP logistics systems— including SAP APO, sales and distribution, materials management, logistics execution system, and production planning.


SAP in the cloud — including HANA, workload analysis, cloud economies and applications.


SAP HANA — including HANA platform, SAP S/4 HANA, programming and data.


SAP Development — including programming languages, data centers, SAP HANA backup and restore and disaster prevention.


SAP Administration - including SAP Solution Manager, security, data management, performance, integration, and implementations and upgrades.


Chapter 11: Risk Management

In this chapter, we expand on the discussion of risk in chapter two to cover how you can incorporate an understanding of and management of your security risks in a cloud environment. We talk about identifying threats, assessing and testing for vulnerabilities, and the best practices around this process. You should be able to take these ideas here and asses your own risks, as well as the risks of any potential cloud providers.

Read More

Chapter 10: Information Security Management

This chapter talks about how you and your provider can manage the cloud environment and how to understand the division of responsibilities between you and your provider. This includes the difference between a bare metal server and a managed environment, as well as how to secure any management interfaces. You'll know what managing a cloud environment takes so you can decide whether you want to do it yourself or leave to the provider.

Read More

Chapter 9: Data Destruction

This chapter covers what a provider can do with hardware at the end of its lifespan. That hardware may still have retrievable data on it, so it's important to understand what options your provider has to protect it. We cover some standard techniques, including U.S. Department of Defense policy. You should be able to ask the right questions of your provider about what they do with old hardware, as well take care to improve your own efforts.

Read More

Chapter 8: Getting Started with ADM

Throughout this book, we have explored the benefits and key value proposition of application data management (ADM). ADM is a business-led, decentralized initiative that helps improve data quality by implementing data governance on top of key enterprise applications. Improving both data quality and the processes that feed data into these enterprise applications enables your business to enhance trust in your data. This is a critical step for companies seeking to participate in the digital economy and leverage advanced analytics. 

Read More

Chapter 7: ADM in the IT Stack

For the enterprise architect, the first steps in understanding application data management (ADM) in the enterprise stack are to distinguish master data from application data and then select the appropriate tool—master data management (MDM) vs. ADM—to administer each type of data. Master data are typically managed inside a central MDM application. Application data, in contrast, are data that are used by and stored in a single key application. In contrast to master data, they are managed locally for that application. 

Read More

Chapter 6: ADM Adoption in the Enterprise

Today successful organizations are starting to value data as a strategic asset, and companies are ultimately working towards the same strategic goal—make the data they have as useful as possible to the organization and to the entities that interact with them. Organizations need to take the following actions to meet this goal:

Read More

Chapter 5: Application Data Management Capabilities

Application data management (ADM) is a framework that can be vital to your company's data governance strategy. It involves managing data in key enterprise applications, such as your ERP systems, to ensure that data is timely and of high quality. The processes and tools that are elements of ADM provide key capabilities for both reactive and proactive governance, helping ensure smooth business operations and high confidence in your data.

Read More

Chapter 4: Data Governance and Stewardship in ERP

Data governance and data stewardship are terms that are often thrown around within organizations today, but rarely with a common definition that triggers action. Essentially, data governance is the cycle of defining attributes that are necessary to maintain order, efficiency, and control of data in information systems. Data stewardship is the process of leveraging these attributes to maintain order, efficiency, and control.

Read More

Chapter 3: Data as a Strategic Asset in Your Digital Journey

Every business, large or small, across industries from manufacturing and retail to education is being disrupted by fundamental shifts in digital and data resources. Companies that successfully adapt to these transformations and implement policies to treat data as a strategic asset will emerge as the leaders of tomorrow. 

Read More


Avoiding the 10 Worst Practices of SAP Development Projects

It is a common misconception that unsuccessful SAP projects, regardless of purpose or scale, fail due to a lack of time, money, and/or people. Research shows that this is rarely the case. Projects typically fail for other reasons, like faulty business practices. While there are obviously an infinite number of things that can go wrong, this article zeroes in on the 10 worst — the ones that are the most common, potentially detrimental, and above all avoidable. And although some of these observations may seem obvious at first glance, as an intertwined whole, they will provide a strong safety net for your next project.
Read More

Mastering the SAP HANA Backup and Restore Process

When organizations implement SAP HANA, they need to devise a strategy to protect the data that the system manages in-memory. Depending on your SAP HANA use case, failure to protect this data can lead to significant monetary or productivity losses. One way to protect the data is through the implementation of a backup and restore strategy. This article helps to fortify your general knowledge of the SAP HANA backup and restore process.
Read More

Protect Your SAP HANA Investment with HA and DR Options

Implementing an SAP HANA system involves more than just selecting a standalone server. Organizations must also consider the different options available in terms of high availability (HA) and disaster recovery (DR). Depending on the organization’s service level requirements, multiple servers, storage devices, backup devices, and network devices might be required. This article gives an overview of the different ways organizations can achieve SAP HANA HA and DR. Equipped with this information, you can develop the right SAP HANA architecture and business continuity strategy more easily.
Read More

Complement Warm Data Management in SAP HANA via Dynamic Tiering

Bonus Article
Christian Savelli describes the Dynamic Tiering option available starting with SAP HANA Support Package 9, which enables a more effective multi-temperature data strategy. It offers management of warm data content via the extended table concept, representing a major enhancement from the loading/unloading feature currently available.
Read More

HANA Studio: The New Star Join Modeling

Learn the basic steps to set up a new flavor of SAP HANA information views, the star join graphical calculation view. Understand why it is a valuable new addition in the HANA Studio modeling tool chest.
Read More

Popular Chapters

View More
  • Chapter 7: Phase Four: Transition

    In the final phase, transition, we go through what you can expect at go-live, followed by lengthy discussions regarding service level agreements, operations process training, and transition to cloud operations. We talk about intricacies of system stabilization and monitoring. Finally, we explore the options for business continuity and security

    Read More
  • Chapter 6: Phase Three: Build

    In the third phase, build, we walk through developing proofs of concept for your project. The chapter discusses how to take advantage of a provision-shared infrastructure, as well as strategies for building and testing that infrastructure. There is an examination on how to build and mitigate databases and applications, as well as planning the phase cutover. It also looks at automated provisioning and automated services.

    Read More
  • Chapter 5: Phase Two: Model

    The second phase of moving SAP to the cloud, model, contains an overview of the second half of onboarding to the cloud. It examples infrastructure requirements and design and walks the reader through the process of developing a workload analysis. The chapter discusses application and business process discovery as well as operational run books and migration strategy.

    Read More
View More

Do you #LearnLikeAnInsider?

See what it means to redefine reading and start to #LearnLikeAnInsider today.

insiderBOOKS Video

From The Blog

  • Encryption

    The previous chapters [of SAP in the Cloud: Security Essentials] discussed how cloud providers can prevent an attacker from accessing your data. But what happens if an attacker does gain access? Does this mean it’s game over, data’s stolen, start running damage control? Not necessarily. This is where encryption can help you. In this chapter excerpt, we’ll cover what encryption is and how you can use it to protect your cloud-based SAP system.

    Read More