Featured | Featured article

Vulnerabilities, Threats, and Risks to SAP Applications: A Primer

Vulnerabilities, threats, and risks in SAP applications are some of the most important concepts in the domain of SAP cybersecurity because they are used to build any cybersecurity program.

Latest Blog Posts

Logistics

Logistics Master Data Simplifications in SAP S/4HANA

The main objective of MRP is to provide an accurate picture of material availability.

Business Intelligence

What Is SAP Signavio?

Business process transformation from SAP Signavio enables companies to understand, improve, and transform their business processes from an end-to-end...

FICO

Understanding the SAP S/4HANA Business Partner Structure

A business partner represents the highest-level object in an SAP S/4HANA system.

FICO

Reporting Differences Between SAP GUI and SAP Fiori

In this post, let’s discuss reporting in SAP S/4HANA using both the traditional GUI and the newer SAP Fiori apps.

Programming

Technical Configuration of SAP Analysis for Microsoft Office

This blog post introduces you to the basics of the technical configuration for SAP Analysis for Microsoft Office.

FICO

Getting Started in SAP Business ByDesign

SAP Business ByDesign is a native cloud ERP solution built on almost forty business scenarios covering a number of end-to-end business processes for...

Logistics

Why Is the Material Master So Important in SAP S/4HANA?

The most important master data in SAP S/4HANA, at least from the logistic point of view, is the material master.

Business Intelligence

How to Create New Custom Business Objects in SAP S/4HANA

In this blog post, we’ll cover how to create new custom business objects in SAP S/4HANA.

CRM & Sales

Retro-Billing with SAP S/4HANA Sales

Companies that deal with high-volume customers, often responsible for the majority of their output, have a particular set of requirements such as...

Administration

When Should You Use Enabler Roles in SAP?

The enabler role concept is a non-standard approach to role design. Its origins are based on the assumption that you cannot create a role that can...