SlideShare a Scribd company logo
Cut your costs!
Deactivate inactive users
and reduce your sap license fees.
Agenda
 Brief introduction Akquinet & USU
 Which "optimization potentials" arise in relation to the SAP user?
 Right Sizing: Assignment of the more favorable license type based on real usage
 Blocking or restricting users - What factors should be considered?
 Which approaches are suitable for the analysis?
 How do I clean up user masters efficiently without causing disruptions?
 Take Homes Messages
With the SAST SOLUTIONS portfolio of akquinet AG, we are your world-class provider for the holistic protection of
SAP ERP as well as S/4HANA systems - with real-time monitoring. In addition to our proprietary software suite, we
offer SAP security and authorization consulting and managed services from a single source.
Worldwide, more than 200 customers with 3.5 million SAP users currently rely on our vast expertise in protecting
their SAP systems from cyberattacks, manipulation, espionage and data theft.
Facts and figures
- 5 -
SAST SOLUTIONS customers worldwide
880
305
165
325
556
796
64
845
Employees
Turnovers Mio. €
5,3
16,3
41,5
28,2
118
2002 2005 2008 2011 2014 2018 2019 2020
132
125
akquinet AG
71
Your IT security is our number one concern – in real time.
All solutions from one source:
- 6 -
You have the choice for your SAP ERP and S/4HANA systems!
- 7 -
SAP Security & Compliance – make or buy?!
SOFTWARE SUITE CONSULTING MANAGED SERVICES
SAP Security Consulting
SAP Authorization Consulting
SAP HANA & S/4HANA Migration
SAP Threat Detection &
Vulnerability Assessment
SAP Cyber Security
SAP Access Governance SAP User & Authorization Management
8
Discovery
Data collection
for all software
products
Professional
Services
Successful SAM is when
your experts work with
our experts
Optimization
Control and deep
optimization in the data
center and the cloud
License
Management
Compliance for
all vendors
AI &
ANALYTICS
Competence & experience in IT
44 years
in customer satisfaction & price/performance
No. 1
USU products used
185 countries
> 250
International partners
> 750
Employees worldwide
~100
Million Euro revenue (2020)
> 1.200
Customers worldwide
9
10
USU Optimization
forecasts your potential
costs in the S/4HANA
world while revealing
cost-saving potential that
you can use against your
S/4HANA license
purchases.
S/4HANA Migration
USU Optimization
advanced analytics
compare your actual
software usage against
the assigned licenses. It
runs one-click simulations
that consider new or
different license types
which are less expensive.
Named User licenses
Indirect Access or Digital
Access? USU Optimization
helps analyze your
current indirect access
and simulates your
potential costs for
document licenses.
Indirect / Digital Access
Measure engine licenses
to ensure that each
engine is accurately
measured, no matter how
complicated it is by
linking and updating
SAP's ever-changing
metrics.
LoB/ Engines
USU Optimization gives
you full transparency over
all your SAP usages,
including Cloud Apps.
Significant savings can be
achieved through
identification and re-
harvesting of inactive
accounts.
SAP Cloud
Change in license measurement by SAP:
 Das SAP's licensing model was applied for the first time in 2017 for authorized functions
(objects/transactions) instead of executed functions.
 With LAW 2.0, SAP has since been measuring more and more customers also in Germany.
Changed measurement result and a higher importance of authorized functions in terms of license
costs.
Potentials in user clean-up:
The complexity of system landscapes and data exchange has increased.
- 11 -
Q1/2003
Q4/2017
!
Professional User: A Professional User is a defined user who executes operational roles supported by the Software.
The usage rights of the Professional User include the rights granted to a Limited Professional User.
Blocking or restricting users - what to consider?
The complexity of system landscapes and data exchange has increased
ID: P261165 (Max Müller)
SAP P11/100: MMUELER
SAP P21/200: P261165
Max.Mueller@cusomer.de
SAP P31/300: P261165
DB User: MUELLER
Max.Mueller@4711.customer.sap.de
- 12 -
 External calls via connections as well as
internal dialog or work processes require
users and authorizations
 The System and Communication user
types can be used to perform most of the
interface processing
 Batch processes are controlled by
technical users to be scheduled
Blocking or restricting users - what to consider?
Even within a system there are different levels in data processing
External
systems
and
databases
(also
other
SAP
systems)
SAP System
Dialog
RFC
Batch
BAPI
Application Link
Enabling (ALE)
Remote Function
Call (RFC)
HTTP / HTTPS /
SOAP / REST API
 Authorization structures have mostly grown historically.
 Users have significantly more permissions than they need for their daily business.
 User application processes based on existing users quickly inherit accumulations of privileges.
 The safety aspect is also not to be neglected.
Blocking or restricting users - what to consider?
Total
Authorizations
Used
Transactions
What could have used? >> Professional User = 3,500 €
What was used? >> Worker User = 600 €
- 14 -
Worker User
600 EUR
Professional Use
3.500 EUR
Functional Use
1.200 EUR
Productivity Use
300 EUR
15
ECC License Amount Single-Price License Value
Professional 2.526 3.200 EUR 8.083.200 EUR
Limited Professional 1.324 1.200 EUR 1.588.800 EUR
Worker 765 600 EUR 459.000 EUR
Employee 984 400 EUR 393.600 EUR
Employee Self-Service 1.825 120 EUR 219.000 EUR
Production Planning (PP) 1.286 480 EUR 617.280 EUR
Account Control 973 350 EUR 340.550 EUR
9.683 ⌀ 1.209 EUR 11.701.430 EUR
16
3,200€
17
?
R/3 ECC User
3.200 €
▪ Professional
▪ Limited Professional
▪ Developer
▪ Project
▪ Logistic
▪ Worker
▪ Employee
▪ ESS
▪ Special
▪ …
6.000 €
600 €
125 €
S/4HANA Enterprise Management
3.500 €
▪ Professional Use
▪ Functional Use
▪ Productivity Use
▪ Developer Use
300 €
6.000 €
1.200 €
S/4 License Amount Single-Price License Value
Professional Use 4.509 3.500 EUR 15.781.500 EUR
Functional Use 2.324 1.200 EUR 2.788.800 EUR
Productivity Use 2.498 300 EUR 749.400 EUR
9.331 ⌀ 2.071 EUR 19.319.700 EUR
18
SAP R/3 License Amount Single-Price License Value Maintenance
(22%)
9.683 ⌀ 1.209 EUR 11.701.430 EUR 2.574.315 EUR
SAP S/4HANA Amount Single Price License Value Maintenance
(22%)
Professional Use 4.509 3.500 EUR 15.781.500 EUR 3.471.930 EUR
Functional Use 2.324 1.200 EUR 2.788.800 EUR 613.536 EUR
Productivity Use 2.498 300 EUR 749.400 EUR 164.868 EUR
9.331 ⌀ 2.071 EUR 19.319.700 EUR 4.250.334 EUR
19
20
Procedure for analysis of user activity.
Analysis methods SAP Standard:
- 21 -
Evaluations of existing logs such as Workload Monitor
or Security Audit Log are available for the
Further processing of data not optimized
Procedure for analysis of user activity.
Optimized analysis methods with SAST SUITE:
- 22 -
ABAP + Tcode
Calls
 Time period can be narrowed down
 User apparent
 Frequency apparent
Batch
processing
 Batch programs in def. period
 User apparent
 Frequency apparent
RFC / HTTP / BAPI
usage
 Interface usage
 User to interface
 Called RFC blocks
 Called system
Tracing
 User authorization trace
 All users in long term race
 Object usage in detail to user
Optimized analysis with SAST SUITE.
Seamless long-term trace / usage statistics (CCMS)
 Recording of used objects + values over a long period of time
 Recording of used transactions, RFC modules, ABAPs
 Structured display optimized for analysis and further processing
 Roles can be created at the push of a button for individual users or user groups
 Precisely fitting rolls (minimum cutting)
The fastest way to minimal permissions!
- 23 -
✓
• Contract Analysis
• User activity
• Authorization analysis
• Demand analysis
• Indirect usage
• List of shelfware
Check Up
• Concept
• Inactive or duplicate users
• Righsizing the license
• Digital Access Analysis
• Indirect Access Analysis
• Simulations
Clean Up
• Authorization concept that
takes license metrics into
account
• Contract negotiation
consulting
• Decision Contract/ Product
Conversion
Tune Up
Size Up
24
Pre-tuning
User activity
Interfaces
Batch processes
Recommendation for action
Analysis
Concept
Time limit inactive users
Roll processing
Clean Up Set up fallback scenario
Changeover
Hyper Care Phase
Safe GoLive
Effiziente Methodik zur berechtigungsseitigen Bereinigung
- 25 -
Optimize the license costs in the user masters.
Take Home Messages:
- 26 -
+
+
+
+
+
Transparently analyze your contract and usage situation in ECC.
Simulate your future need for license e.g., for SAP S/4HANA.
Optimization of user-based licenses with efficient approach and use of modern
analysis methods.
Minimization of authorizations through automated role creation on a trace basis.
For contract negotiation you will receive a complete shelfware list for exchange.
Complete analysis and recommended action for optimizing user licenses
for a system available in a short period of time.
+
Keep the ball
rolling with us.
DO YOU HAVE ANY QUESTIONS?
WE ANSWER. FOR SURE.
© Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright.
All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior
written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions.
The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information.
STEFFEN MALTIG
Head of SAST CONSULTING
Tel: +49 40 88173-109
Email: mail@sast-solutions.de
Web: sast-solutions.com

More Related Content

What's hot

SAP Landscape
SAP Landscape SAP Landscape
SAP Landscape
lakshmi rajkumar
 
Architecture overview
Architecture  overviewArchitecture  overview
Architecture overview
npss2011
 
Ebook abap-101-exercises-beginner-starting-from-scratch
Ebook abap-101-exercises-beginner-starting-from-scratchEbook abap-101-exercises-beginner-starting-from-scratch
Ebook abap-101-exercises-beginner-starting-from-scratch
Yandisa Phillip
 
Abap package concept
Abap package conceptAbap package concept
Abap package concept
Tobias Trapp
 
Intra company transfer pricing using sap material ledger
Intra company transfer pricing using sap material ledgerIntra company transfer pricing using sap material ledger
Intra company transfer pricing using sap material ledger
Rajesh Shanbhag
 
Integrating Big Data Technologies
Integrating Big Data TechnologiesIntegrating Big Data Technologies
Integrating Big Data TechnologiesDATAVERSITY
 
Analysis for office training
Analysis for office   trainingAnalysis for office   training
Analysis for office training
Kibrom Gebrehiwot
 
SAP CPI - DS
SAP CPI - DSSAP CPI - DS
SAP CPI - DS
Geetha Madhuri
 
Configuring sap-for-european-vat-–-implementation-tips-and-tricks-from-the-ex...
Configuring sap-for-european-vat-–-implementation-tips-and-tricks-from-the-ex...Configuring sap-for-european-vat-–-implementation-tips-and-tricks-from-the-ex...
Configuring sap-for-european-vat-–-implementation-tips-and-tricks-from-the-ex...
Farooq Wangde
 
Blog de SAP 2012
Blog de SAP 2012Blog de SAP 2012
Blog de SAP 2012
oarranzli
 
Sap sd overview training
Sap sd overview trainingSap sd overview training
Sap sd overview training
Sreelal S
 
ERP SAP Aprendizaje Modulo Finanzas parte 2
ERP SAP Aprendizaje Modulo Finanzas parte 2ERP SAP Aprendizaje Modulo Finanzas parte 2
ERP SAP Aprendizaje Modulo Finanzas parte 2magister845
 
SAP Business One; Step-by-Step Guide for Installation, configuration on Virtu...
SAP Business One; Step-by-Step Guide for Installation, configuration on Virtu...SAP Business One; Step-by-Step Guide for Installation, configuration on Virtu...
SAP Business One; Step-by-Step Guide for Installation, configuration on Virtu...
Nasir Gondal
 
Clases de movimientos de activos fijos sap
Clases de movimientos de activos fijos sapClases de movimientos de activos fijos sap
Clases de movimientos de activos fijos sap
Orlando Rodriguez
 
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...
Hortonworks
 
Sap organisation structure business view
Sap organisation structure business viewSap organisation structure business view
Sap organisation structure business view
Partha Tripathi
 
SAP BASIS Skills for Functional Consultants
SAP BASIS Skills for Functional ConsultantsSAP BASIS Skills for Functional Consultants
SAP BASIS Skills for Functional Consultants
Vasanth S Vasanth
 
Fundamentos de BI
Fundamentos de BIFundamentos de BI
Fundamentos de BI
JOSE AHIAS LOPEZ PORTILLO
 
SAP SD Course Content
SAP SD Course ContentSAP SD Course Content
SAP SD Course Content
Choodamani Infotech
 
Tableau PPT.ppt
Tableau PPT.pptTableau PPT.ppt
Tableau PPT.ppt
eMMAY3
 

What's hot (20)

SAP Landscape
SAP Landscape SAP Landscape
SAP Landscape
 
Architecture overview
Architecture  overviewArchitecture  overview
Architecture overview
 
Ebook abap-101-exercises-beginner-starting-from-scratch
Ebook abap-101-exercises-beginner-starting-from-scratchEbook abap-101-exercises-beginner-starting-from-scratch
Ebook abap-101-exercises-beginner-starting-from-scratch
 
Abap package concept
Abap package conceptAbap package concept
Abap package concept
 
Intra company transfer pricing using sap material ledger
Intra company transfer pricing using sap material ledgerIntra company transfer pricing using sap material ledger
Intra company transfer pricing using sap material ledger
 
Integrating Big Data Technologies
Integrating Big Data TechnologiesIntegrating Big Data Technologies
Integrating Big Data Technologies
 
Analysis for office training
Analysis for office   trainingAnalysis for office   training
Analysis for office training
 
SAP CPI - DS
SAP CPI - DSSAP CPI - DS
SAP CPI - DS
 
Configuring sap-for-european-vat-–-implementation-tips-and-tricks-from-the-ex...
Configuring sap-for-european-vat-–-implementation-tips-and-tricks-from-the-ex...Configuring sap-for-european-vat-–-implementation-tips-and-tricks-from-the-ex...
Configuring sap-for-european-vat-–-implementation-tips-and-tricks-from-the-ex...
 
Blog de SAP 2012
Blog de SAP 2012Blog de SAP 2012
Blog de SAP 2012
 
Sap sd overview training
Sap sd overview trainingSap sd overview training
Sap sd overview training
 
ERP SAP Aprendizaje Modulo Finanzas parte 2
ERP SAP Aprendizaje Modulo Finanzas parte 2ERP SAP Aprendizaje Modulo Finanzas parte 2
ERP SAP Aprendizaje Modulo Finanzas parte 2
 
SAP Business One; Step-by-Step Guide for Installation, configuration on Virtu...
SAP Business One; Step-by-Step Guide for Installation, configuration on Virtu...SAP Business One; Step-by-Step Guide for Installation, configuration on Virtu...
SAP Business One; Step-by-Step Guide for Installation, configuration on Virtu...
 
Clases de movimientos de activos fijos sap
Clases de movimientos de activos fijos sapClases de movimientos de activos fijos sap
Clases de movimientos de activos fijos sap
 
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...
 
Sap organisation structure business view
Sap organisation structure business viewSap organisation structure business view
Sap organisation structure business view
 
SAP BASIS Skills for Functional Consultants
SAP BASIS Skills for Functional ConsultantsSAP BASIS Skills for Functional Consultants
SAP BASIS Skills for Functional Consultants
 
Fundamentos de BI
Fundamentos de BIFundamentos de BI
Fundamentos de BI
 
SAP SD Course Content
SAP SD Course ContentSAP SD Course Content
SAP SD Course Content
 
Tableau PPT.ppt
Tableau PPT.pptTableau PPT.ppt
Tableau PPT.ppt
 

Similar to Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]

Nesma autumn conference - Contracting & Performance management - Cees Kuijpers
Nesma autumn conference - Contracting & Performance management - Cees KuijpersNesma autumn conference - Contracting & Performance management - Cees Kuijpers
Nesma autumn conference - Contracting & Performance management - Cees Kuijpers
Nesma
 
Why Driving Progress With Octopus Through More Transparency And Accountabilit...
Why Driving Progress With Octopus Through More Transparency And Accountabilit...Why Driving Progress With Octopus Through More Transparency And Accountabilit...
Why Driving Progress With Octopus Through More Transparency And Accountabilit...
Octopus Cloud AG
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...
akquinet enterprise solutions GmbH
 
Aspera ITAM Review Tools Day
Aspera ITAM Review Tools Day Aspera ITAM Review Tools Day
Aspera ITAM Review Tools Day
Martin Thompson
 
CO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdfCO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdf
ssuser878ec2
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
NextLabs, Inc.
 
User manual tr dunning lev1
User manual tr dunning lev1User manual tr dunning lev1
User manual tr dunning lev1
UF Technology
 
Exploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by RamcoExploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by Ramco
IndiaMART InterMESH Ltd
 
2. Rebalancing Support and Innovation_SAP UEM by KNOA_Erik Figueredo
2. Rebalancing Support and Innovation_SAP UEM by KNOA_Erik Figueredo2. Rebalancing Support and Innovation_SAP UEM by KNOA_Erik Figueredo
2. Rebalancing Support and Innovation_SAP UEM by KNOA_Erik Figueredo
Sing Yee Khoo
 
COIGN Enterprise
COIGN EnterpriseCOIGN Enterprise
COIGN Enterprise
cobblesoft
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slideshare
papdev
 
On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?
Callidus Software
 
Building Next Generation Apps using DSAM - session at sitHH 2014
Building Next Generation Apps using DSAM - session at sitHH 2014Building Next Generation Apps using DSAM - session at sitHH 2014
Building Next Generation Apps using DSAM - session at sitHH 2014
Tobias Trapp
 
Scom presentation from June 5th Webinar
Scom presentation from June 5th WebinarScom presentation from June 5th Webinar
Scom presentation from June 5th Webinar
GSX Solutions
 
Tsecl user manual tr billing and printing
Tsecl  user manual tr billing and printingTsecl  user manual tr billing and printing
Tsecl user manual tr billing and printing
UF Technology
 
ITIL Dolphin Sunum
ITIL Dolphin SunumITIL Dolphin Sunum
ITIL Dolphin Sunumalperdogu
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
akquinet enterprise solutions GmbH
 
Phillips Digitalization of our service business
Phillips Digitalization of our service businessPhillips Digitalization of our service business
Phillips Digitalization of our service business
SAP Customer Experience
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
SAP PartnerEdge program for Application Development
 
SAP customized for Aircraft Maintenance, Repair & Overhaul (MRO)
SAP customized for Aircraft Maintenance, Repair & Overhaul (MRO) SAP customized for Aircraft Maintenance, Repair & Overhaul (MRO)
SAP customized for Aircraft Maintenance, Repair & Overhaul (MRO)
Techwave Hungary Zrt.
 

Similar to Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar] (20)

Nesma autumn conference - Contracting & Performance management - Cees Kuijpers
Nesma autumn conference - Contracting & Performance management - Cees KuijpersNesma autumn conference - Contracting & Performance management - Cees Kuijpers
Nesma autumn conference - Contracting & Performance management - Cees Kuijpers
 
Why Driving Progress With Octopus Through More Transparency And Accountabilit...
Why Driving Progress With Octopus Through More Transparency And Accountabilit...Why Driving Progress With Octopus Through More Transparency And Accountabilit...
Why Driving Progress With Octopus Through More Transparency And Accountabilit...
 
Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...Best Practice Guide Security: How to check your SAP systems for security. [We...
Best Practice Guide Security: How to check your SAP systems for security. [We...
 
Aspera ITAM Review Tools Day
Aspera ITAM Review Tools Day Aspera ITAM Review Tools Day
Aspera ITAM Review Tools Day
 
CO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdfCO_TM_Controlling_co-om Master Data .pdf
CO_TM_Controlling_co-om Master Data .pdf
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
 
User manual tr dunning lev1
User manual tr dunning lev1User manual tr dunning lev1
User manual tr dunning lev1
 
Exploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by RamcoExploring Opportunities in Crisis by Ramco
Exploring Opportunities in Crisis by Ramco
 
2. Rebalancing Support and Innovation_SAP UEM by KNOA_Erik Figueredo
2. Rebalancing Support and Innovation_SAP UEM by KNOA_Erik Figueredo2. Rebalancing Support and Innovation_SAP UEM by KNOA_Erik Figueredo
2. Rebalancing Support and Innovation_SAP UEM by KNOA_Erik Figueredo
 
COIGN Enterprise
COIGN EnterpriseCOIGN Enterprise
COIGN Enterprise
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slideshare
 
On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?
 
Building Next Generation Apps using DSAM - session at sitHH 2014
Building Next Generation Apps using DSAM - session at sitHH 2014Building Next Generation Apps using DSAM - session at sitHH 2014
Building Next Generation Apps using DSAM - session at sitHH 2014
 
Scom presentation from June 5th Webinar
Scom presentation from June 5th WebinarScom presentation from June 5th Webinar
Scom presentation from June 5th Webinar
 
Tsecl user manual tr billing and printing
Tsecl  user manual tr billing and printingTsecl  user manual tr billing and printing
Tsecl user manual tr billing and printing
 
ITIL Dolphin Sunum
ITIL Dolphin SunumITIL Dolphin Sunum
ITIL Dolphin Sunum
 
Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]Towards new shores with cross-system SoD analyses. [Webinar]
Towards new shores with cross-system SoD analyses. [Webinar]
 
Phillips Digitalization of our service business
Phillips Digitalization of our service businessPhillips Digitalization of our service business
Phillips Digitalization of our service business
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
 
SAP customized for Aircraft Maintenance, Repair & Overhaul (MRO)
SAP customized for Aircraft Maintenance, Repair & Overhaul (MRO) SAP customized for Aircraft Maintenance, Repair & Overhaul (MRO)
SAP customized for Aircraft Maintenance, Repair & Overhaul (MRO)
 

More from akquinet enterprise solutions GmbH

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
akquinet enterprise solutions GmbH
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
akquinet enterprise solutions GmbH
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]
akquinet enterprise solutions GmbH
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
akquinet enterprise solutions GmbH
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]
akquinet enterprise solutions GmbH
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
akquinet enterprise solutions GmbH
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
akquinet enterprise solutions GmbH
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
akquinet enterprise solutions GmbH
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
akquinet enterprise solutions GmbH
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
akquinet enterprise solutions GmbH
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
akquinet enterprise solutions GmbH
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
akquinet enterprise solutions GmbH
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
akquinet enterprise solutions GmbH
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
akquinet enterprise solutions GmbH
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
akquinet enterprise solutions GmbH
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
akquinet enterprise solutions GmbH
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
akquinet enterprise solutions GmbH
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
akquinet enterprise solutions GmbH
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...
akquinet enterprise solutions GmbH
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
akquinet enterprise solutions GmbH
 

More from akquinet enterprise solutions GmbH (20)

ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
 
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
How a SAP security dashboard revolutionized risk analysis at Dürr IT Service ...
 
Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]Rectify your top findings before the external auditors arrive! [Webinar]
Rectify your top findings before the external auditors arrive! [Webinar]
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]Why your works council has nothing to fear from SAP security. [Webinar]
Why your works council has nothing to fear from SAP security. [Webinar]
 
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
Too many SAP S/4HANA authorization projects fail. But it doesn’t have to be t...
 
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
End-to-end SAP S/4HANA security projects are child’s play – if you have the r...
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
 
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
How to manage users, roles and rights in S/4HANA systems audit compliant. [We...
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
 
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
Cyber attacks on your SAP S/4HANA systems? So you can stay relaxed. [Webinar]
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
SAP Authoziations: RENK AG tests out SAST's new self-adjusting SAP roles. [We...
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...SAST Authorization Management: How to integrate your SoD analysis into the SA...
SAST Authorization Management: How to integrate your SoD analysis into the SA...
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Cut your costs: Deactivate inactive users & reduce sap license fees. [Webinar]

  • 1. Cut your costs! Deactivate inactive users and reduce your sap license fees.
  • 2. Agenda  Brief introduction Akquinet & USU  Which "optimization potentials" arise in relation to the SAP user?  Right Sizing: Assignment of the more favorable license type based on real usage  Blocking or restricting users - What factors should be considered?  Which approaches are suitable for the analysis?  How do I clean up user masters efficiently without causing disruptions?  Take Homes Messages
  • 3. With the SAST SOLUTIONS portfolio of akquinet AG, we are your world-class provider for the holistic protection of SAP ERP as well as S/4HANA systems - with real-time monitoring. In addition to our proprietary software suite, we offer SAP security and authorization consulting and managed services from a single source. Worldwide, more than 200 customers with 3.5 million SAP users currently rely on our vast expertise in protecting their SAP systems from cyberattacks, manipulation, espionage and data theft. Facts and figures - 5 - SAST SOLUTIONS customers worldwide 880 305 165 325 556 796 64 845 Employees Turnovers Mio. € 5,3 16,3 41,5 28,2 118 2002 2005 2008 2011 2014 2018 2019 2020 132 125 akquinet AG 71
  • 4. Your IT security is our number one concern – in real time. All solutions from one source: - 6 -
  • 5. You have the choice for your SAP ERP and S/4HANA systems! - 7 - SAP Security & Compliance – make or buy?! SOFTWARE SUITE CONSULTING MANAGED SERVICES SAP Security Consulting SAP Authorization Consulting SAP HANA & S/4HANA Migration SAP Threat Detection & Vulnerability Assessment SAP Cyber Security SAP Access Governance SAP User & Authorization Management
  • 6. 8 Discovery Data collection for all software products Professional Services Successful SAM is when your experts work with our experts Optimization Control and deep optimization in the data center and the cloud License Management Compliance for all vendors AI & ANALYTICS
  • 7. Competence & experience in IT 44 years in customer satisfaction & price/performance No. 1 USU products used 185 countries > 250 International partners > 750 Employees worldwide ~100 Million Euro revenue (2020) > 1.200 Customers worldwide 9
  • 8. 10 USU Optimization forecasts your potential costs in the S/4HANA world while revealing cost-saving potential that you can use against your S/4HANA license purchases. S/4HANA Migration USU Optimization advanced analytics compare your actual software usage against the assigned licenses. It runs one-click simulations that consider new or different license types which are less expensive. Named User licenses Indirect Access or Digital Access? USU Optimization helps analyze your current indirect access and simulates your potential costs for document licenses. Indirect / Digital Access Measure engine licenses to ensure that each engine is accurately measured, no matter how complicated it is by linking and updating SAP's ever-changing metrics. LoB/ Engines USU Optimization gives you full transparency over all your SAP usages, including Cloud Apps. Significant savings can be achieved through identification and re- harvesting of inactive accounts. SAP Cloud
  • 9. Change in license measurement by SAP:  Das SAP's licensing model was applied for the first time in 2017 for authorized functions (objects/transactions) instead of executed functions.  With LAW 2.0, SAP has since been measuring more and more customers also in Germany. Changed measurement result and a higher importance of authorized functions in terms of license costs. Potentials in user clean-up: The complexity of system landscapes and data exchange has increased. - 11 - Q1/2003 Q4/2017 ! Professional User: A Professional User is a defined user who executes operational roles supported by the Software. The usage rights of the Professional User include the rights granted to a Limited Professional User.
  • 10. Blocking or restricting users - what to consider? The complexity of system landscapes and data exchange has increased ID: P261165 (Max Müller) SAP P11/100: MMUELER SAP P21/200: P261165 Max.Mueller@cusomer.de SAP P31/300: P261165 DB User: MUELLER Max.Mueller@4711.customer.sap.de - 12 -
  • 11.  External calls via connections as well as internal dialog or work processes require users and authorizations  The System and Communication user types can be used to perform most of the interface processing  Batch processes are controlled by technical users to be scheduled Blocking or restricting users - what to consider? Even within a system there are different levels in data processing External systems and databases (also other SAP systems) SAP System Dialog RFC Batch BAPI Application Link Enabling (ALE) Remote Function Call (RFC) HTTP / HTTPS / SOAP / REST API
  • 12.  Authorization structures have mostly grown historically.  Users have significantly more permissions than they need for their daily business.  User application processes based on existing users quickly inherit accumulations of privileges.  The safety aspect is also not to be neglected. Blocking or restricting users - what to consider? Total Authorizations Used Transactions What could have used? >> Professional User = 3,500 € What was used? >> Worker User = 600 € - 14 -
  • 13. Worker User 600 EUR Professional Use 3.500 EUR Functional Use 1.200 EUR Productivity Use 300 EUR 15
  • 14. ECC License Amount Single-Price License Value Professional 2.526 3.200 EUR 8.083.200 EUR Limited Professional 1.324 1.200 EUR 1.588.800 EUR Worker 765 600 EUR 459.000 EUR Employee 984 400 EUR 393.600 EUR Employee Self-Service 1.825 120 EUR 219.000 EUR Production Planning (PP) 1.286 480 EUR 617.280 EUR Account Control 973 350 EUR 340.550 EUR 9.683 ⌀ 1.209 EUR 11.701.430 EUR 16
  • 15. 3,200€ 17 ? R/3 ECC User 3.200 € ▪ Professional ▪ Limited Professional ▪ Developer ▪ Project ▪ Logistic ▪ Worker ▪ Employee ▪ ESS ▪ Special ▪ … 6.000 € 600 € 125 € S/4HANA Enterprise Management 3.500 € ▪ Professional Use ▪ Functional Use ▪ Productivity Use ▪ Developer Use 300 € 6.000 € 1.200 €
  • 16. S/4 License Amount Single-Price License Value Professional Use 4.509 3.500 EUR 15.781.500 EUR Functional Use 2.324 1.200 EUR 2.788.800 EUR Productivity Use 2.498 300 EUR 749.400 EUR 9.331 ⌀ 2.071 EUR 19.319.700 EUR 18
  • 17. SAP R/3 License Amount Single-Price License Value Maintenance (22%) 9.683 ⌀ 1.209 EUR 11.701.430 EUR 2.574.315 EUR SAP S/4HANA Amount Single Price License Value Maintenance (22%) Professional Use 4.509 3.500 EUR 15.781.500 EUR 3.471.930 EUR Functional Use 2.324 1.200 EUR 2.788.800 EUR 613.536 EUR Productivity Use 2.498 300 EUR 749.400 EUR 164.868 EUR 9.331 ⌀ 2.071 EUR 19.319.700 EUR 4.250.334 EUR 19
  • 18. 20
  • 19. Procedure for analysis of user activity. Analysis methods SAP Standard: - 21 - Evaluations of existing logs such as Workload Monitor or Security Audit Log are available for the Further processing of data not optimized
  • 20. Procedure for analysis of user activity. Optimized analysis methods with SAST SUITE: - 22 - ABAP + Tcode Calls  Time period can be narrowed down  User apparent  Frequency apparent Batch processing  Batch programs in def. period  User apparent  Frequency apparent RFC / HTTP / BAPI usage  Interface usage  User to interface  Called RFC blocks  Called system Tracing  User authorization trace  All users in long term race  Object usage in detail to user
  • 21. Optimized analysis with SAST SUITE. Seamless long-term trace / usage statistics (CCMS)  Recording of used objects + values over a long period of time  Recording of used transactions, RFC modules, ABAPs  Structured display optimized for analysis and further processing  Roles can be created at the push of a button for individual users or user groups  Precisely fitting rolls (minimum cutting) The fastest way to minimal permissions! - 23 - ✓
  • 22. • Contract Analysis • User activity • Authorization analysis • Demand analysis • Indirect usage • List of shelfware Check Up • Concept • Inactive or duplicate users • Righsizing the license • Digital Access Analysis • Indirect Access Analysis • Simulations Clean Up • Authorization concept that takes license metrics into account • Contract negotiation consulting • Decision Contract/ Product Conversion Tune Up Size Up 24
  • 23. Pre-tuning User activity Interfaces Batch processes Recommendation for action Analysis Concept Time limit inactive users Roll processing Clean Up Set up fallback scenario Changeover Hyper Care Phase Safe GoLive Effiziente Methodik zur berechtigungsseitigen Bereinigung - 25 -
  • 24. Optimize the license costs in the user masters. Take Home Messages: - 26 - + + + + + Transparently analyze your contract and usage situation in ECC. Simulate your future need for license e.g., for SAP S/4HANA. Optimization of user-based licenses with efficient approach and use of modern analysis methods. Minimization of authorizations through automated role creation on a trace basis. For contract negotiation you will receive a complete shelfware list for exchange. Complete analysis and recommended action for optimizing user licenses for a system available in a short period of time. +
  • 26. DO YOU HAVE ANY QUESTIONS? WE ANSWER. FOR SURE. © Copyright AKQUINET AG. All rights reserved. This publication is protected by copyright. All rights, in particular the right of reproduction, distribution, and translation, are reserved. No part of this document may be reproduced in any form (photocopy, microfilm or other process) or processed, copied, or distributed using electronic systems without the prior written agreement of AKQUINET AG. Some of the names mentioned in this publication are registered trademarks of the respective provider and as such are subject to legal provisions. The information in this publication has been compiled with the greatest care. However, no guarantee can be given for its applicability, correctness, and completeness. AKQUINET AG shall assume no liability for losses arising from use of the information. STEFFEN MALTIG Head of SAST CONSULTING Tel: +49 40 88173-109 Email: mail@sast-solutions.de Web: sast-solutions.com