Blog

Welcome to the smarterSec Blog - your go-to source for insights, updates, and best practices in SAP Security, Compliance and GDPR.

Search
Categories
Tags

SAP UCON Scenarios Explained: HTTP Allowlist, WebSocket RFC & Role Building

Learn how to use the SAP UCON scenarios for role building, HTTP Allowlists, and WebSocket RFC security to secure communication in SAP systems.

No More Audit Anxiety: How to Keep SoDs and Authorizations under Control – For Good

SUIM is too limited. SAP GRC is too heavy. The Smarter Access Control Framework closes that gap — flexible SoD and authorization monitoring, seamlessly integrated into your existing SAP security platform.

SNP and smarterSec: A strategic partnership for secure transformation

SNP and smarterSec announce a strategic partnership to deliver secure SAP transformations, combining data expertise with cybersecurity for safer digital change.

Updates on the smarterSec Security Platform from March 2026

In this blog series, we will continuously introduce you to the latest features and updates that make the smarterSec Security Platform even more powerful for protecting your digital assets.

How to secure table USR02 in SAP using PFCGMASSVAL?

Direct access to USR02 is often unnecessary. Learn how to use PFCGMASSVAL to identify affected roles and securely clean up authorizations at scale.

S_DEVELOP vs S_DBG: Differences Every SAP Admin Must Know!

S_DEVELOP or S_DBG? Learn the differences in SAP authorizations and how to manage ABAP debugging safely and compliance-ready.

Strategic Partnership between NTT DATA Europe & Latam and smarterSec

NTT DATA Europe & Latam and smarterSec enter into strategic partnership and set new standards in SAP security and GDPR compliance

RISE with SAP – This is why it’s not sufficient!

RISE with SAP moves your business to the cloud – but are the responsibilities taken on by SAP sufficient to ensure a successful transformation?

Why SAProuter Security Matters More Than Ever

SAProuter is key to SAP security. Learn how to configure it, manage remote access, and protect your SAP systems from external threats.

Security Parameter and Hardening in SAP Enterprise Cloud Services (ECS) – a MUST DO!

Learn how to secure your SAP Enterprise Cloud Services (ECS) with essential security parameters and hardening techniques.