Thursday, May 30, 2019

Salesforce Live Data Connectivity for SAP Analytics Cloud


APOS is happy to announce that the APOS Live Data Gateway now provides live data connectivity between SAP Analytics Cloud and Salesforce.

Salesforce is a widely used CRM system, with a reported 150K+ customers globally. Clearly there is an immense amount of critical data in Salesforce that needs to be incorporated into a comprehensive analytics strategy. SAP Analytics Cloud, combined with the APOS Live Data Gateway, can now take advantage of Salesforce data without the need for data replication or bulk data movement. Simply connect live from SAP Analytics Cloud to Salesforce, and leverage the data from where it currently resides.

Live data connectivity means:
  • Data never leaves the firewall
  • No data movement, data replication, or duplication in data modelling
  • No duplication in security modelling
  • Data is always current
  • No data limits

Contact APOS to learn more about how you can make a live connection to Salesforce from SAP Analytics Cloud.

Wednesday, May 29, 2019

Managing SAP BI Security – Safeguarding Content


The integrity of your BI content is paramount, not just for purposes of analysis, but also for purposes of governance and compliance. To secure your content and protect its integrity, you need to implement a robust system content storage strategy.

APOS Storage Center is your electronic vault for SAP BusinessObjects report objects and document instances. Its backup, archive and selective restore capabilities make it invaluable to organizations concerned with the integrity of their document instances. The proactive use of Storage Center is a preventive BI best practice for the prevention of problems and the timely resolution of issues.

Use APOS Storage Center to:
  • Back up objects with versioning
  • Preserve documents for long-term availability & information governance
  • Automate system content cleanup with business-rules driven, intelligent system purge
  • Promotion, system replication & simplified management workflows
  • Implement a Disaster Recovery Plan for disasters of all sizes

Managing SAP BI Security – Bulk Security Administration


APOS Administrator is a high-performance SAP BI administration solution, and provides bulk administrative capabilities for all SAP BI system objects, so it can play a key role in helping you to optimize your SAP BI security structure.

The security of the reports in your BI system is of prime importance, and bulk object management via APOS Administrator presents a streamlined approach to security administration.

Working on Security settings in the Central Management Console, one folder at a time, can be a daunting task, and it’s easy to miss a setting, or forget a folder, and it’s very easy to click the wrong radio button.

Use the Security Management component of APOS Administrator to select groups and folders. These groups and folder then appear in a matrix that allows you to view and assign the required security settings. In addition to assigning the basic built-in security roles, you can also assign any custom roles that you’ve created. Even individual security settings can be Granted or Denied if required.

After making modification to your folder security, you can easily test the security by using APOS Administrator's User Impersonation feature to log in as an affected user to ensure that they will see the folders that you have enabled for them in the security settings.

In summary, you can use APOS Administrator to:
  • Administer and document security
  • Administer and document content
  • Manage and compare multiple environments
  • Perform centralized bulk management of:
    • User preferences
    • Security
    • Users
    • User groups
    • Limits


Managing SAP BI Security – Audit & Analysis


Security starts with knowledge. You can't manage what you can't see. APOS Insight is designed to provide deep visibility into your SAP BI deployments, giving you the knowledge you need to overcome their growing volume and complexity.

Your BI team is tasked with seemingly conflicting objectives: to distribute information and to safeguard information. You need to get the right information (and only the right information) to the right people (and only the right people). The key to reconciling these objectives lies in developing a granular view of your security structure, and monitoring that structure for changes, whether planned or unplanned.

Our first focus is generally on the accessibility of data -- getting our data into data warehouses, moving our reports between environments, bursting reports to a wide variety of information consumers, etc. We spend so much time getting these things right that we may not fully consider what can go wrong. We may not know something can go wrong until it does. Worse still, we may not know that problems have occurred. Bringing resources to bear on the issue of security is part of the solution. The other, equally important, parts are the development of deep system knowledge and the application of that knowledge in a systematic manner.

APOS Insight Audit
Form an accurate picture of all security elements and compare periodic snapshots to determine when security modifications were made and (by combining Audit data) by whom; monitor regulatory compliance requirements. By using the metadata collected by the APOS Insight solution, you can quickly report on the security settings that exist in your system. This functionality can be useful when you need to provide proof of security when dealing with regulatory agencies.

APOS Insight History Mode
Good governance is a function of the good security provided by strict metadata audit and management. APOS Insight's History mode gives you the power to track all changes to report objects over time, supporting your change management workflows, and letting you demonstrate the provenance of reports and control objects for better governance and compliance with regulatory requirements (e.g.: for SOX). change management

Thursday, May 16, 2019

Managing SAP BI Security – Overview


Setting up SAP BI security for a new deployment is relatively straightforward. If you keep some important principles in mind, and understand fully the impact of each decision, your defined security model should be adequate to the task.

However, as your BI deployment grows in volume and complexity, the task of managing your security model is far from straightforward, and it gets more and more difficult to keep up with the job using just the SAP BI administrative toolkit:

  • Knowledge of your system is vital to its wellbeing, and you need to develop deep awareness before you can commit to appropriate courses of action
  • Change is rapid, and you need to respond rapidly by managing change in bulk operations, rather than one at a time. You need granular control to apply your newly found deep system knowledge.
  • Content is value, and you need to ensure you safeguard this value for compliance and governance.
  • Content distribution is the whole point of a BI system, and you need to ensure this process is securely governed.
  • Data can be sensitive, and you need to ensure it is used appropriately, and that you know by whom it has been accessed.
  • Your BI system exists to serve its users, and you need to be able to audit, analyze and understand the behavior of those users to ensure they are getting what they need, and that they are not abusing the BI system in any way.
This post begins a series exploring these aspects of managing SAP BI security, including: