In addition to project-based training, we offer individually prepared training courses on the following topics:
SPAM Support Package Manager
The prerequisite for employment is a relevant university degree (bachelor's degree, FH diploma) preferably in computer science, business informatics, mathematics or a scientific discipline as well as at least three years of practical experience. Ideally, you also have a completed scientific university education (master's degree, university diploma).
SAP Basis Administrators ensure smooth operation of your SAP landscape. Our administrators take care of the databases, operating systems and your applications.
Online, offline, delta backups
Virtual CodeProfiler allows you to automatically identify risks in ABAP code and correct errors. CodeProfiler for ABAP is fully integrated with SAP and is based on Virtual Forge's patented global data and control flow analysis. This solution helps ensure that applications written in ABAP have no security, compliance or quality gaps. As a result, SAP systems are protected from unauthorized access and meet the requirements of internal and external auditors. At the same time, CodeProfiler improves the performance of SAP systems and reduces costs.
Many companies are struggling with the introduction and use of secinfo and reginfo files to secure SAP RFC gateways. We have developed a generator that supports the creation of the files. This blog post lists two SAP best practices for creating the secinfo and reginfo files to enhance the security of your SAP gateway and how the generator helps you do this. secinfo and reginfo Request generator Option 1: Restrictive procedure In the case of the restrictive solution approach, only in-system programmes are allowed. Therefore, external programmes cannot be used. However, since this is desired, the access control lists must be gradually expanded to include each programme required. Although this procedure is very restrictive, which speaks for safety, it has the very great disadvantage that, in the creation phase, links which are actually desired are always blocked. In addition, the permanent manual activation of individual connections represents a continuous effort. For large system landscapes, this procedure is very complex. Option 2: Logging-based approach An alternative to the restrictive procedure is the logging-based approach. To do this, all connections must be allowed first by the secinfo file containing the content USER=* HOST=* TP=* and the reginfo file contains the content TP=*. During the activation of all connections, a recording of all external programme calls and system registrations is made with the gateway logging. The generated log files can then be evaluated and the access control lists created. However, there is also a great deal of work involved here. Especially with large system landscapes, many external programmes are registered and executed, which can result in very large log files. Revising them and creating access control lists can be an unmanageable task. However, this process does not block any intentional connections during the compilation phase, which ensures the system will run non-disruptively.
Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.
For the SAP basis, the content is an essential feature of the market communication.
If a product or technology is successfully evaluated, this can also be published as a success story within the framework of SAPBasis marketing (see chapter 7.4 in the Master's thesis) within the company.