Putting a stop to Process Outliers: How to find Deviations in Purchase-to-Pay

Normally, outliers are referred to as extreme values that deviate highly from other observations. The causes of this can be manifold and range from fluctuations during measurement and experimental errors to more novel types of phenomena. In the following case, however, it is rather down to a lack of knowledge, omission or simple laziness in […]
2 steps to analyze inventory differences in theft-sensitive goods

Inventory differences are troublesome in many ways. After determining differences, it is often necessary to do a recount just to find out that there are some goods in the corner of a warehouse corner somewhere that nobody had thought of. At least any direct impact on profit and loss will have been avoided however. Still, […]
2 steps to analyze inventory differences in theft-sensitive goods

Inventory differences are troublesome in many ways. After determining differences, it is often necessary to do a recount just to find out that there are some goods in the corner of a warehouse corner somewhere that nobody had thought of. At least any direct impact on profit and loss will have been avoided however. Still, […]
Pandora’s box: from export-restricted goods to nuclear technology

Only a small fraction of companies worldwide generally do trade in export-restricted goods. Nevertheless, SAP has still come up with and marked the appropriate fields for configuration in the customer master data. In this blog post, we will show you what export-restricted goods actually are, give you a broad overview of the issues involved and […]
Tracking down rogue states in SAP

Having already identified the top 10 “rogue states” in our last Blog Post, this week we can now go on to analyze whether any payments have actually been made to a bank account in one of those dubious states and if so to what extent. So without further ado – let’s get down to business […]
Did you catch “December fever” too?

For many, if not all of you, December 31st was the balance sheet date for the past fiscal year. Many departments / heads of department seize the opportunity to fully use up any budget that they may have managed to save at the end of the year. This phenomenon to completely use up funds which […]
Santa was not the only one handling orders for presents…

The past year is a thing of the past and according to a survey conducted by Adobe, 51 percent of Germans intended to order all their gifts online. A majority of respondents cited low prices as the main reason for this mania for online shopping. But what about the orders your company places? Are they […]
Using data analysis to uncover fraud

Over the past few weeks, we have looked at weak password hashes in SAP in quite some detail. Having previously already presented a conceivable scenario for exploiting such a vulnerability, as well as a guide to hacking weak password hashes and the measures to be taken to protect against it, in this blog post, we […]
4½ procedures for preventing weak password hashes in SAP

Of course, we don’t want to leave you out in the cold after the scenario we described last week and the kind of heavy financial losses that can be occurred as a result. For this reason, in this blog post, we will describe how the SAP ICS can be used to take preventive action, or […]
Shockheaded (Hash) Peter: If you play with fire,…

…you will get burned. That is pretty much how you could sum up the lesson to be drawn from the scenario we are going to describe below. If you are aware of the risk of using weak password hashes and do nothing, you shouldn’t be surprised by the damage that can result. The following story […]