JOB MANAGEMENT
Requirements
Different customers have different support requirements and concepts. We support them on-site as an extension of their internal team as well as through remote connections. Be it on an ad hoc basis (e.g. release upgrade, DB upgrade, optimization of Solution Manager) or on a permanent basis (e.g. monitoring of operations in SLR, fast reactions in defined exceptional cases, planned maintenance), we have the right team, the appropriate procedures (ITIL) and the modern tools to implement your requirements.
The application layer is the central component of the SAP R/3 system. This layer is therefore also referred to by SAP as the actual basis system. Within the layer there are application servers and a message server.
Concept
For example, many customer ABAP programs work by uploading or downloading data. There are potentially large security gaps here that allow access to server data. In addition, the widespread direct invocation of operating system commands that are not covered by a self-programmed authorization check is a major problem. Even though classic SQL injection, i.e., the entry of extended SQL commands, is a potential security vulnerability, it occurs rather rarely in SAP systems. More widespread is the unintentional dynamization of SQL calls because input parameters are not sufficiently checked. The need to check all in-house developments internally for such security vulnerabilities before they are delivered in SAP's own code has led to the development of the SAP Code Vulnerability Analyzer tool.
Another major topic is the migration of SAP systems, both locally from one data center to another and from one operating system to another or from one database type to another. As a rule, the SWPM tool is used here again.
The "Shortcut for SAP Systems" tool is ideal for doing many tasks in the SAP basis more easily and quickly.
The uncompressed support packages are displayed in bytes.
This ensures that every user only sees what they are working with.