Kehinde Eseyin

Kehinde Eseyin

Kehinde Eseyin is a senior SAP security and GRC consultant with Turnkey Consulting (UK) Limited. He has more than eight years of SAP authorizations, GRC, and Basis experience. In the past, he has managed teams to coordinate security, GRC, and Basis administration activities within a multinational environment and operated as an independent consultant, performing SAP system audits and SAP GRC Access Control implementations. He holds a bachelor’s degree in computer science. He has different certifications, including SAP Access Control 10.0 Consultant; SAP Technical Consultant (SAP NetWeaver on Oracle); SAP Solution Manager Operations Consultant; SAP Support Engineer – SAP Solutions Manager; SAP Business One Consultant; Oracle Database Administration Professional (OCP DBA); ITIL v3; and PRINCE2. He is the co-author of SAP BusinessObjects Access Control 10.0 Application Associate Certification [Review Questions and Answers].

ARTICLES

Enhance User Access Risk Reporting in SAP Access Control 10.1 with User Master Data Attributes

Learn how to enhance user risk analysis and user risk simulation analysis by leveraging a custom user group based on user master data (transaction code SU01) attributes. You will also learn how to improvise with custom variants (based on SU01 attributes) when defined custom user groups are not available for your business case or you need to bring in more flexibility to user risk reporting.
Read More

BOOKS

SAP_DisasterRecovery

SAP HANA High Availability and Disaster Recovery Essentials (Electronic Editions)

$79.95
SAP HANA provides speedy access to your data, but only if everything is running smoothly. This anthology, a collection of articles recently published in SAP Professional Journal, contains tips and best practices on how to ensure that your data is highly available despite any system mishap or disaster that may occur. View
Mitigate Risk with SAP Access Control

Mitigate Risk with SAP Access Control (Electronic Editions)

$79.95
This exclusive compendium of articles on SAP Access Control, recently published in SAP Professional Journal, has been curated to help you advance your GRC skills and stay on the leading edge of SAP technology. View
Mitigate Risk with SAP Access Control

Mitigate Risk with SAP Access Control (Electronic + Print Bundle)

$99.95
This exclusive compendium of articles on SAP Access Control, recently published in SAP Professional Journal, has been curated to help you advance your GRC skills and stay on the leading edge of SAP technology. View
SAP_DisasterRecovery

SAP HANA High Availability and Disaster Recovery Essentials (Electronic + Print)

$99.95

SAP HANA provides speedy access to your data, but only if everything is running smoothly. This anthology, a collection of articles recently published in SAP Professional Journal, contains tips and best practices on how to ensure that your data is highly available despite any system mishap or disaster that may occur.

View
Mitigate Risk with SAP Access Control

Mitigate Risk with SAP Access Control (Print)

$89.95
This exclusive compendium of articles on SAP Access Control, recently published in SAP Professional Journal, has been curated to help you advance your GRC skills and stay on the leading edge of SAP technology. View
SAP_DisasterRecovery

SAP HANA High Availability and Disaster Recovery Essentials (Print)

$89.95
SAP HANA provides speedy access to your data, but only if everything is running smoothly. This anthology, a collection of articles recently published in SAP Professional Journal, contains tips and best practices on how to ensure that your data is highly available despite any system mishap or disaster that may occur. View

Popular Chapters

View More
  • Chapter 7: Phase Four: Transition

    In the final phase, transition, we go through what you can expect at go-live, followed by lengthy discussions regarding service level agreements, operations process training, and transition to cloud operations. We talk about intricacies of system stabilization and monitoring. Finally, we explore the options for business continuity and security

    Read More
  • Chapter 6: Phase Three: Build

    In the third phase, build, we walk through developing proofs of concept for your project. The chapter discusses how to take advantage of a provision-shared infrastructure, as well as strategies for building and testing that infrastructure. There is an examination on how to build and mitigate databases and applications, as well as planning the phase cutover. It also looks at automated provisioning and automated services.

    Read More
  • Chapter 5: Phase Two: Model

    The second phase of moving SAP to the cloud, model, contains an overview of the second half of onboarding to the cloud. It examples infrastructure requirements and design and walks the reader through the process of developing a workload analysis. The chapter discusses application and business process discovery as well as operational run books and migration strategy.

    Read More
View More

Do you #LearnLikeAnInsider?

See what it means to redefine reading and start to #LearnLikeAnInsider today.

insiderBOOKS Video

From The Blog

  • Encryption

    The previous chapters [of SAP in the Cloud: Security Essentials] discussed how cloud providers can prevent an attacker from accessing your data. But what happens if an attacker does gain access? Does this mean it’s game over, data’s stolen, start running damage control? Not necessarily. This is where encryption can help you. In this chapter excerpt, we’ll cover what encryption is and how you can use it to protect your cloud-based SAP system.

    Read More