The S/4 HANA Decade is Here: Three Tips for a Successful Migration

Three Migration Tips

For organizations using SAP, migrating to S/4 HANA is a project that’s either in the works or on the horizon as the 2027 deadline for completion looms. The new generation of SAP Business Suite promises simplifications, massively increased efficiency and compelling features. It’s also a crucial next step in modernizing SAP platforms and moving to the cloud.

Today, organizations can deploy SAP S/4 HANA on-premise or in the cloud – with the latter option gaining popularity. In fact, nearly 50 percent of SAP customers moving to S/4HANA are choosing a cloud model, according to the independent Americas’ SAP Users Group.

Despite all the benefits companies can obtain from SAP S/4HANA, there are specific considerations every customer needs to consider to ensure a smooth migration – regardless of their deployment model.

Start Your SAP S/4 HANA Migration ASAP

Companies often feel they have ample time to plan, especially since SAP extended the deadline of support for SAP Business Suite software until 2027. However, experts say a full migration of legacy systems for large enterprises typically takes a minimum of 18 months. Moreover, it can take longer if the core applications have been heavily customized. So while 2027 might seem far off, when dealing with mission-critical enterprise software, it’s a lot closer than organizations may realize.

Timing will always be a challenge, but there are several steps organizations can take to ease the move. For instance, companies can use SAP S/4 HANA evaluations and pilot programs to preview changes. Alternatively, companies can start with small projects to minimize disruption and build on the successes and lessons learned. Before organizations consider a full-scale migration, businesses need to ensure they’re not taking any past problems into the future.

Eliminate Unused Code

Research shows that there is more than one critical security/compliance issue per 1,000 lines of custom ABAP code, and a typical SAP system has 2,150 security/compliance issues in custom code.

Customization in SAP code can lead to unwanted complexities if left unmanaged. These types of complications can hamper migrations and cloud deployments and become costly down the road. That’s why businesses should take the time to analyze custom SAP code, perform hygiene on unused code and check for vulnerabilities or integration issues. This process ensures that companies reduce the likelihood of bringing poorly designed code and vulnerability issues into new SAP S/4 HANA environments.

Consider Security Early 

Another critical success factor for migrations is prioritizing security early. According to the December 2019 SAPinsider Benchmark Report, 81 percent of respondents indicated that certified and guaranteed security was very critical or critical to their cloud-migration strategy.

While security isn’t an excuse to delay migrations to modernized platforms or the cloud, organizations should emphasize how to protect sensitive data. Preventing and mitigating security issues is far less expensive and risky than being reactive and implementing fixes after the SAP applications are production-ready. Not only that but bringing security upfront in the migration process helps accelerate projects due to the early detection and coordination of potential issues in the security and compliance areas. Leading application testing and security software provides the visibility businesses need to discover and address vulnerabilities, misconfigurations and authorization issues within their systems.

Increasing Cloud Options

With a modernized platform in S/4 HANA, SAP organizations now have an increased amount of available cloud options. Businesses can choose between hybrid, public, private and SAP S/4 HANA’s Enterprise Cloud (HEC) – a service that accelerates the path to cloud readiness and into an intelligent enterprise.

For organizations that choose the latter, SAP HEC pushes SAP processes and associated information outside of an organization’s data center with a completely managed offering, decreasing costs and increasing scalability.

However, while SAP delivers patching and protection benefits in this cloud deployment, to take full advantage of this offering, organizations must rely on a “trust but verify” security model. Businesses need to verify their instance is being secured according to policies and security baselines. This visibility and proactive risk monitoring helps reduce business disruptions, protect supply chain integrity and uncover potential security threats, so businesses can rely on HEC with confidence.

To highlight this example, we hosted a session in June with LEVI Strauss Deputy CISO Steve Zalewski. The session, explains how to ensure security and compliance is provided in a hosted cloud environment such as SAP HEC.

Whether companies believe it or not, the S/4 HANA decade is here – and 2027 is going to arrive before we know it. For any system, migrations can present difficulties and S/4 HANA is no different. To succeed, organizations need to start migration plans ASAP, eliminate unused code and prioritize security early on. By following these steps and leveraging necessary tools, businesses can modernize their SAP environments, capitalize on increased cloud options and securely take advantage of the benefits the S/4 HANA Enterprise Cloud offers.

By Juan Etchegoyen

JK Chelladurai
Usage-Based Pricing We are now in an era where many businesses are flipping their business model and shifting from subscription-based pricing to usage-based models, to better cater to the modern ‘pay-as-you-consume’ buyer. So what exactly ...
Cloudtweaks Comic Ai
How AI Is Important for Businesses Shifting to Remote Work The Coronavirus Pandemic has taught us that organizations must have remote work choices. It is no longer possible to work in a digital environment. The ...
Yuliya Melnik
Heroku or AWS Cloud infrastructures are gradually starting to penetrate into an increasing number of areas and various businesses. And this is not surprising because such a ploy allows you to improve internal processes, protect ...
Gary Bernstein
Test Data Management How do you test your data management systems? With Delphix, you can automate your tests by running your data against a virtual copy of your production environment. Today, the amount of data ...
Threat Security
Azure Red Hat OpenShift: What You Should Know What Is Azure Red Hat OpenShift? Red Hat OpenShift provides a Kubernetes platform for enterprises. Azure Red Hat OpenShift permits you to deploy fully-managed OpenShift clusters in ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.