Please complete the registration form in order to download the publication. We will send you an email with your download link.
Implementing proper security controls for a BusinessObjects implementation is a complex process. There are a number of moving parts, complicated Access Controls, and many client access points. For those tasked with auditing an implementation it can be difficult to know where to begin.
In this white paper we discuss the BusinessObjects architecture landscape, discuss common security practices, target areas for an attacker, and make recommendations that, if not already implemented, will increase the security posture of your BusinessObjects deployment.