access control

9 results

  1. cybersecurity

    Making Application and Data Security Controls a Lynchpin for SAP Cybersecurity Protection

    Reading time: 2 mins

    SAPinsider Vegas 2025 will focus on enhancing cybersecurity within SAP environments, addressing the significant rise in cyber threats, particularly ransomware, while emphasizing the importance of integrating comprehensive data security and application security strategies to protect vital ERP data.

  2. GRC sessions

    Elevating Access Management Through Automation

    Reading time: 2 mins

    Effective access control is crucial for GRC teams to prevent internal threats and ensure compliance in SAP environments, and solutions like Pathlock automate and streamline access processes, enhancing audit efficiency and overall organizational compliance.

  3. Simplifying governance, risk and compliance for SAP systems with Fastpath’s Access Control

    Reading time: 1 mins

    Fastpath’s Access Control offers a GRC solution for SAP platforms that helps organizations manage access control, reduce risks associated with user access, and ensure compliance with regulatory standards by automating the detection of Segregation of Duties conflicts and facilitating User Access Reviews.

  4. pathlock

    Unifying Access Management with Pathlock

    Reading time: 2 mins

    One of the most important aspects of a successful GRC strategy is cohesiveness. Organizations must have teams and technology that work in harmony to minimize risk while also ensuring that all users have the access that they need to execute essential business functions. Yet all too often, companies work in a siloed manner, with differing…

  5. Journey to the Cloud

    Make the Switch to SAP S/4HANA with AI-powered CeleRITE

    Reading time: 3 mins

    Many organizations with SAP ECC face challenges in transitioning to SAP S/4HANA due to concerns over cost and complexity, but with the 2027 deadline approaching, solutions like Applexus CeleRITE aim to automate and simplify the migration process, potentially reducing costs and risks by up to 50%.

  6. pathlock

    SAP IDM Is Ending—Are You Ready for the Future of Identity Management?

    Reading time: 5 mins

    The end of SAP Identity Management (IDM) is looming, and it’s not just another “turn it off and on again” moment. With mainstream support wrapping up by 2027, this is a wake-up call. But don’t worry—it’s not all doom and gloom! In this article, I walk you through how to assess your current setup, preserve…

  7. security

    Unlocking the Real Power of SAP GRC Access Control Solution with VASPP Add-Ons

    Reading time: 7 mins

    SAP’s GRC Access Control solution is a widely recognized tool for efficiently managing user access to SAP applications. It offers a wide range of capabilities for managing user access, including automated access provisioning, access request workflows, and risk analysis along with access management automation. The solution is also capable of enforcing segregation of duties (SoD)…

  8. SAP Security and the Provisioning of SAP Access

    Reading time: 1 mins

    This article highlights the evolution of SAP security, access control (GRC), and IAM solutions, and discusses how organizations can choose the right solution for their needs, including a hybrid model. The article emphasizes the importance of collaboration between SAP security and cyber teams and encourages readers to consider their organization’s needs, business objectives, SAP footprint,…

  9. firefighter

    Brighthouse Financial Accelerates User Provisioning Cycles

    Reading time: 4 mins

    Before integrating Saviynt’s Identity Governance and Administration (IGA) solution and SAP Access Control, Brighthouse Financial ran an entirely manual user provisioning process using an access request feature in SharePoint. This case study explains how the Fortune 500 company improved their user provisioning processes for SAP products with SAP Access Control and then implemented Saviynt’s IGA…