"Security is not simply a subset of IT"

278 results

  1. Make Identity Management Sarbanes-Oxley-Compliant by Leveraging Integrated SAP Solutions

    Efficient processes for identity management (IDM) are a challenge to many companies — in particular when access- and authorization-related risks must be managed and taken under consideration prior to provisioning access privileges. SAP BusinessObjects Access Control 5.3 comes with a Web service-based interface intended to provide risk analysis and mitigation features to IDM solutions. See…...…

  2. Saviynt Identity Management

    Build Effective Identity Management in Hybrid and Cloud Environments

    Reading time: 4 mins

    As more employees work remotely, and organizations shift to hybrid and cloud software and technology environments, identity management has become a more important piece of the access and security landscape. Critical assets no longer sit behind traditional firewalls, with employees accessing important corporate data from outside a single place of work. Automation can help companies…

  3. Combine SAP NetWeaver Identity Management and SAP Access Control to Automate Management of IT and ERP Access and Identity

    Learn about options for combining SAP Access Control and SAP NetWeaver Identity Management to support automation of identity and access processes and compliance requirements within your organization. Key Concept An integrated software solution that combines SAP NetWeaver Identity Management and SAP Access Control enables you to automate access governance and identity management capabilities to support…...…

  4. Implement a Compliant Identity Management Solution for Effective Provisioning, Reporting, and Role Management

    Learn how to achieve efficient, compliant, and secure management of user accounts and identities with SAP NetWeaver Identity Management (SAP NetWeaver IDM). Step through an overview of SAP NetWeaver IDM, including the product’s architecture and integration capabilities. Key Concept SAP NetWeaver Identity Management (SAP NetWeaver IDM) provides provisioning capabilities for SAP and third-party applications. You…...…

  5. Universal Identity and Access Management for Employees and Consumers

    As digital technologies have expanded their reach, the task of ensuring secure authentication and identity management within business processes has become more complex. Employees are no longer the only users involved — external users, such as consumers accessing a web shop, must also be considered. To help you navigate this new reality, this article explains…

  6. Identity and Access Management in Cloud and Hybrid SAP Landscapes

    While ensuring appropriate user access to your enterprise systems has always been a difficult task, it has become profoundly more challenging as IT landscapes have grown more complex with changing user roles and new technologies. To help you meet this challenge, SAP provides a comprehensive set of solutions — SAP Single Sign-On, SAP Cloud Platform…

  7. Managing the Identity Life Cycle in Hybrid SAP Environments

    Managing the Identity Life Cycle in Hybrid SAP Environments

    Reading time: 13 mins

    This article explains how to build a security bridge between on-premise and cloud-based applications in hybrid SAP landscapes by extending on-premise user authentication and identity management into the cloud.

  8. SAP C/4HANA and SAP Cloud Identity Access Governance: Unified Identity Management

    Audio pioneer Dolby Laboratories, which has been delivering audiophiles a superior sound and sight experience since the 1970s, decided in 2016 that it wanted an equally stringent level of quality assurance for its business process testing. The business sought a risk-based automated testing solution to reduce or eliminate regression test coverage gaps and lengthy testing…

  9. Compliant Identity Management Processes Can Do More

    SAP’s solutions for identity management and governance, risk, and compliance (GRC) provide a powerful, integrated toolset for managing SAP accounts and authorizations. In some cases, however, users may have too many authorizations or licensing needs that exceed current agreements. Learn how using compliant identity management (CIM) practices in combination with SAP Identity Management and SAP…

  10. User Access and Identity Management for SAP S/4HANA Benchmark Report

    Reading time: 1 mins

    In This Report: Access management often comes about through necessity rather than planning. Organizations today use a portfolio of systems that not all employees are authorized to use, so proper access management is critical. With cloud systems and remote work on the rise and increasing threats that seek to steal employee access, a more comprehensive…...…