identity management

7 results

  1. pathlock

    SAP IDM Is Ending—Are You Ready for the Future of Identity Management?

    Reading time: 5 mins

    The end of SAP Identity Management (IDM) is looming, and it’s not just another "turn it off and on again" moment. With mainstream support wrapping up by 2027, this is a wake-up call. But don’t worry—it’s not all doom and gloom! In this article, I walk you through how to assess your current setup, preserve…

  2. “SAP Application Security for Dummies” by Pathlock

    Reading time: 1 mins

    This guide, created by Pathlock, is designed to be a user-friendly resource for understanding and implementing SAP application security.

  3. “Security is not simply a subset of IT”

    Reading time: 4 mins

    Cybersecurity encompasses a wide range of areas, including endpoint and network security, and application layer security. A comprehensive understanding of these aspects is essential for organizations to protect themselves. SAP holds a unique advantage in this realm, as it possesses deep understanding of its own applications and business frameworks across various industries. SAP has created…

  4. User Access and Identity Management for SAP S/4HANA Benchmark Report

    Reading time: 1 mins

    In This Report: Access management often comes about through necessity rather than planning. Organizations today use a portfolio of systems that not all employees are authorized to use, so proper access management is critical. With cloud systems and remote work on the rise and increasing threats that seek to steal employee access, a more comprehensive...…

  5. Saviynt Identity Management

    Build Effective Identity Management in Hybrid and Cloud Environments

    Reading time: 4 mins

    As more employees work remotely, and organizations shift to hybrid and cloud software and technology environments, identity management has become a more important piece of the access and security landscape. Critical assets no longer sit behind traditional firewalls, with employees accessing important corporate data from outside a single place of work. Automation can help companies…

  6. Q&A: How Protiviti’s Identropy Acquisition Meets Growing Identity and Access Management Demands

    Reading time: 5 mins

    by Annie Kennedy, SAPinsider In the past year, a global shift to remote working and transformations to digital environments have amplified business’ need for more efficient and secure access governance. SAPinsider spoke with management and technology consulting firm Protiviti about how their recent acquisition of Identropy, which specializes in identity and access management (IAM), can…

  7. Managing the Identity Life Cycle in Hybrid SAP Environments

    Managing the Identity Life Cycle in Hybrid SAP Environments

    Reading time: 13 mins

    This article explains how to build a security bridge between on-premise and cloud-based applications in hybrid SAP landscapes by extending on-premise user authentication and identity management into the cloud.