Unlocking the Real Power of SAP GRC Access Control Solution with VASPP Add-Ons

528 results

  1. Putting Out Fires: Ensuring Privileged Access Management With SAP Firefighter

    Despite Firefighter’s benefits (management of privileged access, streamlined emergency access management, increased audit compliance, etc.), SAP security teams are finding it increasingly difficult to manage the process. The rise in the use of the FF functionality is causing organisations to see a huge spike in their FF log volume, with this resulting in an accumulation…

  2. New Security Platform at Lundbeck Helps Ensure Business Continuity and Eliminate Risk of Fraud

    As one of the most highly regulated industries, the pharmaceutical industry takes an aggressive approach to supply chain risk management. Employing a global security system that supports access governance and authorization areas is critical in preventing fraud and maintaining business continuity. A case study on Lundbeck, a biopharmaceutical company based in Copenhagen, details how it…

  3. Don’t let privileged user access to HR, procurement and other Cloud applications disrupt business

    Although the risks associated with privileged accounts in business applications are known, few organizations truly understand how exposed they are. Forrester estimates that 80% of security breaches involve privileged credentials. By leaving the management of privileged accounts to system administrators, organizations expose themselves to negligent password management, accounts that are never deprovisioned, and an increased…

  4. role assignment GRC access control

    SAP Cloud Identity Access Governance (IAG) – A Primer

    Reading time: 4 mins

    SAP Cloud Identity Access Governance (IAG) is a cloud-driven solution designed to facilitate organizations in controlling access to vital business software and data. It forms a component of the SAP Business Technology Platform (BTP), offering a multitude of cloud services and solutions adaptable to businesses of different scales. With SAP Cloud IAG, companies can efficiently…

  5. Heidelberg University Hospital Partners with SAP to Improve the Health and Well-Being of Underprivileged Patients

    Every year, 500,000 women worldwide are newly diagnosed with cervical cancer.  To help prevent this disease, Heidelberg University Hospital developed a project using a biomarker that would help determine if a woman infected with HPV was at risk for developing cancer, enabling early, life-saving treatment for that woman. But reaching women in developing countries to…

  6. SAP IAG for Enhanced Access Governance

    Unlocking SAP Identity Access Governance (IAG) offers a comprehensive framework to manage user access, mitigate risks, and ensure regulatory compliance across SAP applications and non-SAP systems, on-premise or in the cloud. With five key services including Access Analysis, Privileged Access Management (PAM), Role Designer, Access Request, and Access Certification, SAP IAG streamlines access provisioning, automates…

  7. How to Prepare for a Comprehensive System Audit and Technical Review of SAP Access Control 10.0

    Learn invaluable tricks and tips for overcoming top auditing issues specific to an SAP Access Control 10.0 system. Key Concept A system audit is an exercise performed to gain assurance that defined controls work as intended, thereby eliminating the likelihood of fraudulent or malicious activities in the enterprise system. It involves the verification of conformance...…

  8. How Identity and Access Management Technology Is Supporting People Power

    As more organizations operate in a remote work environment, effectively controlling access to corporate resources becomes imperative. Automated identity and access management (IAM) along with strategic human decision-making are critical to protecting resources and data. At the same time, IAM automation needs to be integrated into business policies and processes, advises James Roeske, CEO of…

  9. SAP BusinessObjects Planning and Consolidation: How to Effectively Secure Dimensions within a Hierarchy

    Member access profiles in SAP BusinessObjects Planning and Consolidation are a fairly straightforward concept, but it can get tricky when you are assigning read, write, or denied access to individual members in a node and a parent within a hierarchy. Discover some tips to keep in mind while securing hierarchical dimensions. Key Concept Member access...…

  10. Configure SLAs for Firefighter Audit Log Workflow Review

    It is important for organizations to act on requests when they are due, especially when working with a compliance tool such as SAP Access Control 10.0. See how to configure emergency access management service level agreements for the review of firefighter audit logs. Key Concept A service level agreement (SLA) is an agreed upon delivery...…