Access Control

Monitoring and Managing user access and user provisioning is a foundation of organizational governance and security. Content in this track will help companies understand best practices and solutions that can help you tighten access management in the wake of organization complexity and constant change. Understand the evolution of SAP’s access control functionality and learn how third party solutions can potentially extend and streamline your current capability. Learn how current Access control processes and technologies can be integrated with identity management solutions to protect both on-premise and cloud-based applications and data.

Results

  1. Wolters Kluwer | CCH Tagetik

    Reading time: 1 mins

    A growing landscape of laptops and smartphones, widespread internet access, and remote workforces throughout the world have increased the need for risk and identity management and has changed how security models should operate. Continuing to focus on only two dimensions, the “Who” (users and user groups) and the “What” (roles and authorizations), leaves organizations vulnerable…
  2. Least Privilege 2.0: Controlling Risk in a Dynamic Environment

    A growing landscape of laptops and smartphones, widespread internet access, and remote workforces throughout the world have increased the need for risk and identity management and has changed how security models should operate. Continuing to focus on only two dimensions, the “Who” (users and user groups) and the “What” (roles and authorizations), leaves organizations vulnerable…
  3. How to Implement SAP Cloud Identity Access Governance

    You’ve heard of the SAP Identity and Access Governance (IAG) cloud version—but do you know how this cloud version could be implemented into your existing environment? This presentation will walk you through SAP IAG implementation, from covering key requirements for on-premise and cloud environments to planning for connections to ABAP and cloud applications. You will…
  4. Panel | The direction and evolution of access control and identity management

    In 2021’s increasingly digital world, organizations will need to remain vigilant. As remote work continues for at least several more months, we can be sure that threat actors will continue to adapt their tactics to capitalize on employees working remotely. Without a clearly defined corporate perimeter, identity will be more important than ever when it…
  5. What’s New in Access Governance: Implications for identity access management and access control

    Most SAP customers have invested significantly in their on-premise landscape, including a high level of compliance and governance thanks to identity access management and governance solutions. But what happens to all of these solutions once you move to the cloud and need to manage access across the landscape all at the same time? In this…
  6. Virtustream

    Virtustream, a Dell Technologies business, is the enterprise-class cloud service provider trusted by enterprises worldwide to migrate and run their mission-critical SAP applications in the cloud. For enterprises, service providers and government agencies, Virtustream’s xStreamCare Services expertise provides a personalized, high-touch approach to application and system modernization. Virtustream’s SAP-certified experts are backed by 10+ years of migration and management experience, featuring the completion of over 2,500 SAP migrations to date with 0 production rollbacks. As a result, organizations are assured to achieve the highest levels of availability, performance, security, agility and efficiency in the cloud.

  7. How to modernize your SAP Access Control rule set and mitigating control library

    Being on the “latest and greatest” version of the GRC technology does not always mean that your GRC rule set or mitigations are current and accurate for your business. How can you be sure that your controls and processes are up to date, accurate, and reflective of compliance standards? In this session we will explore…
  8. Case Study: How Hershey is leveraging GRC to increase control automation with SAP S/4HANA

    Learn how The Hershey Company, one of the largest chocolate manufacturers in the world, partnered with their SAP S/4HANA ERP implementation team to embed a reliable system of internal controls as part of the solution confirmation phase of the implementation. Attend this session to hear how Hershey: - Partners with key business process owners to…
  9. Expert’s guide for SAP GRC 12 configuration, Fiori UI, HANA integration, and upgrade FAQs

    SAP GRC 12.0 has upgraded the look and feel of the GRC suite’s user experience while offering new enhanced integration with SAP HANA. Anyone considering a move from SAP GRC 10.0 to 12.0 will want to know that the upgrade will be successful. How can you best configure this security and compliance suite to fit…
  10. LS Headquarters image

    New Security Platform at Lundbeck Helps Ensure Business Continuity and Eliminate Risk of Fraud

    Reading time: 10 mins

    As one of the most highly regulated industries, the pharmaceutical industry takes an aggressive approach to supply chain risk management. Employing a global security system that supports access governance and authorization areas is critical in preventing fraud and maintaining business continuity. A case study on Lundbeck, a biopharmaceutical company based in Copenhagen, details how it…