Xiting Logo
Back to Vendor Directory

Xiting

Xiting is a highly specialized SAP solution provider for Compliant Identity & Role Management. Xiting offers high-quality services in the area of SAP security and provides, as a consulting partner for companies of various sizes and in very different industries, a comprehensive service portfolio. With the specially-developed software solution Xiting Authorizations Management Suite (XAMS), the company has an unrivalled technology lead for SAP authorizations management according to SAP best practice.

Featured Products

  • Xiting Authorizations Management Suite (XAMS) product image

    Xiting Authorizations Management Suite (XAMS)

    With the XAMS, Xiting has developed a software solution that uses its innovative tools to support companies in their security projects by automating costly and time-consuming tasks, improving compliance and reducing the risk of errors.

  • Download the XAMS Use Case Booklet image

    Download the XAMS Use Case Booklet

    The lack of know-how and resources often prevents a timely solution of problems in the SAP security environment. Learn more about the Xiting Authorizations Management Suite (XAMS) and how its use cases can support your organization efficiently in the long run.

Featured Content

  • System Analysis & SAP S/4HANA Readiness Check image

    System Analysis & SAP S/4HANA Readiness Check

    The SAP S/4HANA Readiness Check examines the current role concept with regard to technical requirements for a future S/4HANA migration. Existing roles are checked using the XAMS for S/4HANA compatibility. This enables us to show you which transactions and roles are affected by the migration of the existing role concept, and which project steps have to be carried out as part of the S/4HANA migration.

  • Expedite your SAP S/4HANA Migration image

    Expedite your SAP S/4HANA Migration

    SAP S/4HANA introduces an entirely new data model. As a result, role administrators must update their existing role concept, including authorizations. Analyzing and updating old roles is a time-intensive process that consumes valuable project resources. XAMS can support and facilitate a successful role migration to S/4HANA.

Multimedia Center

  • SAP Security Simplified with XAMS video thumbnail

    SAP Security Simplified with XAMS

    The Xiting Authorizations Management Suite (XAMS) allows for the easy execution of authorization projects. Critical, time-consuming phases can be drastically shortened and efficiently managed.

  • SAP Cloud Security video thumbnail

    SAP Cloud Security

    Take a deep dive into the latest cloud solutions from SAP to learn how they work and how you can integrate them with your on-premise applications.

Articles / Case Studies / Videos

  • XAMS Use Case: Simplify Role Design

    Create sustainable authorization concepts, perform a what-if analysis, scan for SoD conflicts during the design phase, and quickly migrate roles to S/4HANA using a virtual role design cockpit.
  • XAMS Use Case: Harden RFC Interfaces

    The XAMS can safely reauthorize RFC interfaces and associated technical users without negatively impacting the operation of the interface.
  • XAMS Use Case: Automate Role Testing

    Xiting has developed a unique solution that virtually eliminates the need for traditional role-acceptance or user-acceptance testing. Learn more about the “Productive Test Simulation.
  • SAP Security Check: Identify Potential Weak Points in Your SAP Security Concept

    Get an analysis of your system security and concepts as preparation for internal and external audits. Our security experts provide you with further recommendations and measures.
  • Cloud Security Services

    Use SAP’s Cloud Platform security services to secure your business applications and take advantage of the built-in features and functions, such as authentication/authorization mechanisms.
  • SAP Hacking – Let Google Hack Your SAP System 2.0

    Learn how to effectively protect your SAP system from publicly-known vulnerabilities. Gather tips on what to consider when building SAP roles and authorizations.