Identity & Access Management

Complementing and sometimes including GRC tools, identity and access management includes password management tools, provisioning software, security-policy enforcement tools, reporting and monitoring applications, identity repositories, single sign-on, and two-factor and multi-factor authentication tools. Learn about what is needed to set up and maintain these systems for SAP applications, how they can be tied to ensuring that only the correct users have access to the appropriate data, and how changes due to more distributed workforces are impacting organizational security. Explore how topics like API security, identity analytics, and risk-based authentication are impacting organizations today, and how they should be included in security planning.

Results

  1. Security Weaver

    Security Weaver’s integrated yet modular offerings have been popular governance, risk, and compliance (GRC) solutions for companies running SAP software since 2004. These solutions ensure superior application performance, rapid implementations across diverse environments, and unmatched returns on compliance investments.

  2. User Access and Identity Management for SAP S/4HANA

    User access and identity management often come about through necessity rather than planning. Organizations today use a portfolio of systems that not all employees are authorized to use, so proper access management is critical. With cloud systems and remote work on the rise and increasing threats that seek to steal employee access, a more comprehensive…
  3. Jabil UI Masking Image

    Jabil Turns to UI Masking for Stronger Data Protection

    The proliferation of data privacy regulations and laws has prompted organizations to beef up their data privacy and protection. One way to protect data without the inconvenience of encryption is data masking or user interface (UI) masking. One company taking full advantage of SAP’s UI masking feature is Jabil, a St. Petersburg, Fla.-based global manufacturing…
  4. Wilder Latino image

    Jabil Deploys UI Masking

    The proliferation of data privacy regulations and laws, such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), has prompted organizations to beef up their data privacy and protection. One way to protect data without the inconvenience of encryption is data masking or user interface (UI) masking. One…
  5. SAPinsider Vegas 2022 event image

    SAPinsider 2022 Conference

    Financials2022​ GRC2022​ SAP S/4HANA2022​ Cloud & Admin2022 Data & Analytics2022 Cybersecurity2022
  6. Centralizing User Access Management image

    Centralizing User Access Management

    A global tools and storage company that generates $14.5B in annual revenue and employs more than 10,000 workers worldwide had more than 100 enterprise resources planning (ERP) systems to handle. To get a grip on this sprawl, the company decided to optimize its IT environment with a plan that included a migration of its financial…
  7. Video: Sanofi Streamlines Thousands of New Business Roles in User Access Management Update

    At the same time that Sanofi was working on COVID-19 vaccines, it was also migrating from SAP ERP Central Component System to SAP S/4HANA. This was an ambitious undertaking considering the unique economic environment, the firm’s multinational reach, and the heavily regulated nature of the pharmaceutical industry. As part of this effort, the company updated…
  8. Sanofi Leverages SAP Access Control to Help Secure SAP S/4HANA Migration During COVID-19 Vaccine Response

    At the same time that Sanofi was working on COVID-19 vaccines, it was also working with Accenture and KPMG to migrate from SAP ERP Central Component System to SAP S/4HANA and consolidate and optimize its IT environment. This was an ambitious undertaking considering the unique economic environment, the firm’s multinational reach, and the heavily regulated…
  9. User Access and Identity Management for SAP S/4HANA Benchmark Report

    In This Report: Access management often comes about through necessity rather than planning. Organizations today use a portfolio of systems that not all employees are authorized to use, so proper access management is critical. With cloud systems and remote work on the rise and increasing threats that seek to steal employee access, a more comprehensive…
  10. Saviynt Identity Management

    Build Effective Identity Management in Hybrid and Cloud Environments

    As more employees work remotely, and organizations shift to hybrid and cloud software and technology environments, identity management has become a more important piece of the access and security landscape. Critical assets no longer sit behind traditional firewalls, with employees accessing important corporate data from outside a single place of work. Automation can help companies…