Blog

Read about interesting news, amazing facts, and get useful hints and insights. In our blog we share our knowledge about SAP's products and the SAP ecosystem. We highly appreciate your comments or recommendations of our contributions. 

 

Site Search

    SAP Security, Identity & Access Management

    What comes after SAP Identity Management (IdM)? According to SAP’s official recommendation, the strategic successor solution for Identity & Access Management (IAM) is Microsoft Entra ID.

    SAP Security, Identity & Access Management

    Many companies invest heavily in perimeter protection to ward off external attacks, while considering their internal SAP landscapes to be secure and neglecting them in terms of cyber security.

    SAP Security, Identity & Access Management

    Manual maintenance of identities and access is practically no longer possible above a certain company size – at least not with a reasonable amount of effort for the IT department.

    SAP Security, Identity & Access Management

    It is in every company’s best interest to protect its own resources effectively – especially as the threats to cyber security are constantly increasing.

    SAP Security, Identity & Access Management

    With a comprehensive system for Identity Governance & Administration (IGA), companies are able to map the user lifecycle centrally and holistically and thus connect the various applications in the IT landscape.

    SAP Security, Identity & Access Management

    Maintaining SAP roles is a complex and time-consuming task.

    SAP Security, Identity & Access Management

    The user interface and web-based technology of SAP Fiori combines various applications and transactions and makes them available as browser-based apps.