{"id":489,"date":"2018-04-19T08:30:20","date_gmt":"2018-04-19T06:30:20","guid":{"rendered":"http:\/\/akquinet-security-en.blog\/?p=489"},"modified":"2020-07-07T14:55:19","modified_gmt":"2020-07-07T12:55:19","slug":"automated-sap-authorization-management-and-system-security-for-50-countries","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/","title":{"rendered":"Automated SAP Authorization Management and System Security for 50 countries"},"content":{"rendered":"<p><span style=\"color: #626161;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-490 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/logo_takeda_500x168.png\" alt=\"Logo_Takeda_500x168.png\" width=\"301\" height=\"101\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/logo_takeda_500x168.png 500w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/logo_takeda_500x168-300x101.png 300w\" sizes=\"auto, (max-width: 301px) 100vw, 301px\" \/>Takeda\u2019s twin objectives were to accelerate and <\/span><span style=\"color: #626161;\">simplify its authorization assignment process while deploying a tool that was simultaneously capable of providing vulnerability m<\/span><span style=\"color: #626161;\">onitoring for its SAP backend worldwide.\u00a0<!--more--><\/span><\/p>\n<p><span style=\"color: #626161;\">Since the <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a> rollout, multiple audits have been performed that confirm the level of security and quality the GRC tool from AKQUINET provides for the SAP systems. In addition, automated risk management has meant that the number of high- and medium-critical SoD (segregation of duties) conflicts has been cut by around two-thirds.<\/span><\/p>\n<p><span style=\"color: #626161;\"><em><strong>&#8220;The SAST SUITE has given us the perfect solution for our global SAP authorization management while also providing us with permanent vulnerability monitoring for our systems. Thanks to the highly competent and motivated support provided by the AKQUINET team, we completed the project on time, in budget and at the specified level of quality.\u201d<br \/>\n<\/strong><\/em> (Manfred Meier, Global Head of SAP Center of Excellence, Takeda AG)<\/span><\/p>\n<p><span style=\"color: #626161;\">In the Success Story, Takeda reports about this project for its worldwide SAP landscapes with around 4,000 users.<\/span><\/p>\n<p><span style=\"color: #626161;\"><a href=\"https:\/\/sast-solutions.com\/files\/SAST\/Dokumente\/sast-success-story-takeda-SAP-system-security-and-authorization-management.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">To the Success Story<\/a><\/span><\/p>\n<div id=\"gt-res-c\" class=\"g-unit\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Takeda\u2019s twin objectives were to accelerate and simplify its authorization assignment process while deploying a tool that was simultaneously capable of providing vulnerability monitoring for its SAP backend worldwide.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[156,67,68,103,114,117],"class_list":["post-489","post","type-post","status-publish","format-standard","hentry","category-references-best-cases","tag-cyber-security","tag-identity-management","tag-sap-authorizations","tag-sod","tag-threat-detection","tag-vulnerability-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Automated SAP Authorization Management and System Security for 50 countries<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automated SAP Authorization Management and System Security for 50 countries\" \/>\n<meta property=\"og:description\" content=\"Takeda\u2019s twin objectives were to accelerate and simplify its authorization assignment process while deploying a tool that was simultaneously capable of providing vulnerability monitoring for its SAP backend worldwide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-19T06:30:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-07T12:55:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/logo_takeda_500x168.png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Automated SAP Authorization Management and System Security for 50 countries\",\"datePublished\":\"2018-04-19T06:30:20+00:00\",\"dateModified\":\"2020-07-07T12:55:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/\"},\"wordCount\":179,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/logo_takeda_500x168.png\",\"keywords\":[\"Cyber Security\",\"Identity Management\",\"SAP Authorizations\",\"SoD\",\"Threat Detection\",\"Vulnerability Assessment\"],\"articleSection\":[\"References &amp; Best Cases\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/\",\"name\":\"Automated SAP Authorization Management and System Security for 50 countries\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/logo_takeda_500x168.png\",\"datePublished\":\"2018-04-19T06:30:20+00:00\",\"dateModified\":\"2020-07-07T12:55:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/logo_takeda_500x168.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/logo_takeda_500x168.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/04\\\/19\\\/automated-sap-authorization-management-and-system-security-for-50-countries\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automated SAP Authorization Management and System Security for 50 countries\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Automated SAP Authorization Management and System Security for 50 countries","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/","og_locale":"en_US","og_type":"article","og_title":"Automated SAP Authorization Management and System Security for 50 countries","og_description":"Takeda\u2019s twin objectives were to accelerate and simplify its authorization assignment process while deploying a tool that was simultaneously capable of providing vulnerability monitoring for its SAP backend worldwide.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/","og_site_name":"SAST BLOG","article_published_time":"2018-04-19T06:30:20+00:00","article_modified_time":"2020-07-07T12:55:19+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/logo_takeda_500x168.png","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Automated SAP Authorization Management and System Security for 50 countries","datePublished":"2018-04-19T06:30:20+00:00","dateModified":"2020-07-07T12:55:19+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/"},"wordCount":179,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/logo_takeda_500x168.png","keywords":["Cyber Security","Identity Management","SAP Authorizations","SoD","Threat Detection","Vulnerability Assessment"],"articleSection":["References &amp; Best Cases"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/","name":"Automated SAP Authorization Management and System Security for 50 countries","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/logo_takeda_500x168.png","datePublished":"2018-04-19T06:30:20+00:00","dateModified":"2020-07-07T12:55:19+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/logo_takeda_500x168.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/logo_takeda_500x168.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/04\/19\/automated-sap-authorization-management-and-system-security-for-50-countries\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Automated SAP Authorization Management and System Security for 50 countries"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=489"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/489\/revisions"}],"predecessor-version":[{"id":1211,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/489\/revisions\/1211"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}