Meet our Security & Compliance experts in person and learn everything you need to know about protecting your SAP systems first-hand. Every year we organize a series of events of our own or attend congresses to answer your questions.
We look forward to seeing you!
Our webinars offer you a live forum in which you can get the answers to your specific questions about the latest topics in SAP Security & Compliance without having to invest a lot of time.
Take advantage of our recommendations and find what you need to meet your particular requirements!
You are interested in one of the topics, but unfortunately the date does not fit? No problem, contact us directly: firstname.lastname@example.org
Or request our past webinars on demand.
When transforming authorization roles from your ERP system, there are many points to consider in parallel: For which transactions are there comparable counterparts, which must be exchanged, and which are even obsolete? To do this, you need to select the appropriate Fiori Apps for the new roles and, of course, you also need to adhere to your SAP authorization concept. This requires some preparatory work and analyses, especially if you plan to implement this work manually.
In this webinar we will show you how we can support you, shorten the migration period and at the same time greatly improve the quality and security of your roles. After all, it will be more expensive to clean up legacy issues only after migration - not to mention the damage caused by security holes that have been transferred.
Topics of focus:
- Challenges and necessary questions before project start
- Our project procedure at a glance
- Tips for identifying and eliminating risks in your SAP roles
- Advantages of the SAST Role Conversion Service
Administrating a large number of user accounts often presents companies with serious challenges. Especially when you consider how complicated most of the available standard tools are. The effort is hardly manageable if user identities also need to be maintained in several systems, directory services, or databases.
The lack of an option to manage user IDs and authorizations across multiple systems in a transparent way, not only leads to insufficient clarity and SoD conflicts; it also requires more effort to address those issues.
We will demonstrate how you can manage the identities, roles and authorizations of your SAP users efficiently and also on a shared S/4HANA system landscape.
Topics of focus:
- Challenges of Identity Management in SAP S/4HANA systems
- Reduction of effort due to automated authorization requests
- Real time risk assessment of critical authorizations
- Advantages of the SAST User Access Management
- Best practice tips
An immersive and fully virtual conference experience will start in August 2020, organized from the largest SAP membership group worldwide. SAPinsider brings together 2500+ users, experts, and partners under one virtual roof. Each of the six programs are designed with a comprehensive agenda, expert speakers, and actionable case studies.
We are happy to be part and be speaking in multiple sessions at this unique event. Join our partner session "Safety first! Your successful journey to a secure SAP S/4HANA platform" and our i20 breakout session "Take a good look under the hood - get your SAP risks straight!".
Meet our SAP security & authorization experts live at the SAST SOLUTIONS booth, benefit from our experiences and get tips for your personal roadmap to secure and compliant SAP ERP and S/4HANA systems.