Blogs
February212022
Webinar February 24th : Architecture & Benefits of the SAP HANA Database by Sirish Gullapalli
How do you get the benefits of SAP HANA while avoiding the risks? There are several drawbacks to the existing ERP database systems preceding…
February32022
jueves 10 de febrero 2022 : 5 formas de mitigar los riesgos de accesos críticos y los conflictos de SOD
¿Cómo se mitigan los riesgos con el acceso críticos y los conflictos de SOD? La mitigación de…
January302022
Webinar February 03 : Should You Fix Your SAP S/4HANA Security Risks Before, During, or After Going Live? by Allen Cutting
When is the best time to fix your SAP S/4HANA Security Risks? Every organization using SAP will need to upgrade to SAP S/…
January242022
Webinar January 27th : Ask the Experts: Your SAP Role Redesign Questions Answered by Andy Hartley and Devin McLaughlin
What are best practices for designing SAP roles? A myriad of situations can trigger the need for a role redesign project. But what are the…
January172022
Webinar January 20th : 6 Critical SAP User Actions to Watch For by Isaac Kimmel
What is the best way to ensure you catch critical user actions in your SAP environment? Regardless of your GRC tools or processes, there…
January122022
jueves 20 de enero 2022 : ¿SU53 es suficiente para corregir errores de autorización en SAP? Por Miguel Hernández Azpeitia
¿Cuál es la forma más rápida de administrar los errores de autorización de SAP? ¿Es…