Support  |  1-800-620-4210  |  
Home » Community » Blog
 

April
25
2022

Webinar April 28th : How to do Access Reviews for Non-SAP and Custom Objects by Gaurav Gautam

Why do you need periodic access reviews?  There is a myriad of…

March
21
2022

Webinar March 24th How to Secure SAP Against Fraud by Gaurav Gautam

How do you prevent losses from fraudulent activity?  There is always the…

January
24
2022

Webinar January 27th : Ask the Experts: Your SAP Role Redesign Questions Answered by Andy Hartley and Devin McLaughlin

What are best practices for designing SAP roles? A myriad of situations can…

November
15
2021

Webinar November 18th : Efficient & Continuous SoD Mitigations by Asokkumar Christian and Ashish Sabharwal

Most companies have checks built into their financial systems to avoid or minimize…

August
8
2021

Webinar August 12th : Base, Trace, Replace: How to Lay the Foundation for an SAP Security Model

How do you ensure ongoing control of SAP and the right SAP security…

August
1
2021

Webinar August 05th : 5 Tips & Tricks for Automating SOD Conflict Mitigation by Asokkumar Christian and Ashish Sabharwal

How to efficiently handle all SoD risks in your SAP environment?  Catching 100%…

June
7
2021

Webinar June 10th : Can CCM Secure SAP Data and Applications?

How do you secure master data in SAP?  In large and small…

Page 1 of 2 pages  1 2 >