Support  |  1-800-620-4210  |  
Home » Community » Blog
 

April
25
2022

Webinar April 28th : How to do Access Reviews for Non-SAP and Custom Objects by Gaurav Gautam

Why do you need periodic access reviews?  There is a myriad of…

March
21
2022

Webinar March 24th How to Secure SAP Against Fraud by Gaurav Gautam

How do you prevent losses from fraudulent activity?  There is always the…

January
24
2022

Webinar January 27th : Ask the Experts: Your SAP Role Redesign Questions Answered by Andy Hartley and Devin McLaughlin

What are best practices for designing SAP roles? A myriad of situations can…

November
7
2021

Webinar November 11th : Are You Getting The Most From Automated Emergency Access for SAP? by Diane Reinsma

How much time does automated emergency access save you?  For most organizations…

August
8
2021

Webinar August 12th : Base, Trace, Replace: How to Lay the Foundation for an SAP Security Model

How do you ensure ongoing control of SAP and the right SAP security…

July
26
2021

Webinar July 29th : Five Ways to Mitigate Risks with Sensitive Access and SOD Conflicts by Diane Reinsma

How do you mitigate risks with sensitive access and SoD conflicts?  Mitigating…

June
7
2021

Webinar June 10th : Can CCM Secure SAP Data and Applications?

How do you secure master data in SAP?  In large and small…

Page 1 of 2 pages  1 2 >