Support  |  1-800-620-4210  |  
Home » Community » Blog
 

April
30
2022

Webinar May 5th :  5 Ways User Activity Data Improves Security and Compliance by Isaac Kimmel

What is user activity data, and why is it important to track it…

January
24
2022

Webinar January 27th : Ask the Experts: Your SAP Role Redesign Questions Answered by Andy Hartley and Devin McLaughlin

What are best practices for designing SAP roles? A myriad of situations can…

November
15
2021

Webinar November 18th : Efficient & Continuous SoD Mitigations by Asokkumar Christian and Ashish Sabharwal

Most companies have checks built into their financial systems to avoid or minimize…

November
7
2021

Webinar November 11th : Are You Getting The Most From Automated Emergency Access for SAP? by Diane Reinsma

How much time does automated emergency access save you?  For most organizations…

August
30
2021
August
8
2021

Webinar August 12th : Base, Trace, Replace: How to Lay the Foundation for an SAP Security Model

How do you ensure ongoing control of SAP and the right SAP security…

July
26
2021

Webinar July 29th : Five Ways to Mitigate Risks with Sensitive Access and SOD Conflicts by Diane Reinsma

How do you mitigate risks with sensitive access and SoD conflicts?  Mitigating…

Page 1 of 2 pages  1 2 >