Blogs
March212022
Webinar March 24th How to Secure SAP Against Fraud by Gaurav Gautam
How do you prevent losses from fraudulent activity? There is always the risk of fraudulent activities that can lead to significant monetary losses in…
March122022
Webinar March 17th : SAP Fiori, Security Weaver, and You by Akash Jagga
Are you hesitating to move forward with SAP Fiori? Lack of knowing how SAP Fiori works and not understanding its advantages can delay adoption.…
March72022
jueves 10 de marzo : 6 Acciones críticas de los usuarios en SAP a las que hay que prestar atención
¿Cuál es la mejor manera de detectar acciones críticas de los usuarios dentro de su entorno SAP? Únase a…
February272022
Webinar March 03rd : How Hard is Automating SAP SoD Remediation? by Dinesh Dhiman
What is the best way to ensure that you are catching 100% of your SAP SoD violations? There are several common issues organizations face when trying…
February212022
Webinar February 24th : Architecture & Benefits of the SAP HANA Database by Sirish Gullapalli
How do you get the benefits of SAP HANA while avoiding the risks? There are several drawbacks to the existing ERP database systems preceding…
February32022
jueves 10 de febrero 2022 : 5 formas de mitigar los riesgos de accesos críticos y los conflictos de SOD
¿Cómo se mitigan los riesgos con el acceso críticos y los conflictos de SOD? La mitigación de…