Blogs
October292020
Webinar November 5th: Hassle-Free Mitigation in SOD Monitoring
The proper controls and mitigations can provide exceptional control over your SAP security landscape without the typical inconveniences. Join Asok Christian and Ashish Sabharwal as…
October232020
Webinar October 29th: Automating Role Redesign: The Future is Here!
Poorly designed roles in your SAP instances will eventually require a role redesign project, despite the pain and challenges involved. In the past, efficient and…
October62020
Webinar October 22nd, 2020: What You Need to Know About SAP HANA Part 2: Getting Technical
In a follow-up to last week’s webinar, “What You Need to Know About SAP HANA,” this week we will dive deeper into SAP HANA…
October62020
Webinar October 15th, 2020: What You Need to Know about SAP HANA
With SAP HANA, you get meaningful insights into your corporate data while there is still time to take meaningful action. In our upcoming webinar, Anand…
October42020
Webinar October 8th, 2020: Key Differences Between SAP ECC and S/4HANA Security
There are some significant differences in how to approach security in ECC and S/4HANA, especially when it comes to HANA DB and Fiori. Do…
September242020
UKISUG ACS Online Event 2020
Join Security Weaver at the UKISUG ACS Online Event: Tuesday, September 29th, 2020 Special guest speakers include: Gerald West, Serco | How to Drive Value from…