Support  |  1-800-620-4210  |  
Home » Webinar videos
 

Join SWUG Group

Security Weaver has a Live Webinar every week. Join our LinkedIn user goup to know about our upcoming webinars or to watch our previous webinars.

Image

January 20th, 2022 - 6 Critical SAP User Actions to Watch For  by Issac Kimmel

Discuss six specific use cases involving SAP critical user actions, why they are important, and how to solve these problems through automation.

Watch Full Video
Image

January 13th, 2022 - What is the fastest way to handle your SAP authorization errors? by  Miguel Hernández Azpeitia

Learn the benefits and shortcomings of SU53 and how automation can resolve authorization errors more quickly, simplify the support process, and keep end-users informed. 

Watch Full Video
Image

December 09th, 2021 - Did You Stop Before SAP Security Became Efficient? by Devin McLaughlin

Learn processes and tools that can help you get the most from your security investments and ultimately save you money while simultaneously improving your SAP security.

Watch Full Video
Image

December 02nd, 2021 - Key Ways to Streamline Your SAP Access Certification by Kapish Rathi

Maintaining the right access in your SAP environment is a challenge. Recertification can disrupt busy managers and IT staff. To minimize the time spent by managers and role owners on compliance activities, security administrators must provide managers and role owners with relevant user data so they can make rapid and informed decisions.

Watch Full Video
Image

November 18th, 2021 - Efficient & Continuous SoD Mitigations by Asokkumar Christian and Ashish Sabharwal

By automatically finding and quantifying the financial risk of every suspicious business transaction in your SAP environment, risks can be prioritized, assigned to the right owner, and addressed most efficiently.

Watch Full Video
Image

November 11th, 2021 - Are You Getting The Most From Automated Emergency Access for SAP? by Diane Reinsma

What do your auditors require of your approval process for granting sensitive access? How quickly do users expect to get sensitive access? Do you need to use sensitive access in order to mitigate SoD conflicts?

Watch Full Video

Page  1 2 3 >  Last ›