Episodes

  • SAP Security Hardening - Implement Security by Design and Zero Trust
    Jun 1 2022

    In the age of cybercrime and the ever-evolving loopholes, it is of utmost importance to implement a zero-trust strategy and security by design to effectively harden any IT system, including SAP. Xiting, as one of the world-leading solution providers for SAP Security, emphasizes the following four core factors:

    • Security by Design
    • Monitoring and responding to unauthorized access
    • Realtime notifications and escalations
    • Centralized security audit and compliance reporting
    Show More Show Less
    23 mins
  • SAP Identity Provisoning Service – Identity Provisioning in the Cloud
    Jun 1 2022

    Many companies are looking for solutions and best practices to integrate cloud applications into their existing IT infrastructure, meaning users could not only have to access local applications, but also existing cloud applications. At best, a single identity is used for both local and cloud applications.

    This blog focuses on the SAP Cloud Identity Provisioning Service and presents its main functions, the possibility of integrating it in a hybrid scenario as well as the advantages and disadvantages of the cloud service.

    Before digging into Identity provisioning, it is essential to understand the concept of IAM. Identity and Access Management (IAM) is simply a way to authenticate and grant access to particular data, systems, or applications in an organization. An important branch of IAM is known as identity provisioning. It takes care of the user lifecycle from hire to retire providing and managing user accounts for your business end-users.

    Show More Show Less
    13 mins