Expand your GRC Controls to Cover all Systems – how to Make SAP GRC Work in a Heterogeneous World
- LANGUAGE: English DATE: Wednesday, December 12, 2012 TIME: 4pm CET, 10am EST, 7am PST
Having an integrated GRC architecture, i.e. real Enterprise GRC instead of point solutions, provides massive benefits to organizations. Real Enterprise GRC, beyond GRC for specific environments or only for the business side, requires a tight integration of some solutions. While SAP GRC provides a strong offering for the SAP ecosystem, extending it to the heterogeneous world requires additional solutions. A complete picture for Enterprise GRC covers different needs. While SAP GRC is a logical cornerstone for organizations with a large SAP infrastructure in place, this still leaves the need for covering the rest of the ecosystem and the GRC requirements which aren’t fully covered by SAP GRC.
Martin Kuppinger of KuppingerCole will provide an overview on different approaches found in the market to either extend SAP GRC or to use other approaches for full control in heterogeneous environments. He will outline an architecture for a comprehensive Enterprise GRC approach in environments with SAP infrastructure deployed, centered around SAP GRC but adding additional components to cover what is missing.
Marco Venuti of CrossIdeas will then demonstrate, based on best practices of customers, how organizations can extend their SAP GRC in practice to manage access controls and implement access governance, including SoD controls, in heterogeneous environments.
Founded in 2011, CrossIdeas is a leading player of Identity Governance Solutions, enabling organizations to achieve their Compliance, Audit and Access Risk Management objectives. Fortune 500 companies run IDEAS, CrossIdeas' Identity Governance platform, to harmoniously manage people, applications and access entitlements. CrossIdeas is headquartered in Rome and can be reached at www.crossideas.com
Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security.
Digital Finance World (DFW) on March 01-02, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.