Expand your GRC Controls to Cover all Systems – how to Make SAP GRC Work in a Heterogeneous World
- LANGUAGE: English DATE: Wednesday, December 12, 2012 TIME: 4pm CET, 10am EST, 7am PST
Having an integrated GRC architecture, i.e. real Enterprise GRC instead of point solutions, provides massive benefits to organizations. Real Enterprise GRC, beyond GRC for specific environments or only for the business side, requires a tight integration of some solutions. While SAP GRC provides a strong offering for the SAP ecosystem, extending it to the heterogeneous world requires additional solutions. A complete picture for Enterprise GRC covers different needs. While SAP GRC is a logical cornerstone for organizations with a large SAP infrastructure in place, this still leaves the need for covering the rest of the ecosystem and the GRC requirements which aren’t fully covered by SAP GRC.
Martin Kuppinger of KuppingerCole will provide an overview on different approaches found in the market to either extend SAP GRC or to use other approaches for full control in heterogeneous environments. He will outline an architecture for a comprehensive Enterprise GRC approach in environments with SAP infrastructure deployed, centered around SAP GRC but adding additional components to cover what is missing.
Marco Venuti of CrossIdeas will then demonstrate, based on best practices of customers, how organizations can extend their SAP GRC in practice to manage access controls and implement access governance, including SoD controls, in heterogeneous environments.
Founded in 2011, CrossIdeas is a leading player of Identity Governance Solutions, enabling organizations to achieve their Compliance, Audit and Access Risk Management objectives. Fortune 500 companies run IDEAS, CrossIdeas' Identity Governance platform, to harmoniously manage people, applications and access entitlements. CrossIdeas is headquartered in Rome and can be reached at www.crossideas.com
Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.
Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.
Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.