How to Find the Right Strategy for Access Control Management

The reason why I'm bringing up this topic is that we see some fundamental evolution in the area of business applications. When you go back a couple of years, many organizations have one sort of main supplier, specifically SAP, specifically over here in Europe, many, many businesses built sort of every single business application landscape on S and P. However, a lot of things have changed. We already 20 years ago started seeing certain applications shifting to the cloud, take, which was one of his first today called SAS services for the CRM space. And over the past two years, we've seen more and more of these services such as Workday and many otters. And also SAP has acquired a couple of solutions, which don't run into a traditional architecture model anymore. Plus shifting to Esperanza, which also is a step forward. So what has changed is that we have more solutions for business applications for more windows running, more heterogeneous deployment.
And that means that the traditional way of handling access controls of managing segregation of duties and all that stuff around these applications needs to be reconsidered and suited logic of saying, oh, I go for SAP access control a one-off the sort of direct competitors. Then it's a question of which needs to be from my perspective, reconsider regarding the answer you give, because once you need a sourcing which supports business applications cross the entire range of business application, you will have your, or you're having now and you will have in the future. So, and this looks different because it's not only SAP is not only the traditional R three about environment. It's a different world. You need to serve. And Darrell answers their answers from SAP. Their answers from vendors. What I believe is really important and critical today is to think beyond the traditional perspective who had making these decisions.
This is not about going for other vendors of that vendor or that vendor. It's about understanding that the problem is changing the way you need to handle your business applications changing because you have more of these it's more heterogeneous. And so you need tools that support all of these. This is application in an adequate manner, and I do also believe strongly tools that integrate well with identity and access management and access control beyond your business applications. As I've sat there, it's not as simple and single answer on what to do exactly, but it's reset search by KuppingerCole for instance, or leadership Columbus, a buddy X control two is for SAP environments and other stuff, which might give you some additional guidance in any way before you make your decisions step back and think about, does my application landscape look like it used to look and will it look the same or will it be fairly different? And then before you invest, decide on what is what you really need, what are the requirements for the future? You need an access control for all your business applications.

Video Links

Stay Connected

KuppingerCole on social media

Related Videos

Webinar Recording

Evolving Identity and Access Management for the Digital Era

Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and explain why and how IAM needs to change to support modern app development, regulatory compliance,…


Continual Access Control, Policies and Zero Trust

Trust no one, always verify. We know that Zero Trust phrase already. But this principle is rather abstract - how and where exactly should we do that? Martin sits down with Jackson Shaw, Chief Strategy Officer at Clear Skye to discuss one very important part of Zero Trust: Identity and…

Analyst Chat

Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity

Another year gone already! It's time to take a look back at 2022. Martin Kuppinger and Matthias talk about what happened in the past year and identify top trends in IAM and Cybersecurity. They go beyond technology but also look at processes and business models. By this, they also…

Event Recording

The Future of Access Management: The Role of Contextual Intelligence, Verifiable Credentials, Decentralized Identity and Beyond

Event Recording

The Killer Credential - Spotting Verifiable Credentials That Are Absolute Must-Haves for Every Party in an Ecosystem

Digital identity has already changed the world in positive ways over the years, and yet many of our security and privacy aims are at risk and under more pressure than ever. Building new ecosystems is very difficult. If the future is full of wallets, as we’ve heard, what will –…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00