Blog
Stay Informed
Receive our latest blogs directly in your inbox
How to manage identities and access in SAP?
Explore the key differences between SAP IdM & Cloud Identity Services and…
Pros and Cons of undertaking SoD remediation before or as part of SAP S/4HANA transformation
As companies move from SAP ECC to SAP S/4HANA, integrating SoD into…
Business case for including SAP in SOC
Monitoring SAP as part of SOC operations is essential for maintaining a…
Best practices for SAP SoD management using SailPoint
Hexadius shares the best practices for managing unique requirements related to SoD…
SAP Role Redesign and S/4 HANA Transformation
One of the questions, which often comes up during SAP S/4 HANA…
Reflected XSS (CVE-2023-4189)
Cross Site Scripting (XSS) refers to when arbitrary JavaScript code could be…
Blind SQL Injection (CVE-2023-4188)
Structured Query Language (SQL) is a language used to interact with databases,…
Why VAPT is Essential for Your Organization’s Security
In today’s digital landscape, cybersecurity threats are becoming increasingly sophisticated.
My reflections on SailPoint Navigate events over the years
As a member of the identity security community, the significance of events…