Blog

Stay Informed

Receive our latest blogs directly in your inbox

    How to manage identities and access in SAP?

    How to manage identities and access in SAP?

    Explore the key differences between SAP IdM & Cloud Identity Services and…

    SoD

    Pros and Cons of undertaking SoD remediation before or as part of SAP S/4HANA transformation

    As companies move from SAP ECC to SAP S/4HANA, integrating SoD into…

    Business case for including SAP in SOC

    Business case for including SAP in SOC

    Monitoring SAP as part of SOC operations is essential for maintaining a…

    Best practices for SAP SoD management using SailPoint

    Best practices for SAP SoD management using SailPoint

    Hexadius shares the best practices for managing unique requirements related to SoD…

    SAP Role Redesign and S/4 HANA Transformation

    One of the questions, which often comes up during SAP S/4 HANA…

    Reflected XSS (CVE-2023-4189)

    Cross Site Scripting (XSS) refers to when arbitrary JavaScript code could be…

    Blind SQL injection

    Blind SQL Injection (CVE-2023-4188)

    Structured Query Language (SQL) is a language used to interact with databases,…

    Why VAPT is Essential for Your Organization’s Security

    In today’s digital landscape, cybersecurity threats are becoming increasingly sophisticated.

    My reflections on SailPoint Navigate events over the years

    As a member of the identity security community, the significance of events…

    12 Next