skip to content

Blog

Stay Informed

Receive our latest blogs directly in your inbox

    How to manage identities and access in SAP?

    Prototype Pollution Vulnerability (Part 2)

    JavaScript is built around Prototypes, which are like blueprints for objects. Prototype…

    Prototype Pollution Vulnerability (Part 1)

    JavaScript is built around Prototypes, which are like blueprints for objects. Prototype…

    Implementing Attribute-Based Access Control (‘ABAC’) using SailPoint Dynamic Roles

    SailPoint’s Dynamic Role feature provides an excellent mechanism to implement ABAC, which…

    How to manage identities and access in SAP?

    How to manage identities and access in SAP?

    Explore the key differences between SAP IdM & Cloud Identity Services and…

    SoD

    Pros and Cons of undertaking SoD remediation before or as part of SAP S/4HANA transformation

    As companies move from SAP ECC to SAP S/4HANA, integrating SoD into…

    Business case for including SAP in SOC

    Business case for including SAP in SOC

    Monitoring SAP as part of SOC operations is essential for maintaining a…

    Best practices for SAP SoD management using SailPoint

    Best practices for SAP SoD management using SailPoint

    Hexadius shares the best practices for managing unique requirements related to SoD…

    SAP Role Redesign and S/4 HANA Transformation

    One of the questions, which often comes up during SAP S/4 HANA…

    Reflected XSS (CVE-2023-4189)

    Cross Site Scripting (XSS) refers to when arbitrary JavaScript code could be…