Cybersecurity Resources

Blog
Case Study
How to manage identities and access in SAP?

Prototype Pollution Vulnerability (Part 2)

JavaScript is built around Prototypes, which are like blueprints for objects. Prototype…

Prototype Pollution Vulnerability (Part 1)

JavaScript is built around Prototypes, which are like blueprints for objects. Prototype…

Implementing Attribute-Based Access Control (‘ABAC’) using SailPoint Dynamic Roles

SailPoint’s Dynamic Role feature provides an excellent mechanism to implement ABAC, which…

How to manage identities and access in SAP?

How to manage identities and access in SAP?

Explore the key differences between SAP IdM & Cloud Identity Services and…

SoD

Pros and Cons of undertaking SoD remediation before or as part of SAP S/4HANA transformation

As companies move from SAP ECC to SAP S/4HANA, integrating SoD into…

Business case for including SAP in SOC

Business case for including SAP in SOC

Monitoring SAP as part of SOC operations is essential for maintaining a…

Multinational Real Estate Organization

Our client is a Singaporean multinational real estate operating organization. The organization…

fintech company case study

A Fintech Company headquartered in Singapore

Our client is a fintech company headquartered in Singapore. The company was…

Leading Logistics company with Global presence

Our client is a leading logistics company with worldwide presence. Hexadius was…

Regional Semiconductor Company

Regional Semiconductor Company 

Our client is headquartered in Singapore, with production facilities located in ASEAN…

Large Utility Company in Singapore

The Company was using multiple independent SAP instances and wanted to implement…

Property Company in Singapore

Property Company in Singapore

Our client multi-national businesses across asset classes such as residential, hospitality, retail,…