Cybersecurity Resources
Prototype Pollution Vulnerability (Part 2)
JavaScript is built around Prototypes, which are like blueprints for objects. Prototype…
Prototype Pollution Vulnerability (Part 1)
JavaScript is built around Prototypes, which are like blueprints for objects. Prototype…
Implementing Attribute-Based Access Control (‘ABAC’) using SailPoint Dynamic Roles
SailPoint’s Dynamic Role feature provides an excellent mechanism to implement ABAC, which…
How to manage identities and access in SAP?
Explore the key differences between SAP IdM & Cloud Identity Services and…
Pros and Cons of undertaking SoD remediation before or as part of SAP S/4HANA transformation
As companies move from SAP ECC to SAP S/4HANA, integrating SoD into…
Business case for including SAP in SOC
Monitoring SAP as part of SOC operations is essential for maintaining a…
Multinational Real Estate Organization
Our client is a Singaporean multinational real estate operating organization. The organization…
A Fintech Company headquartered in Singapore
Our client is a fintech company headquartered in Singapore. The company was…
Leading Logistics company with Global presence
Our client is a leading logistics company with worldwide presence. Hexadius was…
Regional Semiconductor Company
Our client is headquartered in Singapore, with production facilities located in ASEAN…
Large Utility Company in Singapore
The Company was using multiple independent SAP instances and wanted to implement…
Property Company in Singapore
Our client multi-national businesses across asset classes such as residential, hospitality, retail,…