Consulting
Authorization Management
License Analysis in S/4HANA
Accelerated S/4HANA Migration
Simplified SAP Fiori Administration
Testsimulation of Roles and Authorizations
Risk Mimization during Go-Live
Identity and Access Management
Identity Management
BTP Security & ID Lifecycle Management
Single Sign-On
Cybersecurity Management
SAP Vulnerability & Compliance Monitoring (ICS)
Real-Time SAP Security Monitoring & Threat Detection
Governance, Risk & Compliance
Emergency Access Management (EAM)
Cross-System Risk Analysis and SoD
Next-Level Ruleset Management
Identity Consolidation
Products
Xiting Authorizations Management Suite
Xiting Security Platform
Xiting Content Portal
Xiting Central Workflows
Resources
Events
Video Channel
E-Books
Success Stories
References
About Us
Engagement
Career
About Us
Contact
For Partners
Consulting
Authorization Management
License Analysis in S/4HANA
Accelerated S/4HANA Migration
Simplified SAP Fiori Administration
Testsimulation of Roles and Authorizations
Risk Mimization during Go-Live
Identity and Access Management
Identity Management
BTP Security & ID Lifecycle Management
Single Sign-On
Cybersecurity Management
SAP Vulnerability & Compliance Monitoring (ICS)
Real-Time SAP Security Monitoring & Threat Detection
Governance, Risk & Compliance
Emergency Access Management (EAM)
Cross-System Risk Analysis and SoD
Next-Level Ruleset Management
Identity Consolidation
Products
Xiting Authorizations Management Suite
Xiting Security Platform
Xiting Content Portal
Xiting Central Workflows
Resources
Events
Video Channel
E-Books
Success Stories
References
About Us
Engagement
Career
About Us
Contact
For Partners
Become a Partner
Become a Partner
Author:
Johannes Kastner
Blog
The advantages of optimizing SU24
15. February 2017
SAP Security
,
XAMS
Johannes Kastner