Xiting Logo Color
  • English
  • German
Xiting Logo Color
  • Consulting
    • Authorization Management
      • License Analysis in S/4HANA
      • Accelerated S/4HANA Migration
      • Simplified SAP Fiori Administration
      • Testsimulation of Roles and Authorizations
      • Risk Mimization during Go-Live
    • Identity and Access Management
      • Identity Management
      • BTP Security & ID Lifecycle Management
      • Single Sign-On
    • Cybersecurity Management
      • SAP Vulnerability & Compliance Monitoring (ICS)
      • Real-Time SAP Security Monitoring & Threat Detection
    • Governance, Risk & Compliance
      • Emergency Access Management (EAM)
      • Cross-System Risk Analysis and SoD
      • Next-Level Ruleset Management
      • Identity Consolidation
  • Products
    • Xiting Authorizations Management Suite
    • Xiting Security Platform
    • Xiting Content Portal
    • Xiting Central Workflows
  • Resources
    • Blogs
    • Downloads
    • Video Channel
    • References
    • Success Stories
    • Events & Webinars
  • About Us
    • Engagement
    • Career
    • About Us
  • Consulting
    • Authorization Management
      • License Analysis in S/4HANA
      • Accelerated S/4HANA Migration
      • Simplified SAP Fiori Administration
      • Testsimulation of Roles and Authorizations
      • Risk Mimization during Go-Live
    • Identity and Access Management
      • Identity Management
      • BTP Security & ID Lifecycle Management
      • Single Sign-On
    • Cybersecurity Management
      • SAP Vulnerability & Compliance Monitoring (ICS)
      • Real-Time SAP Security Monitoring & Threat Detection
    • Governance, Risk & Compliance
      • Emergency Access Management (EAM)
      • Cross-System Risk Analysis and SoD
      • Next-Level Ruleset Management
      • Identity Consolidation
  • Products
    • Xiting Authorizations Management Suite
    • Xiting Security Platform
    • Xiting Content Portal
    • Xiting Central Workflows
  • Resources
    • Blogs
    • Downloads
    • Video Channel
    • References
    • Success Stories
    • Events & Webinars
  • About Us
    • Engagement
    • Career
    • About Us
Jobs

Category: SAP Security

Blog

Strengthening SAP Security in the Age of DORA: A Guide for Financial Entities

12. March 2024

SAP Security

Alessandro Banzer

Blog

The difference between S_PROGRAM and S_PROGNAM and the use of parameter transactions

23. January 2023

SAP Authorizations, SAP Security, XAMS

Steffen Lüken

Blog

Bulk Processing of Roles with Transaction PFCGMASSVAL

8. November 2022

SAP Authorizations, SAP Security, XAMS

Erwin Lachenmaier

Blog

Creation and use of a transaction SU24N proposal data variant (Part 2)

31. August 2022

SAP Authorizations, SAP S/4HANA, SAP Security

Alexander Sambill

Blog

The new transaction SU24N (Part 1)

26. August 2022

SAP Authorizations, SAP Security

Alexander Sambill

Blog

SAP Security Hardening – Implement Security by Design and Zero Trust

12. July 2022

Cybersecurity, SAP Security

Alessandro Banzer

Blog

SAP Certification: Tips to consider and Tricks to avoid

21. June 2022

News, SAP Security

Julius Bussche

Blog

Secure Authentication and SSO for SAP

30. March 2022

Cloud Security, SAP Security, SAP Single Sign-On

Carsten Olt

Blog

SAP Security Orchestration with Xiting’s Security Solutions

21. October 2021

Cloud Security, GRC, SAP Security

Alessandro Banzer

Blog

CMMC Compliance in SAP

24. August 2021

Cloud Security, GRC, SAP Security

Alessandro Banzer

Blog

Transaction SUPO: Promote authorization fields to organizational levels

24. July 2020

SAP Security

Alessandro Banzer

Blog

UI Logging of SAP GUI for Windows – Part 2 of 3

20. February 2019

SAP Security

Abdullah Alebrahem

Blog

Comparison of SAP Role Design Concepts

14. November 2017

SAP Security

Alessandro Banzer

Blog

SU24 Tips & Tricks – How to authorize menu navigation from application menus

30. June 2017

SAP Security

Julius Bussche

Blog

SU24 Tips & Tricks – How to authorize forward navigation from list reporting

8. June 2017

SAP Security

Julius Bussche

Blog

SU24 Tips & Tricks – How more authorization for an object is better than less

3. May 2017

SAP Security

Julius Bussche

Blog

Creation of roles based on user’s transactions history

18. April 2017

SAP Security

Teodor Tanev

Blog

SU24 Tips & Tricks – Fields you cannot maintain

14. April 2017

SAP Security

Julius Bussche

Blog

SU24 Tips & Tricks – Fields you should not maintain

7. April 2017

SAP Security

Julius Bussche

Blog

SU24 Tips & Tricks – Fields you should maintain

27. March 2017

SAP Security

Julius Bussche

Posts navigation

Older posts

Consulting

  • Authorization Management
  • Identity and Access Management
  • Cybersecurity Management
  • Governance, Risk & Compliance
  • Authorization Management
  • Identity and Access Management
  • Cybersecurity Management
  • Governance, Risk & Compliance

Resources

  • Blog
  • Webinars
  • Downloads
  • References
  • Success Stories
  • Events
  • Blog
  • Webinars
  • Downloads
  • References
  • Success Stories
  • Events

About Xiting

  • Engagement
  • Career
  • About Us
  • Contact
  • Engagement
  • Career
  • About Us
  • Contact
Linkedin Youtube Instagram X-twitter
  • Disclaimer
  • Privacy Policy
  • Disclaimer
  • Privacy Policy