Live Webinars

Here you will find all upcoming webinar dates, for which you can register for free via the respective link. You will then receive an email confirmation with your dial-in data.

Convert to my timezone

TitleDateStart TimeDurationRegister
SAP Fiori App Tracker - Identify your used and required Fiori Apps (SP18 Update EN) Do you want to identify the Fiori apps used in your system? Or is there a Fiori launch coming up? The SAP Fiori App Tracker can help you with this. It allows the unique identification of used / required Fiori apps in order to easily integrate them into your role concept.

Automatically identify necessary Fiori applications or revise your Fiori authorizations using the Xiting Authorizations Management Suite (XAMS). With the integrated app tracking and the simulation of backend roles, you can develop an audit-compliant authorization concept and conserve the resources of your specialist departments.

Your webinar takeaways:
- full transparency over used Fiori apps
- “Need-to-Know” principle for Fiori apps
- simplified integration of Fiori apps into your role concept

This webinar presents one of the three use cases available with the new XAMS release SP18.
15.6.202311:00 EDT1 hour
Integration of the Critical Authorizations Framework (CRAF) into PFCG (SP18 Update EN) With the CRAF integration in the PFCG, an authorization administrator can check directly when creating the role whether the requirements of the company are being met. When the profile of the role is generated, the set of rules variant stored in customizing is checked automatically. The test result provides a quick overview of whether there are risks in the role and which risks they are. Errors can thus be corrected immediately and exceptions mitigated.

Your webinar takeaways:

• Automatic checking of the set of rules directly during PFCG profile generation
• Customizing option for checking different set of rules variants at role level
• As a basis for the secure administration of your roles

This webinar presents one of the three use cases available with the new XAMS release SP18.
22.6.202311:00 EDT1 hour
Real-time threat detection with the Xiting SIEM Connector (SP18 Update EN) In this webinar you will learn how the Xiting SIEM Connector can support you with an integrated rule engine to automate the evaluation of log data in order to generate qualified alarms.

Who is the webinar aimed at?
• Persons responsible for SAP security
• SAP Administrators
• SAP System Managers

What is the focus of the webinar?
In this webinar we will use a few examples to show you how real-time attack detection works. You will also learn how to integrate the SIEM Connector into your existing SIEM landscape in order to meet legal requirements. In addition to providing theoretical content, we will demonstrate how it works directly in the system.

This webinar presents one of the three use cases available with the new XAMS release SP18.
29.6.202311:00 EDT1 hour

Topics of further
available webinars

  • Centralized Security Monitoring and Integration to SIEM
  • Security in SAP S/4HANA and SAP Fiori and their Impact on GRC/IAG
  • SAP GRC and IAG: How to analyze custom transactions in your ruleset
  • SAP Fiori Authorizations
    • What you need to know
    • Challenges and Solutions
    • Deep-Dive into debugging Fiori authorizations
    • Simplifying Fiori authorizations with automation tools
    • Best Practices for Spaces and Pages
    • Support Tools and Helpful Tools and Applications
    • Top Pain Points and Lessons Learned from Customer Projects
    • Overview of the SAP Fiori Central Launchpad service
  • S/4HANA Lessons Learned – best practice approach to migrating your security concept
  • Best Practice SAP Role Re-Design
  • Best Practice SAP Role Re-Design with Expert Tools
  • 5 Audit and GRC Trends that should be on your radar in 2019
  • How to simplify SAP Role administration – Business Level
  • SAP Note 1682316 – How to redesign RFC interface authorization risk-free using automation tools
  • Case Studies:
    • Learn how Daimler AG optimized roles of RFC and other technical users in SAP
    • RFC Redesign and RUAG AG
    • How to simplify the migration of authorizations to SAP S/4HANA

fill out this form to gain full access to our on-demand webinars


Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now