ANalyze your System Security With XAMS

Your Contact

Marc Spitzer
Cybersecurity & Security Monitoring

SAP Security Check in Detail

Most of the corporate information of value is managed in SAP systems. This involves financial data, human capital and/or know-how. A comprehensive system check reveals any weaknesses in the protection of this data, and enables you to efficiently increase system security.

Our consultants carry out a security check on your SAP systems and identify potential weak points in your SAP security concept based on best practice recommendations for security settings. The analysis is carried out using the Xiting Authorizations Management Suite (XAMS) and includes the following main topics.

  • System settings (parameters, logging, transportation)
  • Documents (comparison of target and actual status of the operational concepts)
  • Roles (technical compliance, professional compliance)
  • Authorizations (administration of jobs, users, transports, systems)
  • Users (profile assignment, user types, critical authorizations, login activities)

The results of the analysis are documented and prepared as a report. The full assessment of system security takes place in the context of a concluding customer presentation with a management summary.

Are you interested in this service?

Contact us for a non-binding offer!

More Services offered by Xiting

Get to know our SAP authorization services with the Xiting Authorizations Management Suite.

XAMS Implementation and Training

Through targeted training, we enable your employees to continuously improve their skills and make processes in your company more efficient.

SAP Security Monitoring and ICS

Our consultants implement an Internal Control System (ICS) and enable a full monitoring and central checking of security specifications in SAP.


Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now