Xiting virtual event dedicated to SAP Security

Bring your SAP security to the next level within several weeks with our educational webinars. Meet our experts in their live sessions and ask them what you’ve always wanted to know.

Agenda

Registration

Convert to my timezone

TitleDateStart TimeDurationRegister
Top Pain Points with Fiori Authorizations In the course of the mandatory migration from SAP ERP (ECC) to SAP S/4HANA for most SAP customers by the 2027 deadline, many companies have to migrate to SAP S/4HANA. It has recently been announced that the use of SAP Fiori apps for SAP S/4HANA is now mandatory rather than optional. Working with SAP Fiori is therefore becoming increasingly important. It is no longer sufficient to work in transaction PFCG alone, as SAP Fiori catalogs, areas or pages must be created and many other Fiori-based components must also be taken into account.

The associated authorization work is mostly new territory for many authorization teams and at the same time also fraught with a few hurdles. This webinar presents and solves these hurdles and pitfalls as key topics. It will show how, during a migration to SAP S/4HANA or when using the new SAP software solution S/4HANA, the SAP Fiori user interface can be harmonized with the company processes in terms of authorizations and how a central, intuitive user interface can be authorized for the end users. The goal is to present practical use cases of how an authorization concept based on SAP Fiori can be implemented and maintained.

Webinar takeaways:

- Protected Go-Live in authorization projects using SAP Fiori Launchpad
- Creation of consistent role transports including SAP Fiori objects
- Translation of customer-specific SAP Fiori applications or spaces / pages
- Mass maintenance of SAP Fiori Spaces / Pages
- Differentiation of authorizations within a SAP Fiori app using transaction SU24 variants

Speaker: Alessandro Banzer
9.2.202319:00 CET1 hour
Register
Digitalize and Automate Role Requests and Password Self-service with XCW In this webinar you will get a short overview of the 'Xiting Central Workflows' (XCW) tool. XCW provides you with standardized workflows that, in our experience, can be used to map the most important use cases in SAP user administration.

You will then be shown roles from the users’ and the approver’s perspective. In a live demo, roles will be requested through the Fiori interface - once as a self-service and once for another user.

Our customer Mr. Helmut Österle will explain how Xiting Central Workflows facilitates the daily work of Uhlmann Pac-Systems GmbH & Co.KG and emphasize the practical advantages of this tool.

Webinar takeaways:
• Understanding the added value of the XCW tool
• Insight into the Fiori interfaces and the password self-service

Speaker: Valerie Neunheuser & Helmut Österle
16.2.202319:00 CET1 hour
Register
Centralized Security Monitoring: How to get a quick overview to protect your systems Attacks on SAP ERP systems are on the rise but are often not detected at all or only too late. How can such attacks be detected automatically, promptly and across system boundaries in order to initiate appropriate countermeasures in good time? The solution to this is offered by SIEM systems, which monitor software logs in real time and trigger an alarm when critical events occur, such as the assignment of critical authorization profiles. However, these systems are often not connected to SAP systems due to technical challenges. On the one hand, this presentation will show how you can get a system-wide overview of your current security configuration at the push of a button so that you can invest your time in securing your systems rather than analyzing them. We will also present the new standardized interface of the Xiting Authorizations Management Suite, which enables a connection between SAP systems and your SIEM system.

Webinar takeaways:
• How to get a security-related overview of your SAP landscape
• Benefits of a security monitoring tool within your SAP systems
• How to avoid pain points of security monitoring projects

Speaker: Andre Tenbuß
23.2.202319:00 CET1 hour
Register
Compliance Matters: Are rulesets a waste of time or an enabler for your organization? Almost every company inevitably has to deal with its own risk environment and risk profile. However, what does this mean in terms of SAP authorizations? Can rulesets offer real added value? Can any company build it by itself or are there stumbling blocks and, in the worst case, does the ruleset become an annoying to-do? These questions will be discussed in this web session and illustrated with practical case studies.

Webinar takeaways:
• What is the real benefit of a ruleset
• How to set up a ruleset correctly
• What does a SAP S/4HANA implementation mean for my ruleset

Speaker: Erik Trouillet
2.3.202317:00 CET1 hour
Register
Purpose and Necessity of the SAP Cloud Identity Services SAP Cloud Identity Services (SCI) is a comprehensive solution for managing user identities and access control in the SAP cloud. In this webinar, we will discuss key features of the service and its benefits for businesses.

Since more and more SaaS apps are being onboarded it's getting harder to manage accounts manually or log in using passwords. The increased usage of the many SAP cloud solutions brings the need for centralized user authentication and provisioning throughout the whole hybrid SAP landscape. Sometimes customers just need to solve some basic authentication capabilities. On the other hand, it depends on the number of cloud solutions, requirements for harmonized user data and ID lifecycle, and what legal or compliance requirements must be taken into consideration.

With the SAP Cloud Identity Services, standards for authentication and user administration have been established as core services of the BTP. Identity Authentication (IAS) and Identity Provisioning (IPS) together with the Identity Directory (IdDS) represent elementary building blocks of an IAM for SAP cloud applications. They aim to provide one aggregated user-provisioning and authentication endpoint for cloud solutions from SAP. By supporting common industry standards like SCIM, SAML 2.0, and OAuth/OpenID Connect, many integration options into existing IAM architectures are possible

Overall, the webinar will provide attendees with a detailed understanding of how SAP Cloud Identity Services can help them better secure and manage their user identities and authentication processes in the hybrid SAP environment.

Key takeaways from the webinar will include:
• An overview of SAP Cloud Identity Services and its capabilities
• How the service can help improve security and compliance for businesses
• How to use the service to manage user identities and access control for cloud-based applications
• Real-world examples of how businesses have successfully implemented SAP Cloud Identity Services

Speaker: Carsten Olt
9.3.202319:00 CET1 hour
Register
Challenges in Securing Your Hybrid Landscapes In the age of cybersecurity and the rapid increase in new applications, the implementation of a holistic security architecture is essential.

The use of cloud applications creates hybrid landscapes that present many customers with new challenges. Not only do these cloud solutions have to be secured and documented, but new interfaces between cloud and on-premise solutions have to be implemented properly.

Webinar takeaways:
• Insight into the complexity of hybrid landscapes
• Identity access governance in complex landscapes
• Tools that are available as solutions

Speaker: Alessandro Banzer
16.3.202319:00 CET1 hour
Register

Panelists

Our expert panel consists of Xiting’s most knowledgable SAP Security Consultants for each of the presented topics.

Alessandro Banzer

CEO United States
SAP Cloud IAG and SAP Fiori

Valerie Neunheuser

Xitinig Central Workflows and SAP IDM

Andre Tenbuß

Security Monitoring and SIEM Integration

Erik Trouillet

Governance, Risk and Compliance

Carsten Olt

Secure Authentication and SAP Single Sign-On

Attend our Kick-off Live event on LinkedIn

February 7, 2023 12:00 EST / 6:00 PM CET

In this session, we will explore the top five use cases for SAP Cloud Identity Access Governance (IAG) and how it can help organizations to improve security and compliance while simplifying access management. It will include a live demonstration and Q&A session.

Contact

Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 9888 155
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]
Contact
Webinars

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now