Information

Date:
13.05. - 16.05.2014
Location:
Munich, Germany
Registration fee:
€1980.00
€  $ 






Partner details

SAP Deutschland AG & Co.KG     SAP Deutschland AG & Co.KG
Hasso-Plattner-Ring 7 • 69190 Walldorf
Phone: +49 6227 74 74 74
Fax: +49 6227 75 75 75
E-Mail: info.germany@sap.com
Internet: http://sap.com

SAP NetWeaver Identity Management reduces the complexity and cost associated with managing permissions and passwords. The software helps you to integrate business processes and is designed to work not only with your SAP applications but with all of the systems, instances, and applications in a typical, heterogeneous and often global IT environment. SAP's identity management solution is also designed to work as an integrated component of your strategic application platform and to support an enterprise service oriented architecture (enterprise SOA).

SAP NetWeaver Identity Management features and functions:

  • Enable you to manage permissions across heterogeneous environments based on the business role of each user – simplifying administration and preventing unplanned access
  • Provide you with integrated management tools, including a powerful data synchronization and self-service interface that save time, reduce administration costs, and prevent interruptions to user productivity
  • Support uninterrupted business process flow across systems with enterprise SOA
  • Complement existing user management and administration technologies in the SAP Business Suite and SAP NetWeaver

SAP NetWeaver Identity Management is role-based, so it knows what systems each user should have access to in order to do their work. If a user changes position, SAP NetWeaver Identity Management can change those access rights accordingly. Administrators set up the roles, and the software takes care of synchronizing permissions across different systems and directories.

Self-service is another important feature of SAP NetWeaver Identity Management. It not only reduces the administrative and support cost associated with IT support, but it can also reduce the user's frustration level. It provides users with one place to go to manage their information and take care of tasks, such as resetting a password.

All of the SAP NetWeaver Identity Management functionality is delivered as a component of an integrated, open business process platform – so access and identity information can be correctly linked with systems, Web services, and business processes. And whether the systems are SAP systems or not, SAP NetWeaver Identity Management makes sure you have uninterrupted flow for your business processes across a heterogeneous landscape.


Sponsored events

Webinar: Identity Federation: Essential Building Block for a Winning Cloud Strategy in your SAP Environment 12.10.2010 , 2pm CEST, 12pm UTC
In this webinar, Martin Kuppinger will give an overview on the current and future role of identity federation in hybrid cloud infrastructures with a focus on SAP environments. He will be followed by Keith Grayson from SAP, who will be talking on SAP user management optimization through SAML 2.0.


Congress: European Identity Conference 2010 04.05. - 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.


Congress: CLOUD 2010 04.05. - 07.05.2010 , Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype.


Congress: Mittelstandsdialog Informationssicherheit 04.05. - 07.05.2010 , München
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.


Congress: European Identity Conference 2009 05.05. - 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.


Congress: 2nd European Identity Conference 22.04. - 25.04.2008 , Munich
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.


Reports

Executive View: SAP HANA for Big Data - 70994 04.03.2014 Mike Small €190.00
Smart information is big data analyzed to provide answers to business questions. SAP HANA is the new runtime backend for SAP Enterprise Applications. It provides high performance database through “in-memory” processing and storage and is especially suited for instant analytics on the data managed by these applications.  It also includes integration with other sources of Big Data such as Hadoop...

Order the report
Executive View: SAP HANA Security - 70810 19.02.2014 Sachar Paulus €190.00
SAP HANA is the new runtime backend for SAP Enterprise Applications, and is especially suited for instant analytics on the data managed by the applications. This Executive View presents an overview on the security of SAP HANA and gives recommendations on how to address potential weaknesses...

Order the report
Product Report: SAP GRC Access Control 10 - 70737 10.09.2013 Martin Kuppinger €295.00
The standard solution for managing Access and the related risks in SAP environments. Implement SoD controls, keep privileged users under control, and know what could happen in your SAP systems.

Order the report
Leadership Compass: Access Governance - 70735 08.03.2013 Martin Kuppinger €1295.00
Access Governance is as of now the fastest growing market segment in the broader IAM (Identity and Access Management) market. Some vendors also use the term IAG (Identity and Access Governance). Another recent term is Access Intelligence (or Identity and Access Intelligence). While a few vendors try to establish this as a new market segment, we understand enhanced analytical capabilities just as an important feature within Access Governance. Few years ago, there have been only a handful of vendors in the Access Governance market. The large players acquired some vendors, others entered the market, and some of the Identity Provisioning vendors developed Access Governance capabilities by themselves. Thus, there are close to 20 vendors in this market segment as of now. This Leadership Compass provides an overview and analysis of the Access Governance market segment. Access Governance nowadays goes well beyond access recertification, role management and analytics. Strong...

Order the report
Leadership Compass: Identity Provisioning - 70151 15.10.2012 Martin Kuppinger €1295.00
Identity Provisioning is still one of the core segments of the overall IAM market. Thus it comes to no surprise that this segment is more crowded by vendors than virtually all the other IAM market segments. This Leadership Compass provides an overview and analysis of the Identity Provisioning market segments. It shows that there are several established vendors with mature solutions, but also some very interesting smaller or regional vendors with a good potential for growth and for delivering what customers require. Picking solutions always requires a thorough analysis of customer requirements and a comparison with product features. Leadership does not always mean that a product is the best fit. However, this Leadership Compass will help identifying those vendors customers should have a closer look at.

Order the report
Product Report: SAP Business Objects GRC Access Control 15.04.2010 Sachar Paulus €95.00
The SAP BusinessObjects GRC Access Control (in short AC) solution is a powerful set of tools that help to automate risk analysis and mitigation for user and authorization management in SAP and non-SAP systems. It is a strong product for the SAP ABAP world, and is able to cover non-SAP systems using real-time adapters from Greenlight. It covers a substantial subset of the overall GRC requirements – it provides a leading-edge solution for SAP environments, which are at the centre of many IT environments and is able to perform as a realtime cross-platform solution. The core of the product suite - Risk Analysis and Remediation (RAR) - is the most valuable part and helps effectively to reduce risks in ABAP-based SAP systems - and correspondingly in the implemented business processes - mostly by the set of predefined risks delivered with the product. RAR also supports non-SAP systems in real time due to the risk definition at business process level and the mapping to...

Order the report

© 2014 KuppingerCole