Find out more about the current security level of your IT landscape!

itesys Logo
elefant für die seite sap security & compliance

SAP Security & Compliance
Preventive. Intelligent. Resilient.

Seamless SAP security at the highest level, From concept to operation.

SAP Security Management: complete security

SAP landscapes are constantly changing. At first glance, the systems seem secure, but if you look at them in more detail, you will often find small security gaps that can cause major damage to SAP security. Efficiently operating modern SAP system landscapes and maintaining their security at the same time is a real challenge that shouldn’t be underestimated!

Be on the safe side with our SAP Security Check. We examine your systems, data and processes for security deficiencies, which we immediately rectify together, and establish a seamless SAP security concept. Your systems are protected with our "SAP Security Wall”.

To ensure that this remains the case, the updates that SAP regularly offers should also be installed promptly, and your SAP system should always be kept up to date. We take care of your SAP landscape maintenance and install patches and service packs so that your SAP infrastructure remains secure and efficient without disrupting SAP operations.

What exactly is SAP Security & Compliance about?

SAP Authorisations

Role-based SAP authorisation concepts control access to data and functions for performing activities, both on-premise and in the cloud.

User Lifecycle Management

SAP Identity Management (IdM) and Cloud Identity Services (CIS): management and maintenance of SAP users and authorisations for the entire period in which an employee works at your company.

SAP Single Sign-On (SSO)

The Single Sign-On uses a single log-in to authenticate SAP users and authorises their central access to all networked SAP and non-SAP applications. It ensures secure system access and an end-to-end encrypted data transfer.

Privileged System Access

The itesys Firefighter controls and monitors additional, time-limited SAP authorisations for the entire SAP and non-SAP system landscape and automatically resets them.

SAP Solution Manager

We build your SAP Security Wall using tools from SolMan. These include, among others, the Early Watch Alert (EWA), System Recommendations, Security Self Service, Configuration Validation and Code Vulnerability Analysis.

SAP Security Monitoring

SAP security monitoring To avoid vulnerabilities from the start, our proactive SAP Monitoring protects your systems.

SAP IDM QuizCheck your security level

With our SAP IdM quiz you will find out everything about the current security level of your IT landscape.

SAP Authorisation concept - Who is permitted to do what?

The worst-case scenario is not always an outside attack. Critical data is much more often accessed due to faulty authorisations or during transmission between systems.

The secure solution: A dynamic SAP Authorisation concept. We think about access rights from the start for every SAP project, no matter whether it concerns a new SAP system (greenfield), adjustments (brownfield) or the (partial) expansion of your SAP system landscape.

Our SAP Security specialists support you based on their many years of experience and best practices. In workshops, they model the authorisations for your processes and workflows together with you and use them to create a comprehensive authorisation concept that is compliant and audit-ready.

Manage SAP authorisations securely from now on:

  • SAP Authorization concept

  • SAP Security experts

  • many years of project experience

  • compliant and audit-ready

  • build your SAP Security Wall

SAP Identity Management - easily automate access

Onboarding and offboarding new employees, changes in tasks or setting up a substitute are just a few examples of situations that require quick adjustments to SAP authorisations. Implemented in a compliant manner, SAP Identity Management (IdM) allows you to manage all SAP user identities and their authorisations centrally and in a tamper-proof manner. A rule and role-based approval workflow regulates the creation of user accounts with their authorisations. Throughout the entire user life cycle, it is ensured that user identities can only use the systems and functions that they actually need.

Your advantages: Security risks are minimised and your security hardening is facilitated – all, incidentally, while you are complying with reporting and audit requirements through transparency on access and changes to data. Our experienced SAP Identity Management specialists accompany you from the conceptual planning to the implementation of your SAP Identity Management system. Better now than later!

Automate user management with immediate effect:

  • SAP Identity Management (IdM)

  • SAP IdM expert know-how

  • Manage user identities centrally and in a tamper-proof manner

  • Meet reporting and audit requirements

Our Webinars:SAP Security & Compliance

We offer free webinars on various topics related to SAP Security & Compliance on an ongoing basis (in German). Maybe there's some webinar you could benefit from? Check it out now!

What’s the benefit? SAP Security at the highest level

Benefit from the highest level of security with our SAP Security services and enjoy...

… compliance

Our SAP security experts develop and implement a resilient SAP security concept together with you that is tailor-made for your SAP compliance strategy.

… audit capability

Be prepared for the next audit. We will help you to be informed about the critical processes and potential for improvement, automatically document all relevant SAP areas and increase your SAP security.

… automated monitoring

Equipped with special SAP sensors, our SAP Security Monitoring surveys your system‘s changeability, security parameters, authorisations and much more. SAP system monitoring immediately reports critical incidents and possible faults so that you can take direct countermeasures.

More abo SAP System Monitoring

… 24/7 support and managed services

Following your security project, we are happy to take full responsibility for your SAP security management and the secure operation of your SAP environment – on premise, in the cloud or as a hybrid system, as part of outtasking or outsourcing. For any questions about SAP security management, you can reach out to our SAP Expert Desk around the clock.

More about SAP Basis Support

itesys Firefighter - trouble-free special provisions

Have you ever expanded the access rights of an employee as part of a substitution arrangement and then forgot to withdraw them? Our itesys Firefighter prevents such mishaps. It also monitors time-limited and privileged SAP authorisations and automatically resets them at the end of their time spans. Each executed transaction is logged and thus remains traceable.

SAP Identity Management users can simply integrate the Firefighter into their processes. SAP users without their own IdM benefit from itesys IdM with Firefighter as a service. Everything is possible.

Trouble-free system access starting now:

  • privileged SAP authorisations

  • time-limited

  • automated and logged

  • SAP Security

SAP Single Sign-On (SSO) – happy users, SAP security guaranteed

One single log-in for central access to all systems? SAP Single Sign-On (SSO) makes it possible. SSO gives your team a positive user experience, boosts productivity and simplifies user authentication. SSO also offers two big advantages for your security hardening: secure system access and encrypted data transfer across the network.

In addition, this lightens your SAP team’s workload, since passwords need to be recovered and accounts unlocked much less often. Increase the efficiency of everyday work and create user friendliness.

We will set up the right Single Sign-On solution for you. Together, we will evaluate the right scenario for your applications on-premise, in the cloud and in hybrid environments and define compliant guidelines for it. It’s so simple! You can directly increase productivity and secure access to critical data at the same time.

Use Single Sign-On now:

  • just one log-in

  • secure system access

  • compliant

  • higher productivity

Convinced?Then book a free consultation now.