Technologies

We rely on proven and innovative technologies in equal measure!

Modern businesses face complex challenges, especially in the areas of IT governance, enterprise risk management, and compliance (GRC), where they must meet both legal and Country-specific IT security requirements. At ASCONSIT, we support you in designing and implementing a sustainable IT security strategy for your company by combining time-tested technologies with more innovative solutions to create a custom approach that is tailored to your company’s needs.

SAP Compliant Identity Management

SAP offers both cross-industry and industry-specific solutions in the fields of GRC and identity management. Technical solutions for the separation of functions and monitoring are included in the SAP Compliant Identity Management Suite. SAP Access Control is one of the three pillars of this product group, along with SAP Identity Management and SAP Single Sign-On.

SAP Identity Management (IdM)

SAP Identity Management (IdM) enables you to manage users and their permissions centrally and conveniently across heterogeneous system landscapes. The solution improves process efficiency with a wide range of automation and self-service functionality, while meeting compliance and transparency requirements thanks to integrated reporting and monitoring tools.

SAP Identity Management (IdM)

SAP Single Sign-On (SSO)

Requiring every user to have a distinct password for every system is not very efficient and may represent a security risk for the company. These conditions often lead employees to write down their access details or store them in an insecure format. The SAP Single Sign-On (SSO) software solution replaces multiple password prompts across different systems with a single user authentication step. The individual users benefit from simplified processes, and the company benefits from greater levels of security.

SAP Single Sign-On (SSO)

SAP Access Control

When users have several security-relevant authorizations at the same time, this can increase security risk and lead to lack of compliance. SAP Access Control was specifically developed to identify such authorization conflicts and prevent them proactively.

SAP Access Control

SAP Enterprise Threat Detection (ETD)

SIEM products often cannot effectively parse SAP log files and therefore fall short in SAP-based IT infrastructures. SAP Enterprise Threat Detection (ETD) solves this problem because it can interpret the central log files of both SAP and non-SAP applications. The monitoring solution from SAP enables comprehensive analysis and helps to identify and ward off cyber attacks in real time.

SAP Enterprise Threat Detection (ETD)