The need to protect SAP applications from bad actors is well-understood. However, while many organizations running SAP undertake privileged access management (PAM) to the application layer, extending it to the server, OS, or database level is often...
Author - Chris Boyle, Turnkey Consulting
Chris Boyle is Practice Director Identity and Access Management (IdAM) at Turnkey Consulting.