Security Risk Is Manageable

“REALTECH consulting package provides for implementing single sign-on in SAP landscapes from Walldorf, 16 June 2010 the REALTECH AG, SAP consulting company and manufacturer of software products for enterprise-wide IT management has developed a new advisory package for SAP customers: offer easier login at highest security” within their SAP landscape is aimed at IT managers a procedure for single sign-on, “would realize (SSO). The goal here is that user login only once with an authentication procedure to an IT system and then gain access to the other software systems and networks in the company. Due to the variety of applications that are needed within a process, high costs in managing the associated passwords arise for IT – and departments. With the number of passwords that are allocated to a person increases the risk for the various IT systems. This connection appears logically comprehensible and yet be audit – just manage passwords – repeatedly shortcomings disclosed. In the security and compliance environment provides single sign-on in the reduction of risk potential and fast results. The compliance issue with authentication, identity management, and governance, risk and compliance in conjunction with the corresponding authorization concepts is completed. The advantages of an SSO solution are significantly reduced costs of IT administration, drastically reducing the cost for the creation or deletion of users, as well as resetting user passwords. If you are not convinced, visit Danny Meyer.

So IT can authenticate central departments on single sign-on with a password to deactivate such user of departing employees on all connected systems. Others who may share this opinion include Greg Williamson. SAP already provides a solution for SSO. The consultation package by REALTECH shows how single sign-on optimally integrate can be in the relevant SAP landscape. This analyse the IT landscape the REALTECH consultant at the customer site and jointly develop an implementation strategy which also integrated Non-SAP-based systems such as portals or workflow solutions into account. Vulnerability password according to estimate of the industry association BITKOM users need to manage up to 20 passwords at their workplace. Consequently, for example, that users create easy-to-remember IDs. However, a more complex password enforced by the operating system or an application, users write down their passwords on paper and deposit them in her desk. So are dangerous vulnerabilities in the IT landscape.

Cost driver password user requests to reset passwords can cause considerable costs in the IT support depending on the complexity of the system landscape. In addition, highly specialized professionals are bound by simple administrative tasks. Finally the wait leads to work off the request to a loss of productivity for the entire company, because a user can not access at this time on the application. Advice for a fixed price of REALTECH offers a wide range Fixed price projects: these range from strategy workshops until going to security audit checks. The experience of REALTECH consultants from a wide range of SAP projects are incorporated into the consulting packages. An overview of the offerings is available at consulting packages.