̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
During this webinar, Greg Wendt and Rajesh Rengarethinam discussed:
- How Attribute-Based Access Controls complement and extend SAP’s role-based security model
- ABAC policies that can be used to quickly scale new security controls without redesigning existing roles and privileges
- Ways fine-grained controls can be used as a stop-gap to mitigate privileged user exploits and remote access risks
- How context-aware controls can shrink your attack surface in cloud-hosted instances
Fill out the form below to view this Resource.