Skip to main content
TrustRadius
SAP Access Control

SAP Access Control

Overview

What is SAP Access Control?

SAP Access control streamlines the process of managing and validating user access to applications and data with minimal support from IT, with the goal of giving employees the applications and services they need without exposing data and processes to unauthorized…

Read more
Recent Reviews

SAP Access Control

7 out of 10
February 14, 2020
Incentivized
We use SAP Access Control across the whole organization. It makes user management simple and cost effective. Role management, user …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is SAP Access Control?

SAP Access control streamlines the process of managing and validating user access to applications and data with minimal support from IT, with the goal of giving employees the applications and services they need without exposing data and processes to unauthorized use.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

6 people also want pricing

Alternatives Pricing

What is ManageEngine ADAudit Plus?

ADAudit Plus offers real-time monitoring, user and entity behaviour analytics, and change audit reports that helps users keep AD and IT infrastructure secure and compliant.Track all changes to Windows AD objects including users, groups, computers, GPOs, and OUs.Achieve hybrid AD monitoring with a…

What is SecurID?

SecurID, a company and solution suite from RSA, is an identity and access management suite supporting access management, authentication, and identity governance.

Return to navigation

Product Details

What is SAP Access Control?

SAP Access control streamlines the process of managing and validating user access to applications and data with minimal support from IT, with the goal of giving employees the applications and services they need without exposing data and processes to unauthorized use.

It is used to streamline the process of managing and validating user access with governance software that automates user provisioning and helps to certify access to on-premise applications and data. It enforces governance by enabling the user to embed preventative policy checks and monitoring emergency access.

Features

  • On-premise or cloud deployment
  • Immediate detection of access violations
  • Self-service access requests
  • Automated reviews of user access

SAP Access Control Video

Why SAP Process Controls is a fantastic compliment to users of SAP access control

SAP Access Control Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating Systems, ,
Mobile ApplicationNo

Frequently Asked Questions

SAP Access control streamlines the process of managing and validating user access to applications and data with minimal support from IT, with the goal of giving employees the applications and services they need without exposing data and processes to unauthorized use.

Reviewers rate Support Rating highest, with a score of 7.

The most common users of SAP Access Control are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(445)

Attribute Ratings

Reviews

(1-15 of 15)
Companies can't remove reviews or game the system. Here's why
Jayakrishna Moola | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
  • Handling 17k users by just 4 full-time and 4 part-time resources is only possible because of SAP ac.
  • Risk mitigation has helped the company have clean audit cycles year after year.
  • Firefighter procedure help in manga shock requirements.
  • Quick adoption of new business scenarios for roles and having workflow setup for business scenarios are made possible.
Matt Saunders | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Eradication of data breaches to third-party users by securing employees logins.
  • Integration with external services such as SAP HANA and IBM Datacap allows us to enjoy more capabilities such as data cleansing without having to keep logging out of the application. That help business users save time thus improving productivity.
  • Vendor customer success helped us to reduce operational costs by offering free support on implementation, customization and integration.
Edward McCallister | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • My employee login has become exponentially much more secure, no worries of data breaches.
  • We have found risks in the login and within the business activity of our employees, thanks to this platform it is easier to detect the data gap.
  • Its integration with the SAP Hana system has helped us add additional details of troubleshooting and login satisfaction to our activity reports generated in SAP Hana.
Luis Cruz | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Reducing risk of fraud. Implementing SAP Access Control allows analysis of every role assigned to a job on the organization. Through this analysis, weakness on roles are detected, corrected and monitored. As the users feel the change, they also feel that they are being monitored, preventing any intent to use his position and privileges to take personal advantage. So a major impact to organizations is to reduce the financial lost due to frauds.
  • Reducing cost for monitoring. Another positive impact is lowering the cost of monitoring. This is twofold: First, a rather small team can manage access management. Second, through the use of SAP Access Control the complete universe of roles and users can be monitored without increasing the cost for the continuous monitoring.
  • During transactions. The use of SAP Access Controls allows detection of transactions that, from an information security point of view, require some redesign. When SAP GCR is implemented, you make some discoveries such as: obsolete transactions, transactions with no authorization objects and the like. The transactions with these problems can be left out of the active roles, waiting for remediation of the issues found.
Return to navigation