A large utility company with 8000 employees embarked on a journey to deploy Microsoft Office 365 solution comprising of Email, Office and SharePoint across 10 operating countries.
As security of the data was a critical concern, they partnered with Saviynt to implement a comprehensive security solution including Preventative and Detective controls for OneDrive and Office 365 solution.
Saviynt provides Splunk applications to protect critical data in Office 365, Box, SAP, Epic, HANA and Hadoop. Just deploy the Saviynt application on your existing Splunk infrastructure (on premise or on the cloud), follow a few easy steps to integrate with your application and let Saviynt do its magic.
A large financial company with diverse workforce and hundreds of applications resulted in cumbersome and in-efficient access management process that governed critical data. The client wanted to implement a scalable solution that reduced integration effort and address the problem from business perspective.
Saviynt deployed the easiest to use Access Request Capabilities – easy to request, easy to review and easy to provision! Capabilities included multiple Workflows, different request-able attributes / permissions to request access, manual provisioning workbench for the IT team, provisioning into Active Directory and Mainframe, Zero day Provisioning and Reports / Dashboards.
Security model in SAP HANA is very different from that of traditional SAP. Given that enterprise (read non-SAP) applications and end users will have direct access to critical data in SAP HANA, it is critical to design and administer its security model adequately. However, those familiar with SAP security model will face an uphill task in correctly designing SAP HANA’s unique privilege model.
Saviynt’s ACCESS PROTECT TM for SAP HANA simplifies privilege design and management by enabling users to define simple business and technical rules. The system then automatically converts those rules in to different types of privileges (including dynamic APs, System, SQL, etc.) and SAP HANA roles to secure the views, tables, schemas, etc.