2020-01-16T17:46:00Z
Mauricio Marinho - PeerSpot reviewer
IT Analyst at a financial services firm with 1,001-5,000 employees
  • 6
  • 70

Which is the best legacy IDM solution for SAP GRC?

I have more than seven years of experience working at a bank. 

We bought SAP GRC that came with SAP IDM. Should we leverage SAP IDM and customize it for legacy or should we acquire a specialized legacy IDM solution? Which is the best option and which solution would you recommend?

Thanks! I appreciate the help.

6
PeerSpot user
6 Answers
WB
Business Consultant Identity & Access management at a government with 1,001-5,000 employees
User
2020-01-20T15:11:04Z
Jan 20, 2020

I would always prefer a specialized IDM solution with OOB connectors to legacy systems and SAP instead of customization of SAP IDM. Most IDM tools are capable of doing role reviews, have SOD tables, and are capable of provisioning and de-provisioning legacy systems without customization. Without knowing what your functional requirements are with regards to IDM I would suggest Okta or Sailpoint.

Search for a product comparison in GRC
MP
Senior Product Manager for Identity & Access Management at a non-tech company with 10,001+ employees
Real User
2020-01-20T21:13:52Z
Jan 20, 2020

I have experience with SAP IDM for SAP only and not for other systems. That said, the recommendation would depend on a much more detailed analysis and also a list of which “legacy” systems they have to integrate.

JS
Account-Manager at a tech vendor with 201-500 employees
Real User
2020-01-20T14:30:36Z
Jan 20, 2020

SAP IDM is a powerful tool if you stay within the „SAP ecosystem“ if you have a lot more applications and target systems to connect you should definitely look into a a full comprehensive IDM solution like Omada. Gartner’s rated Omada as a top vendor for governance needs

SylvainMaertchik - PeerSpot reviewer
Education Director at ID Integrated Data SA
Real User
Leaderboard
2020-01-20T13:57:06Z
Jan 20, 2020

I’m definitely not an expert in SAPG GRC but I can do some research if I have more details about the request. What are the requirements, what does he want to do?

JC
VP Channel & Alliances at Ubisecure
Vendor
2020-01-20T12:43:36Z
Jan 20, 2020

You could consider Ubisecure for external IDM needs and Omada for internal external.

it_user1123740 - PeerSpot reviewer
Shaw Communications at a comms service provider with 10,001+ employees
Real User
2020-01-20T02:54:29Z
Jan 20, 2020

If you are looking for an SAP Certified IAM solution then I suggest One Identity’s Identity Manager product.

Learn what your peers think about RSA Archer. Get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
655,994 professionals have used our research since 2012.
Related Questions
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Sep 3, 2022
Hi community members, What are the main differences between SOC 1, SOC 2, and SOC 3 compliance? Thanks.
See 1 answer
CM
Car Detailer at Five Star Auto Sales
Sep 3, 2022
The difference is how the data is given and exactly what information of the that data is given. And I love that it answered so many questions simply. 
Terry  Ramabulana - PeerSpot reviewer
Director at Skxprotiviti
Nov 21, 2022
Hi community members, I'm the Director of a Consultancy firm. At the moment, I'm looking for automated software for both external and internal audit purposes. It should be able to assist with governance, risk management and compliance (GRC). Which software/solution would you recommend? why?
See 2 answers
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Mar 31, 2022
Hello @Alex Alexandre, @Carlos Arturo Quiroga Quiroga, @AdhishP, @Sameh Hablas , @Dani Bachour ​and @Vivek Shah, Can you please assist here? Thank you!
BS
Principal Consultant at Aligne Technologies
Nov 21, 2022
Hi Terry, You may want to look at MetricStream which is one of the market leaders in the Enterprise GRC space and apart from the various risk modules, also has Audit management software.
Related Articles
Syed S - PeerSpot reviewer
Program Manager - Information Security at Gulf International Bank
Apr 13, 2022
Have you ever wondered how effective project management can really help you with your Cyber security projects? In recent times, cybersecurity has become an increasingly important issue worldwide. Every year, businesses spend more time and effort protecting their data. Gartner forecasted that global security investments will exceed $172 billion in 2022. Nobody can underestimate the necessity o...
See 1 comment
BorisVishnevsky - PeerSpot reviewer
Sr.Dir/Managing Principal Technology Consulting at a consultancy with 10,001+ employees
Apr 13, 2022
Cybersecurity had been recognized as a Fifth War Domain a while back: Land, Sea, Air, Space, Cyber.  As such, planning for war is important since it provokes managers to THINK.  While the plans that these managers develop are mostly useless since these plans become mostly irrelevant when the Cyber Battle ensues. Preparedness, counterintelligence, logistics, skills, adaptability, and distributed decision-making become more important as compared to PMI principles and best practices ( 'the disciplined agile' should be included and focused on as part of the adaptability;-)).
Ram Chenna - PeerSpot reviewer
Enterprise Architect at Blueray Digital Services
Dec 15, 2021
Privacy Concerns in an RPA Implementation Program. The biggest concern we (as RPA solution implementors) have faced when interacting with clients and customers were: 1. Regulatory and Compliance issues. 2. InfoSec and Security issues. 3. Audit Issues. Regulatory and Compliance Issues: There is a huge penalty if the wrong data gets updated and emails are sent to customers by the regulatory...
Moderator
davidstrom - PeerSpot reviewer
Owner at David Strom Inc.
Related Categories
Related Articles
Syed S - PeerSpot reviewer
Program Manager - Information Security at Gulf International Bank
Apr 13, 2022
How important is project management to the execution of cyber security projects?
Have you ever wondered how effective project management can really help you with your Cyber secur...
Ram Chenna - PeerSpot reviewer
Enterprise Architect at Blueray Digital Services
Dec 15, 2021
Privacy issues and regulatory laws to be complied with when implementing an RPA program
Privacy Concerns in an RPA Implementation Program. The biggest concern we (as RPA solution imple...
Download Free Report
Download our free RSA Archer Report and get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
DOWNLOAD NOW
655,994 professionals have used our research since 2012.