{"id":984,"date":"2021-02-26T20:06:00","date_gmt":"2021-02-26T14:36:00","guid":{"rendered":"https:\/\/www.enhisecure.com\/isecureblog\/?p=984"},"modified":"2021-02-26T20:06:00","modified_gmt":"2021-02-26T14:36:00","slug":"erp-overview-from-an-iam-perspective","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2021\/02\/26\/erp-overview-from-an-iam-perspective\/","title":{"rendered":"ERP Overview from an IAM Perspective"},"content":{"rendered":"\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Enterprise_resource_planning\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Enterprise_resource_planning\">ERP<\/a> plays a critical role by helping an organization in managing its core <a href=\"https:\/\/en.wikipedia.org\/wiki\/Business_process\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Business_process\">business processes<\/a> such as, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Project_management\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Project_management\">project management<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Procurement\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Procurement\">procurement<\/a>, sales, etc. It manages day-to-day <a href=\"https:\/\/en.wikipedia.org\/wiki\/Business_process\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Business_process\">business activities<\/a> by providing a<a href=\"https:\/\/en.wikipedia.org\/wiki\/Centralized_database\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Centralized_database\"> central information system<\/a> for data sharing. A greater visibility, increased productivity and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Operational_efficiency\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Operational_efficiency\">operational efficiency<\/a> can be observed by synchronizing all these areas. To <a href=\"https:\/\/en.wikipedia.org\/wiki\/Authentication\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Authentication\">authenticate <\/a>and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Authorization\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Authorization\">authorize <\/a>the users within <a href=\"https:\/\/en.wikipedia.org\/wiki\/Enterprise_resource_planning\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Enterprise_resource_planning\">ERP<\/a> software, there is a major role played by <a href=\"https:\/\/en.wikipedia.org\/wiki\/Identity_management\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Identity_management\">Identity and Access Management<\/a>. It authenticates the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_identity\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Digital_identity\">digital identity <\/a>of the users and manage their roles and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Asset_management\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Asset_management\">access privileges<\/a> in the central information system.<\/p>\n\n\n\n<p>In this blog we are discussing about the benefit of implementing <a href=\"https:\/\/en.wikipedia.org\/wiki\/Enterprise_resource_planning\">ERP<\/a> by comparing it with the traditional method and also about securing it with the help of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Identity_management\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Identity_management\">IAM<\/a> modules. The blog also mentioned about the <a href=\"https:\/\/en.wikipedia.org\/wiki\/SAP_ERP\">SAP<\/a> (System applications and Product) which is a top <a href=\"https:\/\/en.wikipedia.org\/wiki\/Enterprise_resource_planning\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Enterprise_resource_planning\">ERP<\/a> solution, it has positioned as a leader in <a href=\"https:\/\/www.absoft.co.uk\/sap-leader-in-gartner-magic-quadrant-for-single-instance-erp\/\" data-type=\"URL\" data-id=\"https:\/\/www.absoft.co.uk\/sap-leader-in-gartner-magic-quadrant-for-single-instance-erp\/\">Gartner\u2019s Magic quadran<\/a>t for single instance <a href=\"https:\/\/en.wikipedia.org\/wiki\/Enterprise_resource_planning\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Enterprise_resource_planning\">ERP<\/a>, for multiple consecutive areas as per different evaluation criteria.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ENH iSecure: ERP Overview from an IAM Perspective\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/XlZh-tQBgcs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>ERP plays a critical role by helping an organization in managing its core business processes such as, project management, procurement, sales, etc. It manages day-to-day business activities by providing a central information system for data sharing. A greater visibility, increased productivity and operational efficiency can be observed by synchronizing all these areas. To authenticate and [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,16],"tags":[45,136,132,120,135,133,127,137,139,138],"class_list":["post-984","post","type-post","status-publish","format-standard","hentry","category-identity-governance","category-technology","tag-authentication","tag-authorization","tag-cyber-security","tag-erp","tag-governance","tag-iag","tag-iam","tag-identity-and-access-management","tag-information-security","tag-sap-erp"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=984"}],"version-history":[{"count":4,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/984\/revisions"}],"predecessor-version":[{"id":988,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/984\/revisions\/988"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}