Homepage " news " TIGER Coatings plays it safe with UAM

TIGER Coatings plays it safe with UAM

TIGER Coatings, an internationally active family business headquartered in Wels (Upper Austria) and manufacturer of high-quality powder coatings, digital inks for industrial printing systems and innovative materials for SLS 3D printing, relies on User Access Management (UAM) from INFORMATICS.

UAM is a FireFighter tool that is fully integrated into SAP. It can be used to assign additional authorizations as self-service profiles to individual users and - if necessary - activate extended authorizations for a short period of time. All activities associated with the extended authorizations are meticulously logged. In the course of a major IT security programme, in which both organizational and technical measures were defined, it became apparent that the authorization concept needed to be tightened up.

"The affected users can request the required authorizations themselves. This allows us to guarantee a quick solution even in emergency situations."

TIGER Coatings with Susanne Flattinger, SAP Lead Consultant SCM, relies on UAM from INFORMATICS.

It was important to TIGER that the right choice of future tool would not only increase system security, but also ensure transparency. Important criteria when evaluating the solutions available on the market were high usability for intuitive operation and at the same time the existence of preventive conformity with regard to security audits.

A demo showed that UAM met the criteria defined by TIGER. After INFORMATICS assured the realization of a quick and easy implementation in further discussions, TIGER made the decision to give preference to UAM.

At TIGER, UAM is used by both external consultantsand internal IT employees who carry out critical transactions in the production systems. The choice of product proved to be the right decision shortly after implementation. For example, it performed well during the processing of an SAP support notification. In this case, the SAP service employees themselves obtained the extended authorizations predefined by TIGER for system analysis, with this process being automatically logged in both the UAM and the security audit log. Simple and secure authorization assignment is therefore a reality.