Hexadius
Established in 2009 in Singapore, Hexadius is a boutique professional services organization focused on assisting our clients navigate the cybersecurity risks and threats without impeding its business objectives and growth.
Hexadius partner with our clients to
- understand their unique challenges & objectives
- design solutions and identify best technology to effectively manage cybersecurity
- implement chosen solutions
- provide ongoing support to manage cybersecurity efficiently
Hexadius understands that every organization is different and therefore, do not believe in ‘one size fits all’ solutions. Our solutions and technologies are best aligned with our client’s needs.
What We Do
Hexadius provides niche cybersecurity services. Our services include advisory/ consulting, review/ assessment, system implementation/ integration, ongoing/ managed support as well as trainings/ enablement services.
Featured Services
-
Identity & Access Management (‘IAM’)
IAM is an increasingly important part of enterprise cybersecurity. IAM is all about managing identity and access lifecycle across diverse IT systems. It broadly consists of three domains – Identity and Access Governance (‘IAG’)/ Identity Governance & Administration (‘IGA’), Access Management (‘AM’ – term generally used for Single Sign On (‘SSO’) and Multi Factor Authentication (‘MFA’) functionalities) and Privileged Access Management (‘PAM’). These three together ensure that the digital identities are managed in a secure and controlled manner.
-
SAP GRC and Cybersecurity
Organizations using SAP solutions face unique challenges in managing security and controls. SAP solutions include traditional SAP solutions such as SAP ECC 6.0, SAP S/4 HANA, as well as SaaS solutions such as SuccessFactors, Ariba, BTP, Concur, etc. SAP also has its suite of GRC and Cybersecurity solutions such as SAP Access Control, SAP Cloud Identity Access Governance, SAP Enterprise Threat Detection, SAP Process Control, etc.
-
Vulnerability Assessment and Penetration Testing (‘VAPT’)
Vulnerability Assessment and Penetration Testing (‘VAPT’) simulates the tools and techniques of an attacker to identify vulnerabilities, which may be exploited by an attacker to obtain unauthorized access to IT systems and infrastructure. VAPT assists in assessing the security of IT systems and infrastructure through simulated attacks. The objective is to provide substantive proof of vulnerabilities and recommend effective countermeasures – allowing our clients to focus and prioritize security resources.
Featured Content
-
Case Study: Multinational Real Estate Organization
A Singaporean multinational real estate organisation strengthened its cybersecurity and compliance by implementing SailPoint's IdentityNow and Access Risk Management solutions to address Segregation of Duties risks and streamline user access governance across enterprise systems.
-
Case Study: Leading Logistics company with Global presence
A leading global logistics company enhanced its cybersecurity and streamlined identity governance by implementing SailPoint IdentityIQ, automating user lifecycle management, access reviews, and enforcing Segregation of Duties policies.
-
Articles / Case Studies / Videos
-
How to manage identities and access in SAP?
Reading time: 1 min
SAP offers multiple solutions to manage identity and access across its various solutions including its ERP, Supply Chain, Spend Management, HCM, CRM and other solutions. Read More
-
Pros and Cons of undertaking SoD remediation before or as part of SAP S/4HANA transformation
Reading time: 1 min
Let us get first thing clear, it is definitely not a good idea to push addressing Segregation of Duties (‘SoD’) AFTER SAP S/4 HANA transformation. Very simply, it can be very costly and resource-intensive, as it may require revisiting roles, responsibilities, and user access on top of ongoing operational activities to stabilize the new SAP…
-
-
Hexadius | Business case for including SAP in SOC
Reading time: 1 mins
A Security Operations Center (‘SOC’) is a centralized function responsible for monitoring, detecting, investigating, and responding to cybersecurity threats and incidents in an organization. It serves as the nerve center for an organization’s cybersecurity defenses, ensuring systems, networks, applications, and data remain secure against evolving cyber threats. It typically uses tools such as Security Information…
-
Best practices for SAP SoD management using SailPoint
Reading time: 1 min
Segregation of Duties (‘SoD’) is an important component of internal controls for any organization and needs to be managed for every IT system. SAP ERP is often the crown jewel application for organizations using it and by its very nature, SoD is especially very important to enforce in SAP ERP system. However, SoD management in…
-
What comes first – SAP SoD remediation or SAP Role Redesign?
Reading time: 1 min
Hexadius has been involved in multiple SAP Segregation of Duties (‘SoD’) remediation projects. These projects tend to be complex due to the special authorization structure in SAP. Many of these remediation projects encounter issues related to the SAP role design. A bad role design often makes it difficult to remove SoD risk violations. This results…
-
SailPoint deployment with SAP GRC/ Access Control
Reading time: 1 min
SAP Access Control (also generally referred as SAP GRC or SAP GRC Access Control) is a solution from SAP that enables organizations to control access across various SAP systems, minimizing the time and cost of compliance. It is an add-on to SAP NetWeaver platform, and works with SAP applications such as SAP ECC 6.0, and…
-
Planning SAP Onboarding into SailPoint
Reading time: 1 min
Just like any IT project, a good plan goes a long way in ensuring a smooth and timely system onboarding. Before starting the onboarding itself, it is important to understand the overall SAP landscape of the organization. The SailPoint engineers should coordinate with SAP technical team to understand the landscape before starting any onboarding activities.…
-
-
Extending identity security journey to SAP systems
Reading time: 1 min
SAP is one of the most commonly used enterprise systems. And SailPoint is one of the most popular Identity Governance and Administration (‘IGA’) systems. Both are leaders in their respective domains and therefore, many large organizations are using both these systems. Read More
-
SAP Role Redesign and S/4 HANA Transformation
Reading time: 1 min