Our consulting services can provide experienced SAP Security and Authorizations consultants to manage/run all aspects of SAP security projects and any business as usual programmes.  Our experienced staff will integrate seamlessly into both project and BAU teams to implement best practice to ensure that any projects/programmes are implemented successfully. 
All our consultants are well versed in both the JAM Methodology and Toolkit, becoming productive in a short space of time once deployed within a client site.  They will make sure full advantage is taken of the methodology and toolkit’s capabilities.  Every JAMTec consultant brings a wealth of experience to the projects, are always approachable and are driven to deliver the best solution for our clients.
previous arrow
next arrow
Shadow
Slider
We can offer our consulting services on a time and materials basis, or even on a fixed term basis for a specific statement of work.  Please get in touch with us to discuss your requirements, and we will be glad to help discuss all options.
 

JAM Methodology

SAP projects have often neglected the SAP Security and Access (S&A) design process.  This results in a poor S&A implementation, and projects go live with major issues from day one.  This is then followed by a lengthy period of time when the Business As Usual teams firefight issues to try and allow the business to run.  We have found a disconnect in many organisations between business processes and the SAP role design.  This makes it challenging to effectively control end-user access and users either have too much access giving rise to Segregation of Duties (SoD) violations, or they do not have enough access to work efficiently.  Working with SAP for over 20 years, our founders decided to develop a robust and comprehensive methodology following best practices to improve the SAP S&A journey.

previous arrow
next arrow
Shadow
Slider
Our methodology provides the means for seamless Security and Authorisations implementations for all of our clients.  Through the methodology, we engage with key stakeholders and all project team members, helping clients through the SAP security journey.  The JAM Methodology has been developed and used over several years, with continuous improvement to ensure the best strategy for a successful SAP access management deployment.  
JAMTec’s proprietary methodology supports and facilitates the process of building a robust SAP Security and Authorisation model to support an organisations’ business processes based on the functional design.