Guides and white papers

Is Higher Education Cybersecurity Making the Grade?

A Healthier Approach: The business case for IGA in the pharmaceutical sector

How to implement SAP IAG Future-proofing your access governance

Securing your perimeter What perimeter?

Safety first: SAP S/4 HANA Security A Turnkey and Legion Star guide

Four Common Pitfalls of a Privileged Access Management (PAM) Project

Navigating NIS2: What you need to know about the EU’s new cyber security directive

Data Risk Assessment

Privacy by Design

SAP Security Survey Report 2021 A Turnkey and Legion Star report, in conjunction with Onapsis

Navigating the Cybersecurity Landscape: A guide to US cybersecurity legislative initiatives and how Turnkey Consulting can help

Protecting your SAP infrastructure with Privileged Access Management (PAM)

Integrated Risk Management (IRM) A holistic approach to controlling enterprise risk

How integrating SAP Identity Management and SAP GRC can help your business

Upgrading to SAP GRC 12.0

Identity & Access Management (IAM) in Higher Education Managing access for joiners, movers and leavers

Cyber Threat Intelligence (CTI) Harnessing insight to stay ahead of the ever-changing threat landscape

SAP GRC: A roadmap to reduced enterprise risk