Security 20'12 Tech can help you to configure back-end systems authentication with external/internal destinations to allow a "secure communication". to "authorize" and implement existing business "roles" according to the SAP standard Role Concept. to "authorize" and implement all SAP components according to the SAP standard in your new projects. to centralize control of "compliance", data protection and "Audit" planning. Also GRC and IDM implementation. to implement up-to-date SAP "Hardening" parameters and patches to your entire SAP infrastructure for possible unauthorized access and virus attacks.