Detect and Prevent Malicious Business Transactions with SAP Fraud Management

  • by Kehinde Eseyin, Security Architect
  • November 16, 2015
Learn how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents.
Learning Objectives

Reading this article, you’ll learn:

  • How to perform technical configuration validation of the SAP Fraud Management system
  • How data is provisioned automatically into SAP HANA
  • How to implement and use SAP Fraud Management for fraud detection and investigation
Key Concept

The Serious Fraud Office (SFO), which is a department in the office of the US Attorney General, defines fraud as an act of deception intended for personal gain or to cause a loss to another party. The implication of successful perpetration of fraudulent activities can be enormous and can lead to huge fines and legal actions. SAP Fraud Management is designed to use intelligent algorithms to study and analyze fraud patterns, thereby curbing the occurrence and perpetration of malicious business activities.

As governments around the world increase enforcement of laws and regulations to combat corruption and fraudulent activities such as bribery, global corporations are under increasing pressure to improve their anti-bribery and anti-corruption compliance programs to detect and prevent potentially fraudulent transactions that could put the organization in an unpleasant position.

Therefore, a tool to manage this business challenge is becoming more important to top business executives. SAP Fraud Management is designed to detect, investigate, analyze, and prevent malicious business activities in mega-high data volume system environments. The product belongs to the SAP Assurance and Compliance Software 1.1 suite. Technically, it co-habits with SAP Audit Management.

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.