Detect and Prevent Malicious Business Transactions with SAP Fraud Management

  • by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd.
  • November 16, 2015
Learn how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents.
Learning Objectives

Reading this article, you’ll learn:

  • How to perform technical configuration validation of the SAP Fraud Management system
  • How data is provisioned automatically into SAP HANA
  • How to implement and use SAP Fraud Management for fraud detection and investigation
Key Concept

The Serious Fraud Office (SFO), which is a department in the office of the US Attorney General, defines fraud as an act of deception intended for personal gain or to cause a loss to another party. The implication of successful perpetration of fraudulent activities can be enormous and can lead to huge fines and legal actions. SAP Fraud Management is designed to use intelligent algorithms to study and analyze fraud patterns, thereby curbing the occurrence and perpetration of malicious business activities.

As governments around the world increase enforcement of laws and regulations to combat corruption and fraudulent activities such as bribery, global corporations are under increasing pressure to improve their anti-bribery and anti-corruption compliance programs to detect and prevent potentially fraudulent transactions that could put the organization in an unpleasant position.

Therefore, a tool to manage this business challenge is becoming more important to top business executives. SAP Fraud Management is designed to detect, investigate, analyze, and prevent malicious business activities in mega-high data volume system environments. The product belongs to the SAP Assurance and Compliance Software 1.1 suite. Technically, it co-habits with SAP Audit Management.

Kehinde Eseyin

Kehinde Eseyin is a senior SAP security and GRC consultant with Turnkey Consulting (UK) Limited. He has more than eight years of SAP authorizations, GRC, and Basis experience. In the past, he has managed teams to coordinate security, GRC, and Basis administration activities within a multinational environment and operated as an independent consultant, performing SAP system audits and SAP GRC Access Control implementations. He holds a bachelor’s degree in computer science. He has different certifications, including SAP Access Control 10.0 Consultant; SAP Technical Consultant (SAP NetWeaver on Oracle); SAP Solution Manager Operations Consultant; SAP Support Engineer – SAP Solutions Manager; SAP Business One Consultant; Oracle Database Administration Professional (OCP DBA); ITIL v3; and PRINCE2. He is the co-author of SAP BusinessObjects Access Control 10.0 Application Associate Certification [Review Questions and Answers].

See more by this author


Comments

No comments have been submitted on this article. 


Please log in to post a comment.

To learn more about subscription access to premium content, click here.