SAP Access Control

[18 Matches Found]
 
Article icon
by Kehinde Eseyin, Security Architect February 24, 2017
SAP Professional Journal/Financials – 
Kehinde Eseyin describes the technical architectural design, setup, and implementation of SAP Fiori in the SAP GRC environment as it relates to SAP Access Control, SAP Risk Management, and SAP Process Control applications.

Video icon
Financials/SAP Professional Journal – 

Many companies use solutions like SAP Access Control to analyze user access before roles are assigned and then report suspect activity to business owners. In this video, you'll see how leading companies are moving from reporting on these “potential” segregation of duties (SoD) violations to calculating their actual financial exposure by leveraging SAP Access Violation Management.

 


Article icon
by Vinay Gupta, Senior Software Engineer, SAP Labs India Pvt. Ltd. February 8, 2016
SAP Professional Journal/Financials – 

Vinay Gupta explains how to certify roles and different attributes in role certification. He also provides you with details regarding role certification jobs.


Article icon
by Kehinde Eseyin, Security Architect January 4, 2016
SAP Professional Journal/Financials – 

In part 2 of his series, Kehinde Eseyin corrects assumptions about the SAP Access Control system that are not necessarily true and provides guidance on how to meet specific complex business requirements during an implementation project, including maintenance and support activities.


Article icon
by Kehinde Eseyin, Security Architect December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Akansha Gupta, Senior Developer in SAP: Access Control, SAP Labs India Pvt. Ltd. September 28, 2015
SAP Professional Journal/Financials – 

SAP Access Control provides you with the option to create a supplementary rule. The rule gives additional information to prevent a false conflict in a segregation of duties (SoD) risk analysis report. Akansha Gupta outlines the steps you need to complete to enable the supplementary rule.


Video icon
by Gavin Campbell, Director, Integrc December 30, 2014
Financials/SAP Professional Journal – 
In this video Gavin Campbell details experiences from a plethora of SAP Access Control projects and offers the top 10 lessons for organizations that are thinking about implementing, are currently implementing, or have already implemented SAP Access Control.

Video icon
by Erin Hughes, Director of Marketing, GRC Solution Marketing, SAP December 30, 2014
SAP Professional Journal/Financials – 
If you're only leveraging SAP Access Control today to run risk analysis and conduct firefighting activities, odds are you're not maximizing your investment. View this video to explore the full range of SAP Access Control capabilities.

Video icon
by Ruth Johnson, Senior Advisor and GRC Consultant, Customer Advisory Group December 30, 2014
SAP Professional Journal/Financials – 
In this video Ruth Johnson explains the various options for creating accurate and up-to-date SoD risk analysis reports using the management graph reporting capabilities in SAP Access Control.

Video icon
by Tracy Levine, SAP Application Consultant, itelligence November 27, 2013
SAP Professional Journal/Financials – 
In this webinar, Tracy Levine, SAP GRC Consultant at itelligence, discusses strategies around surviving an SAP security audit and maintaining compliance objectives long term. Tracy shares her methodology around optimizing your SAP security landscape and utilizing SAP Access Control to prevent reintroduction from risk exposures by taking an audit approach to SAP security.

Video icon
by Susan Stapleton, Vice President of the Customer Advisory Office, Greenlight Technologies May 29, 2013
SAP Professional Journal/Financials – 
In this video, Susan Stapleton, vice president of the Customer Advisory Office at Greenlight Technologies, explains how to leverage various technological approaches to extend SAP GRC solutions across the enterprise.

Quick tips icon
by Alpesh Parmar, Managing Partner, ultimumIT, Inc. November 5, 2012
SAP Professional Journal/Financials – 
Learn two ways to maintain rule sets using SAP Access Control 10.0 that auditors find acceptable.

Quick tips icon
by Alex Joseph, SAP GRC Practice Manager, itelligence Group August 31, 2012
SAP Professional Journal/Financials – 
See how using custom reports to remediate all avoidable segregation of duties (SoD) violations in parallel to the implementation of SAP Access Control ensures that only necessary or unavoidable SoD violations remain and are reported on after SAP Access Control goes live.

Video icon
SAP Professional Journal/Financials – 
In this video you’ll discover how Allegheny Energy is using SAP BusinessObjects Access Control’s risk analysis and remediation tools, to address Federal Energy Regulation Commission (FERC) standards and codes of conduct for the utilities and energy industry.

Article icon
by Maurizio Binatti, SAP GRC Consultant, Aglea s.r.l. December 19, 2011
SAP Professional Journal/Financials – 
Learn how to measure and assess whether three-way match invoice control has been effectively implemented — in terms of security, segregation of duties (SoD), and processes — to reduce the risk of fraud and monetary losses over the procure-to-pay (P2P) process.

Video icon
by Jayne Gibbon, Director of Customer Care, SAP September 13, 2011
Financials/SAP Professional Journal – 
Upon first running segregation of duties (SoD) reports in SAP BusinessObjects Access Control, management staff can become overloaded with data and assume that the results simply cannot be correct. It is then the responsibility of the owners of SAP BusinessObjects Access Control to prove that the reports are accurate. In this video, Jayne Gibbon demonstrates how to validate a false negative in Access Control.

Article icon
by Frank Rambo, PhD, Director, Customer Solution Adoption (CSA), EMEA August 9, 2011
SAP Professional Journal/Financials – 
Version 10.0 of SAP BusinessObjects Access Control comes with a revised platform and runs on an SAP NetWeaver application server ABAP. If you want to upgrade your current implementation of SAP BusinessObjects Access Control you’ll need to migrate your data using export and import tools provided with the software. Learn how to plan a migration and examine the supporting tools.

Article icon
by Frank Rambo, PhD, Director, Customer Solution Adoption (CSA), EMEA January 5, 2010
SAP Professional Journal/Financials – 
The Segregation of Duties (SoD) Review feature in SAP BusinessObjects Access Control 5.3 allows for an automated and decentralized SoD review by business managers or risk owners. The SoD Review takes the SoD violations detected during a batch risk analysis and organizes their resolution in a request-based approval workflow. Reviewers can assign mitigation controls for users with SoD violations or request removal of detected violations from the security administrators in the same workflow.